1~10 item / All 10 items
Displayed results
Filter by category
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
Contact this company
Contact Us Online1~10 item / All 10 items
Filter by category

To promote the "Guide to Security Risk Analysis for Control Systems," we are holding an online seminar. This seminar is an on-demand session where participants can "try it out" based on model cases, after understanding the content of previous seminars. Since this seminar is a hands-on experiential workshop, it addresses common stumbling blocks encountered during actual risk analysis, significantly improving understanding and work efficiency when conducting detailed risk analysis in your department. If you are interested, please contact us. 【Specifications】 ■ On-demand seminar content (learning system) ■ Accessible via browser ■ Learning time: Approximately 3 hours and 20 minutes ■ One material per person *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
We would like to introduce a user-friendly OT security training video created by our company, which has extensive experience in producing OT security content, designed for factory workers to understand. The video summarizes the differences between OT and IT security, related terminology, and incident examples. With explanations that incorporate animations, live-action short dramas, and quizzes, learners can stay engaged throughout the training and also verify their understanding of the material. [Content (Overview)] ■ Differences between OT and IT security ■ Terminology related to OT security ■ Examples of OT security incidents ■ What to do if an OT security incident occurs ■ How to prevent OT security incidents, etc. *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
I would like to introduce the role of INJANET in "Detailed Risk Analysis." Our company implements, supports, and proposes risk analysis tools, online learning content, and practical training materials. Additionally, we are capable of conducting, explaining, and training on detailed risk assessments. Please feel free to contact us if you need our services. 【Achievements】 ■ Chemicals ■ Public Sector ■ Vendors, etc. *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
"Acronis Cyber Protect Cloud" is a security solution that combines EDR and backup. The majority of ransomware (system encryption) victims are small and medium-sized enterprises. This product offers an affordable subscription for small organizations, eliminating the need for self-investigation when an alarm is triggered. We receive inquiries particularly from professionals such as labor and social security attorneys, lawyers, tax accountants, and administrative scriveners, as well as many others in construction and retail. You can leave cybersecurity to us. 【Features】 ■ Affordable subscription for small organizations ■ No self-investigation required when an alarm is triggered ■ Ransomware-compatible backup ■ IT asset inventory ■ Vulnerability report emails ■ Remote support *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
INJANET Corporation has many years of experience and achievements in "OT security." We have a track record in creating OT educational content, supporting the formulation of OT security policies, and assisting in the creation of factory guidelines. Please feel free to contact us when you need our services. 【Achievements】 ■ Security risk analysis (compliant with IPA) ■ Factory baseline security risk assessment (based on IEC 62443, NIST CSF2.0) ■ Support for creating factory guidelines ■ Support for formulating OT security policies ■ Creation of OT educational content, etc. *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
We would like to introduce our intrusion detection software, 'Asentry'. A super small program installed on an available computer (Windows 10 or higher) generates a decoy shared folder. When an intruder manipulates the files in this folder, a warning email is sent. It can also be used to verify suspicious individuals within the organization (internal fraud). Access records are stored on the computer and simultaneously sent to our cloud for monitoring. 【Features】 ■ Generates a decoy shared folder ■ Sends warning emails ■ Can be used to verify suspicious individuals within the organization (internal fraud) ■ Functions as a server, so one installation is sufficient ■ Includes one year of monitoring service *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
This is a completely new concept device that prevents the encryption of NAS (Network Attached Storage) by ransomware and protects against massive data leaks. The LAN Breaker has two functions: 1. Reducing the risk of valuable data being encrypted by ransomware. 2. Limiting large file transfers and disconnecting the LAN while issuing alerts. Most ransomware attacks begin in the early hours of the morning when there are no users on the IT system. By disconnecting the NAS containing important files from the network during this time, the LAN Breaker reduces the risk of encryption by ransomware. The LAN Breaker itself cannot be configured from the network, so it remains unaffected even if an attacker gains control of the IT system. Additionally, by pre-setting the file transfer configuration values, it can disconnect the NAS from the network and issue an alert if the communication volume exceeds the set limits.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The analysis method complies with the "Security Risk Analysis Guide for Control Systems" published by the IPA (Information-technology Promotion Agency) and can achieve up to 90% efficiency improvement. It automatically generates asset-based risk analysis sheets and business impact-based risk analysis sheets used in the above guide. By inputting the assets to be analyzed, their characteristics, connection information, and data flow, it automatically determines dangerous attack trees.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
For customers who believe that while strengthening the security of the headquarters, it is difficult to secure the security of overseas locations. This tool can automatically generate English versions of the two types of risk analysis sheets provided in the IPA's "Guidelines for Security Risk Analysis of Control Systems, 2nd Edition": the asset-based risk analysis sheet and the business impact-based risk analysis sheet. By using it alongside the English version and the security risk analysis seminar video, you can enhance cybersecurity overseas.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
This is an English version of the learning video content for asset-based risk analysis and business impact-based risk analysis, in accordance with the "Security Risk Analysis Guide for Control Systems, 2nd Edition" provided by the Information-technology Promotion Agency (IPA). Recently, there has been a significant increase in cyberattacks from overseas bases and branches. To enhance the security measures of such locations, please make use of this content. The online version of the guide is available, and the text in the image is explained in Japanese while adhering to the English (IPA Pocket Guide) standards.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration