1~6 item / All 6 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
Contact this company
Contact Us Online1~6 item / All 6 items

"ACP (Acronis Cyber Protect)" is a comprehensive solution that protects your company's assets from cyber attacks, disasters, and failures. By installing agent software on computers, it enables the protection of various computers. ACP can be used on a subscription basis, tailored to the type of assets you want to protect and the scale of your business. [Features] ■ A single point of contact for inquiries in case of emergencies, making it simple. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
This is a completely new concept device that prevents the encryption of NAS (Network Attached Storage) by ransomware and protects against massive data leaks. The LAN Breaker has two functions: 1. Reducing the risk of valuable data being encrypted by ransomware. 2. Limiting large file transfers and disconnecting the LAN while issuing alerts. Most ransomware attacks begin in the early hours of the morning when there are no users on the IT system. By disconnecting the NAS containing important files from the network during this time, the LAN Breaker reduces the risk of encryption by ransomware. The LAN Breaker itself cannot be configured from the network, so it remains unaffected even if an attacker gains control of the IT system. Additionally, by pre-setting the file transfer configuration values, it can disconnect the NAS from the network and issue an alert if the communication volume exceeds the set limits.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The analysis method complies with the "Security Risk Analysis Guide for Control Systems" published by the IPA (Information-technology Promotion Agency) and can achieve up to 90% efficiency improvement. It automatically generates asset-based risk analysis sheets and business impact-based risk analysis sheets used in the above guide. By inputting the assets to be analyzed, their characteristics, connection information, and data flow, it automatically determines dangerous attack trees.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
For customers who believe that while strengthening the security of the headquarters, it is difficult to secure the security of overseas locations. This tool can automatically generate English versions of the two types of risk analysis sheets provided in the IPA's "Guidelines for Security Risk Analysis of Control Systems, 2nd Edition": the asset-based risk analysis sheet and the business impact-based risk analysis sheet. By using it alongside the English version and the security risk analysis seminar video, you can enhance cybersecurity overseas.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
This is an English version of the learning video content for asset-based risk analysis and business impact-based risk analysis, in accordance with the "Security Risk Analysis Guide for Control Systems, 2nd Edition" provided by the Information-technology Promotion Agency (IPA). Recently, there has been a significant increase in cyberattacks from overseas bases and branches. To enhance the security measures of such locations, please make use of this content. The online version of the guide is available, and the text in the image is explained in Japanese while adhering to the English (IPA Pocket Guide) standards.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
Our risk analysis support flexibly assists clients who wish to conduct their own analyses. By performing an analysis, it becomes possible to make efficient security investments. Additionally, the standard analysis methods published by the Information-Technology Promotion Agency (IPA) come with a guidebook that is 380 pages long, making it suitable for those who want to get started quickly. 【Features】 ■ Fully compliant with IPA's "Security Risk Analysis Guide for Control Systems" ■ Utilizes our developed risk analysis tools to minimize costs to the extreme ■ Achieves highly effective security risk assessments *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration