- Publication year : 2026
1~6 item / All 6 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
Before making an inquiry
Download PDF1~6 item / All 6 items

The migration of server environments to the cloud and their scaling has become an inevitable trend. However, behind the scenes, is the management of privileged IDs not becoming increasingly complex and personalized? The daily operations of checking logs for audit compliance and changing passwords as stipulated by security policies... In the rush of these daily tasks, the dilemma of "not being able to advance the necessary security enhancements" has become a common challenge faced by many companies. In this seminar, we will have representatives from Idemitsu Kosan Co., Ltd., who have successfully balanced the efficiency of privileged ID management and security enhancement in a server environment of about 1,000 units, to discuss how they overcame these challenges. Since 2009, the company has been using the privileged ID management tool "SecureCube Access Check." They will share how they refreshed their operations with the transition to an IaaS infrastructure and why they have continued to choose the same tool for over ten years. They will provide detailed insights and specific know-how from the perspective of the field. *This webinar is a rebroadcast of a seminar held on September 25, 2025.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
Box is a cloud service equipped with high security, but the extent of its safety varies depending on "which plan you choose." In this seminar, we will organize the differences in security features provided by Box based on the plans and explain the "often overlooked points" that are difficult to grasp from official information alone. Additionally, we will clarify not only the presence or absence of features but also which plans offer the functionalities that we consider important for security. This content will provide an opportunity for those considering the introduction of Box, as well as those already using it, to reassess whether their current plan meets their company's requirements. <Recommended for> - Representatives from companies considering the introduction of Box - Those who are already using Box and want to confirm the appropriate plan for their company - Information systems department personnel who prioritize cloud service security and are responsible for formulating their company's policies.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The utilization of cloud services and the promotion of digital transformation (DX) are making IT environments increasingly complex. Along with this, the management of privileged IDs faces challenges not only from the risks of human error and operational oversights but also from increased operational burdens. Therefore, it is essential to create a system that can be managed efficiently and securely without relying on manual processes. In this seminar, we will clearly explain the key points for ensuring reliable operations while reducing the burden of privileged ID management. Additionally, we will introduce the main features and specific usage methods of the privileged ID management tool "SecureCube Access Check," incorporating demonstrations and case studies. ▶ Agenda <Session 1> The Importance of Privileged ID Management and Implementation Points - Why privileged ID management is important - Specific approaches for efficiency (recommendation for tool implementation) - Key points for tool selection <Session 2> Main Features and Usage of SecureCube Access Check - Introduction of main features with demonstrations - Effective usage methods incorporating customer case studies - Introduction of the service version - Implementation process
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
While the promotion of DX is accelerating, incidents of information leakage due to misdirected emails and lost storage media continue unabated. Furthermore, it has been several years since the dangers of PPAP were pointed out, and countermeasures are urgently needed. Many may feel the limitations of traditional methods when it comes to the exchange of confidential information. One effective countermeasure is the use of file transfer and sharing services. Among these, "Crypto-bin" is a service that has been adopted by various industries and companies of different sizes, particularly in financial institutions that require over 20 years of proven performance and high security. With a system designed to minimize human errors and robust security unique to information security specialists, it offers an email-like interface. We will also introduce an overview of the new feature "Email Integration Option," which achieves high security without changing the usual email operations. In this seminar, we will clearly present the functions of Crypto-bin and specific use cases, including demonstrations. <Recommended for> - Those considering file transfer and sharing services - Those interested in cloud services for file sharing and transfer in their business - Information security personnel facing challenges or concerns regarding data exchange with external parties.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
As the legal framework progresses with the Economic Security Promotion Act and the security measures evaluation system aimed at strengthening supply chains scheduled to be implemented in 2026, companies are required to further enhance their management systems and controls. Measures against the leakage and misuse of critical information, including technical information, are essential not only for defending against external cyberattacks but also for addressing misconduct by internal stakeholders. This seminar will outline the overall picture of laws and regulations related to economic security and security trends, and explain the key points that companies should focus on in their internal fraud prevention measures. <Session 1> Internal Fraud Prevention Measures in the Era of Economic Security Speaker: Kensuke Kura, Product Specialist, Sales Department 3, Intelligent Wave Inc. <Session 2> Privilege ID Management from the Perspective of Internal Fraud Prevention - Responding to Risk Management Measures Required by the Economic Security Promotion Act - Speaker: Yoshihiro Otani, Director, Control Solutions Division, NRI Secure Technologies, Inc. <Session 3> Preventing Internal Fraud: Measures for Technical Information Leakage Realized at the Endpoint Speaker: Kensuke Kura, Product Specialist, Sales Department 3, Intelligent Wave Inc.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
As the use of AI agents progresses, new security challenges that differ from traditional generative AI are beginning to emerge. Conventional generative AI primarily focuses on generating responses based on user input, and the main risks could be understood through the verification of input content and output results. However, AI agents can make decisions on their own, invoke tools, manipulate files, and communicate with external systems, making their behavior more complex. As a result, there is an increased likelihood that unexpected risks may lurk within the "internal movements" that are not easily visible from the outside. In this seminar, we will organize the unique risks associated with AI agents and explain them clearly while incorporating actual attack scenarios that could occur. We will also introduce diagnostic and monitoring approaches that focus on the internal workings of agents to address these risks. This content will be useful not only for those considering the introduction and utilization of AI agents but also for anyone wanting to understand the direction of future security measures. <Target Audience> Business leaders and personnel considering strengthening or complementing security through AI utilization.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration