We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security measures.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security measures - List of Manufacturers, Suppliers, Companies and Products | IPROS GMS

Security measures Product List

1~5 item / All 5 items

Displayed results

[DDHBOX Introduction Case] Electronic Components Manufacturer / Electronic Components and Semiconductors

Detection of C2 server communication through a blacklist and automatic blocking! A case where explanations during client audits became easier.

We would like to introduce a case where the electronic component manufacturer implemented our exit security solution, "DDHBOX." There was a large amount of development data (drawings/specifications), and the responsibility for the risk of data leakage was significant. The situation was further complicated by the introduction of partner company terminals and the use of VPNs, which increased potential entry points. By installing our product at the exit (inside the FW/UTM), C2 communications are automatically blocked. The source IP is identified through notification emails, allowing for the rapid isolation of the affected terminal. Monthly reports are utilized as documentation for client audits. [Case Overview] ■ Challenge: Lack of budget/personnel to contract a SOC ■ Solution: Share monthly reports with management and use them as documentation for client audits ■ Effects: - An additional layer has been added to stop "external communications after intrusion," increasing peace of mind. - Even when detection occurs, the combination of blocking and notifications has improved initial response times. *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Firewall and intrusion prevention
  • Security measures

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Case Study] Food Machinery Manufacturer / Food Machinery

Prevent the expansion of damage that leads to factory shutdowns! Operations with notifications and monthly reports even in environments with thin information systems.

We would like to introduce a case where the security solution "DDHBOX" was implemented for a food machinery manufacturer. When ransomware attacks occur during busy periods, the impact of production and shipping halts is significant. While multi-layered defense is necessary, it was challenging to secure specialized personnel or SOC contracts. Additionally, security checks from business partners have become increasingly stringent over the years. By installing our product at the exit, we automatically block C2 communications. Based on notification emails, we established a procedure for "isolating the affected device" and set up a system for regular reporting to management through monthly reports. [Case Overview] ■ Challenge: Difficulty in securing specialized personnel and SOC contracts ■ Solution: Established a procedure for "isolating the affected device" based on notification emails ■ Effects: - Operations could continue even with a dual-role system, making it harder for countermeasures to become mere formalities - Monthly reports were utilized for explanations during business partner checks *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Firewall and intrusion prevention
  • Security measures

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Introduction Case] Metal Processing Contracting / Manufacturing and Processing Contracting

Summarize and reinforce the "external communication control, logs, reporting, and emergency response" required for client checks!

We would like to introduce a case study of a company engaged in metal processing outsourcing that implemented the exit security measure "DDHBOX." They were requested by a major manufacturer to submit a security checklist and were pointed out the concern of being "used as a stepping stone" as a subcontractor/supplier. There was no dedicated information systems department, and the situation was being handled by someone with multiple responsibilities. With the introduction of our product, external unauthorized communication (C2) after an intrusion was blocked at the exit. When detected, the source IP was identified through email notifications, and procedures for isolating the terminal were established. A monthly report was created to explain the status of countermeasures both internally and externally. [Case Overview] ■ Challenge: No dedicated information systems department, handled by someone with multiple responsibilities ■ Solution: Created a format to explain the status of countermeasures both internally and externally through monthly reports ■ Effects: - The responses to the checklist became more specific, meeting the conditions for continuing the business relationship - The operational burden was low, allowing for continuity even with multiple responsibilities *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Firewall and intrusion prevention
  • Security measures

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Introduction Case] Medical Device Manufacturer / Medical Devices

Prevent information leaks and business interruption risks! Utilize notifications and monthly reports for audit and reporting responses.

We would like to introduce a case where a medical device manufacturer implemented our exit strategy security solution, "DDHBOX." The impact of leaks of quality documents and design data is significant, and regulatory compliance and client audits required the presentation of logs and systems. Additionally, it was challenging to monitor and analyze daily due to a dual-role structure. Our product was installed at the network exit to automatically block C2 communications. Notification emails were shared with the quality and information systems dual-role team to determine initial response procedures. Monthly reports were incorporated into regular audit materials to establish ongoing operations. [Case Overview] ■ Challenge: Logs and systems were required for regulatory compliance and client audits. ■ Solution: Monthly reports were incorporated into regular audit materials to establish ongoing operations. ■ Effects: - It became easier to explain the "detection, blocking, logging, and reporting" required for audits. - Additional measures were put in place to mitigate damage after an intrusion, increasing peace of mind. - The operational burden was minimal, allowing for continuity. *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Firewall and intrusion prevention
  • Security measures

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Case Study] Automotive Parts Manufacturer / Automotive and Transportation Equipment

Added exit strategies for industries with strict supply chain demands! Mitigating risks of platformization and information leakage.

We would like to introduce a case where the exit strategy security "DDHBOX" was implemented at an automotive parts manufacturer. As security requirements from complete vehicle manufacturers have become increasingly stringent year by year, although UTM/antivirus measures were already in place, the "external communication blockage after intrusion" was weak, and the environment had many entry points such as factories, offices, and partner companies. By implementing our product at the exit, C2 communication is automatically blocked. Notifications trigger the isolation of target devices and standardize initial responses, ensuring ongoing operations with regular monthly reports on the status of countermeasures. [Case Overview] ■ Challenge: Although UTM/antivirus measures are in place, "external communication blockage after intrusion" is weak. ■ Solution: Standardization of target device isolation and initial response triggered by notifications. ■ Effects: - Ability to present "exit strategies" during client checks, facilitating smooth audit responses. - Increased materials for explaining the risk of being used as a stepping stone, providing reassurance for continued transactions. - Operations centered around automatic blocking, reducing the burden on the field. *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Firewall and intrusion prevention
  • Security measures

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration