1~22 item / All 22 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us OnlineBefore making an inquiry
Download PDF1~22 item / All 22 items
Jupiter Technology Co., Ltd. held the seminar "H-ISAC Japan Council US-Japan Joint Workshop 2024." The presentation was titled "Urgent Issues: How to Advance Vulnerability and Ransomware Countermeasures Based on the Inspection Checklist Under Article 25 of the Medical Care Act." Mainly, we introduced the promotion of patch management based on Article 25, Paragraph 1 of the Medical Care Act, as well as Heimdal patches and vulnerabilities. [Presentation Content] ■ Introduction of our company and speaker ■ Promotion of patch management based on Article 25, Paragraph 1 of the Medical Care Act ■ Introduction of Heimdal patches and vulnerabilities ■ Summary *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn recent years, there has been an increasing focus on "data integrity" in the pharmaceutical industry. Data Integrity, when translated literally, means "the state of data being complete." In other words, it refers to a condition where data is free from missing elements or inconsistencies, and can be proven to be free from forgery, deletion, or tampering. In this article, we will explain the reasons for recommending Ekran in relation to the requirements for audit trails in data integrity. *For more detailed information, please refer to the related links. Feel free to contact us for further inquiries.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis document explains the simplification of network management in factories and similar environments that have become complex due to smart technologies. In "Visualization of IP Addresses and Centralized Device Management," we introduce "IP Address Manager" and "User Device Tracker." Additionally, we also cover "Steps to Efficient Network Operations" and "Platform," so please take a moment to read through it. [Contents (Partial)] ■ Visualization of IP Addresses and Centralized Device Management - Introduction of IP Address Manager - Introduction of User Device Tracker ■ Steps to Efficient Network Operations - Observability *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationOne of the challenges faced by system administrators is, "Who is consuming the bandwidth?" It is necessary to understand who is using all the bandwidth and how, and this document provides an explanation of the methods to do so. If you are interested, please download the explanatory document from "Download PDF." [Contents] *Excerpt ■ Before starting the investigation, "Check hardware and access rights" ■ Detailed methods *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationRecently, the term "Nowhere Ransom" has been heard in the news. What kind of attack is it? What kind of damage is occurring? And what are the countermeasures that are of concern? If you are interested, please download the explanatory materials about Nowhere Ransom from "Download PDF." 【Contents】*Excerpt ■ What is Nowhere Ransom? ■ Differences from ransomware ■ How to take measures against Nowhere Ransom? *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis is an introduction to the access log management system for the automotive union and company unions. In the "Automotive Industry Security Checklist (V2.1)," items 53, 122, and 143 mention log management, including "access logs," "authentication logs," and "investigations during incidents." 'Syslog' is an access log management system that can be easily and inexpensively initiated as the first step in information security measures. <Features> ■ Collects Syslogs from network devices such as UTM and servers for centralized management ■ Provides real-time alert notifications via email, etc., when a failure occurs in the Syslog collection target device ■ Syslogs can be stored long-term, allowing for searches of past logs in case of emergencies *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis is an introduction to an access log management system for the healthcare industry. The "Cybersecurity Measures Checklist for Medical Institutions" suggests that "access logs are managed (on servers)" should be addressed in the fiscal year 2023. Our company's 'Syslog' product is an access log management system that can be easily and affordably implemented as the first step in information security measures. <Features> - Collects Syslogs from network devices such as UTM and servers for centralized management. - Provides real-time alert notifications via email, etc., when a failure occurs in the Syslog collection target device. - Syslogs can be stored long-term, allowing for the search of past logs in case of emergencies. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationHeimdal Endpoint DNS Security is a feature within the Heimdal Security Suite, providing a DNS security solution that combines threat intelligence, machine learning, and AI-based advanced technologies. There are two products: "Endpoint" and "Network." Are you facing any of these issues? ■ Want to prevent malware infections and data leaks via email and websites? ■ Looking for an easy and cost-effective way to start DNS filtering? ■ Want to strengthen your cybersecurity measures without changing your existing security environment? We can solve these concerns. 【Features】 ■ Addresses advanced threats and infected users along with the infection process ■ Predicts threats using AI-driven neural network predictive DNS ■ Comes with a network log agent for infection tracing
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "Heimdal Security Suite" is a comprehensive cybersecurity cloud service necessary for modern cyber threat countermeasures. It is integrated into a single platform, providing a security solution that combines convenience and safety while simplifying IT infrastructure and mitigating risks. With one dashboard, you can prevent, detect, and manage all threats. You can use all features or just individual functions as needed. It has been recognized by the FBI (Federal Bureau of Investigation) for its technical support in malware tracking. Are you facing any of these issues? - Want to consolidate cybersecurity measures onto a single platform to improve operational efficiency and reduce costs? - Have you experienced a security breach from ransomware or feel anxious about ransomware countermeasures? - Want to strengthen weaknesses without changing the systems you are currently using? We can solve these concerns. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"UDT (SolarWinds User Device Tracker)" is a tool designed to facilitate the monitoring of network ports, devices, and users. It allows for the instant discovery of connected computers and retrieval of information such as usernames, switch names, and port details. Additionally, it quickly locates the current position of devices and displays the last connection location of devices that are currently not connected. 【Features】 ■ Monitors the usage of device interfaces ■ Monitors device connection status and history ■ Detects MAC addresses, IP addresses, and hostnames ■ Can be installed as a standalone application ■ No agent installation required *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"IPAM (SolarWinds IP Address Manager)" is an easy-to-use and affordable DHCP, DNS, and IP address management tool. With automatic detection and tracking of IPv4/IPv6 addresses, you can always keep track of unused and available IP addresses, enabling efficient and waste-free use of IP addresses. Additionally, by integrating the management of DHCP and DNS settings, you can save time spent on provisioning and reusing IP addresses. [Features] - Eliminate IP duplication with powerful IPv4 and IPv6 address management - Save time spent on provisioning and reusing IP addresses - Quickly avoid issues through monitoring critical IP events and receiving alerts - Delegate IP address management to system administrators and network administrators with role-based access *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"NCM (SolarWinds Network Configuration Manager)" is a network configuration management product that can be used either as a standalone tool or as an integrated tool with "SolarWinds NPM." It supports a wide range of network sizes, from small to large, with features such as device configuration backup, automatic notification of changes, configuration rollback, remote updates of Cisco IOS, and vulnerability assessment of configuration files. 【Features】 ■ Automation of network configuration management and backup ■ Compliance adherence ■ Integration with NPM *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"NTA (SolarWinds NetFlow Traffic Analyzer)" is an add-on module for NPM (SolarWinds Network Performance Monitor). It enables network visualization, displaying traffic analysis results while allowing you to understand traffic usage and utilization from various perspectives. Additionally, it provides a comprehensive view of network traffic, helping to identify bottlenecks and resolve bandwidth issues. 【Features】 ■ Identifies source IP and destination port, destination IP, and protocol or application name ■ Can send alert notifications when usage thresholds are exceeded ■ Allows drill-down to traffic for specific network elements ■ Enables the creation of network traffic reports with just a few clicks *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationNPM (SolarWinds Network Performance Monitor) is a powerful integrated network monitoring application available at a low cost. It serves as a core product that combines a variety of rich products based on monitoring requirements to monitor and troubleshoot various issues. It can quickly detect, diagnose, and resolve network performance problems and failures. 【Features】 ■ Monitors various devices - Network devices, servers, wireless equipment, virtual environments, etc. ■ Intuitive operability - The interface is easy to understand ■ High scalability - Capable of accommodating future network expansions and increases in users *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationCheckmk is a powerful monitoring software that can handle complex IT environments ranging from small to large scale. It can monitor various environments such as on-premises, cloud, and containers. In addition to Nagios plugins, it can use plugins compatible with well-known manufacturers in Japan, such as Cisco, Citrix, VMware, Oracle, NetApp, and SAP Hana, without the need for customization. 【Features】 ■ Capable of monitoring various environments such as on-premises, cloud, and containers ■ Able to handle complex IT environments from small to large scale ■ Highly extensible software derived from Nagios ■ Can automatically collect services and event logs using dedicated agents ■ Capable of receiving Syslog and SNMP traps *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationAre you having trouble finding a tool that can dump traffic within the LAN? 'nProbe' operates immediately as a NetFlow probe simply by connecting to a mirror port or TAP. It collects logs for traffic analysis and exports NetFlow to any flow collector. 【Features】 ■ There is a risk of not being able to configure NetFlow → Generates NetFlow v5/v9 and IPFIX in probe mode ■ The protocols for export are not unified → Unifies to NetFlow v5/v9 and IPFIX, sending to any flow collector *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"I want to understand the devices accessing the internal system." "Are you having trouble with issues like 'the network is slow'?" You can resolve this simply by connecting to the high-speed traffic analysis tool 'ntopng'. You can check the usage of the internal network in real-time on a per-host basis, allowing you to grasp all activities throughout the day. Additionally, it comes standard with DPI, enabling you to see the applications used by individual hosts. 【Features】 ■ Alerts can be issued if a host accesses sites registered on the blacklist. ■ Investigations can be initiated immediately at the packet level during delays or incidents. ■ Can be utilized for network optimization during telework. ■ Real-time monitoring of internal network usage on a per-host basis. ■ Provided pre-installed on our original appliance "BlueVault io". *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationSince our establishment, we have aimed to contribute to solving various issues in our customers' computer systems in Japan. In addition to our core themes of log management, network management, and security, we have newly started handling SIEM products, which are in high demand from our customers. We will continue to invest in strengthening our product capabilities and are committed to discovering innovative products from around the world at a higher level, delivering them along with superior services. 【Business Overview】 ■ Sales of System Products - Log Management - Network Management - Security Products - Original Appliance Products ■ System Construction Business, etc. *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis catalog is a comprehensive introduction to the system products handled by Jupiter Technology Co., Ltd., which provides products that contribute to advanced security and business integrity. It features products such as the log server 'syslog-ng Store Box (SSB)', which achieves ultra-high-speed processing of up to 70,000 msg/s and is suitable for log management in enterprises and organizations where confidentiality and integrity are essential, as well as 'Safeguard for Privileged Sessions', which records all remote access operations in video format and is effective for security measures. [Featured Products] ■ Log Servers - syslog-ng Store Box (SSB) - WinSyslog - Kiwi Syslog Server, etc. *For more details, please download the PDF or contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"PRTG Network Monitor" is a highly acclaimed and high-performance monitoring software that has won the Network Computing Awards in the UK for four consecutive years: 2014, 2015, 2016, and 2017. Although it was developed in Germany, it fully supports Japanese and features a well-designed user interface that is easy to navigate despite its advanced functionality. It boasts an overwhelming cost-performance ratio, with flow monitoring included as standard. 【Features】 ■ Easily start smart monitoring ■ Customizable to meet monitoring requirements ■ Clear and simple licensing structure ■ Monitors "everything" as a single solution ■ API for outputting custom data *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe provide all three essential security measures that cannot be overlooked in a telework environment. Our lineup includes "GFI LanGuard," which enables patch management, as well as "WebTitan," which collects PC operation screen history and prevents unauthorized operations, and "ntopng," a real-time L7 high-speed traffic analysis tool. We deliver unique and excellent products created overseas to our customers in Japan. 【Three Security Measures】 ■ Environment Maintenance: Inspecting the entire IT environment and establishing a "safe environment" ■ Security Measures and Labor Management: Preventing information misuse and non-employment, and addressing external threats ■ Visualization Measures: Visualizing IT infrastructure and implementing countermeasures *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationSpamTitan is a threat anti-spam software that enables cluster configuration with outstanding performance at an overwhelmingly low price. It requires almost no complex tuning work for 50 users to unlimited users, allowing you to experience remarkable effects right after installation. In addition to domain-level settings, detailed user-level settings are also possible. The dual anti-spam engines of ClamAV and KasperskyAV reliably detect viruses in both the email body and attachments. 【Features】 ○ Cluster support ○ Available in two versions: ISO image and VMware ○ 98% spam capture rate, less than 0.03% false spam detection ○ Scanning of sent and received emails ○ Automatic update system For more details, please contact us or download the catalog.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration