1~12 item / All 12 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~12 item / All 12 items
Television Osaka, Inc., which conducts television broadcasting business targeting the Osaka Prefecture. While advancing security measures for PCs and networks, you were exploring effective means for email security measures, particularly against spoofed emails, and chose our cloud-based DMARC analysis service "DMARC/25." After the introduction of "DMARC/25," spoofed emails sent from unknown mail servers and their sources have been visualized. Additionally, by utilizing our "Diagnostic Consulting Service," where our analysts analyze your email environment and provide reports and optimal countermeasures, we are currently achieving significant results in reducing spoofed emails. [Challenges Before Implementation] While advancing security measures for PCs and networks, you were exploring how to address spoofing, which is one of the email security measures.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study on the implementation of the "Cloudmark Security Platform for Email" at Ricoh Company, Ltd. The company had been in a black box state, completely unaware of what emails were being sent, how many, and from where to where. To achieve security measures, promote digital transformation (DX), and improve operational efficiency, it was urgent to visualize and reconstruct the email system. To break this situation, they standardized email software while implementing the "Cloudmark Security Platform for Email" as an email gateway. This enabled real-time visualization and control of traffic, resulting in significant improvements in security through finely tunable policies. [Challenges Before Implementation] - The email system was in a black box state, posing significant security risks. - Different organizations operated on varying email systems and standards, leading to issues such as garbled text and undelivered messages. *For more details, please refer to the PDF document or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of the implementation of "DMARC/25 Analyze" at BANDAI SPIRITS Co., Ltd. In recent times, as security incidents have been on the rise, the company had been relying on manual checks and reports to confirm the presence of phishing emails impersonating their e-commerce site "Premium Bandai." With the introduction of "DMARC/25 Analyze," the company was able to easily quantify the status of their phishing email countermeasures, enabling proactive detection. This also significantly reduced the effort they had previously invested. [Challenges Before Implementation] ■ They were considering how to establish clearer and more effective measures to confirm the presence of phishing emails, which had been unclear. *For more details, please refer to the PDF document or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study on the implementation of "DMARC/25" at Techouse Inc. In their operations, the company exchanges numerous emails related to job postings, recruitment, and applications with various clients. The security risk of phishing emails is very high, necessitating the proper implementation of email domain authentication technology. With the introduction of "DMARC/25," the previously opaque email sending routes have been corrected. This is expected to lead to an improvement in the reputation score and a reduction in email delivery issues. [Challenges Before Implementation] ■ Due to the exchange of emails related to job postings, recruitment, and applications with clients, there is a high risk of phishing emails, making the implementation of email domain authentication necessary. ■ Numerous emails are sent from multiple domains, and there are several email sending infrastructures, resulting in an unclear application status of SPF and DKIM. ■ Email delivery issues, believed to be caused by a decrease in reputation score, have occurred, necessitating the implementation of email domain authentication technology to improve the reputation score. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of the implementation of "RSTOR" at KADOKAWA Connected Inc. The company's video community service "Niconico," one of the largest in Japan, contains a vast number of files in its object storage. There were many Read/Write operations for small-sized data, and during these times, the concentration of hundreds of millions of objects led to issues such as system failures and inability to operate. In response, the company replaced its existing system with the high-speed cloud storage "RSTOR." With the introduction of "RSTOR," they were able to configure an object storage solution that matched their service, reducing operational unavailability and achieving performance well above expectations. [Challenges Before Implementation] ■ The existing system experienced system failures and became inoperable during times of object concentration or bulk deletion of large amounts of data. ■ The existence of nearly 100 million objects resulted in enormous costs. ■ The current system required routine tasks to maintain performance, which also incurred costs. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study on the implementation of "DMARC/25" at A2 Corporation. The company had previously set up SPF records as a measure against spoofed emails, but they were unable to ascertain the actual number of spoofed emails that failed authentication. In order to confirm the status of their measures against spoofed emails, they chose our "DMARC/25," which offers complete support in Japanese, as many DMARC analysis services are foreign products. By implementing "DMARC/25," they were able to understand the status of SPF authentication and identify issues related to third-party signatures and email forwarding. This has been useful for their future measures against spoofed emails. [Challenges Before Implementation] ■ Although they believed that the SPF record settings should have mitigated spam emails with spoofed sender addresses, they did not know how many emails were actually failing authentication. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of the implementation of "RSTOR" at Kids Star Co., Ltd. The company, which operates a digital content business for families, has been working to increase app users in line with its business expansion, but has been troubled by the rising costs of CDN that have increased proportionally. One day, after referring to the implementation case of "RSTOR" by another company, they decided to implement it due to its clear pricing structure that leads to cost reduction and the good performance observed in the actual test environment. After the implementation, they provided users with stable content delivery unchanged from before, while achieving the expected reduction in CDN costs. [Challenges Before Implementation] ■ Struggling with the rising CDN costs that increase in proportion to the expansion of app user utilization ■ Although CloudFront was addressed with Reserved Capacity, there was no fundamental solution ■ Having allocated resources to front-end development, they missed the timing to transition to a new architecture for the back-end (AWS) *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of the implementation of "Cloudmark Authority" at Nifty Corporation. The company had been using products from other vendors for spam email countermeasures, but it became quite burdensome in terms of costs for both the products and infrastructure, as it required operation on a server cluster of several dozen machines. On the other hand, the company had previously implemented the MTA software "Cloudmark Security Platform," and since it was possible to add the email security solution "Cloudmark Authority" as an add-on, and the associated server operation costs and product costs matched their expectations, they decided to proceed with the implementation. After the implementation, not only did they achieve the expected spam detection, but they also eliminated the need for several dozen servers that were necessary for operating other vendor products, resulting in significant infrastructure cost savings. [Challenges Before Implementation] ■ They were operating several dozen servers with products from other vendors for spam email countermeasures, which became a burden in terms of product and infrastructure costs. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration(1) DMARC Report Analysis Tool After implementing DMARC to combat spoofing emails for your email domain, you can visualize the data obtained using a cloud-based analysis tool. (2) Consulting We provide implementation and diagnostic consulting for DMARC to combat spoofing emails, reducing the risk of spoofing attacks on your email domain. (3) Brand Logo Icon BIMI Support We assist in issuing the authentication mark certificate necessary for complying with the BIMI standard, which displays your logo on emails sent from your email domain.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationEmail communication is essential in corporate activities. However, with the prevalence of spoofed emails nowadays, security measures to prevent malware and fraud are absolutely necessary for your company as well. DMARC (Domain-based Message Authentication, Reporting & Conformance) is a technology for combating spoofed emails, and it has been gaining traction overseas, showing certain effectiveness as a security measure. On the other hand, it can be said that this technology is not well-known among domestic companies. This white paper analyzes the extent to which DMARC is being adopted and utilized in specific industries within domestic companies, namely "manufacturing," "distribution and retail," and "financial services." Does your company have DMARC set up for its email domain? Are you effectively utilizing measures against spoofed emails to protect your brand? Through this white paper, why not learn about DMARC and consider its implementation? *Please check the white paper via the PDF download link below.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"DMARC/25" is a cloud-based DMARC analysis service that aggregates and visualizes authentication result information (DMARC reports) to provide easy-to-understand web-based reports. It allows you to check whether your domain is being misused and can quickly detect suspicious email sending that may involve impersonation. In the event that your domain is used for unauthorized sending, you can accurately grasp the existence and content of phishing emails, enabling you to warn customers and business partners who may receive your emails, thus helping to mitigate potential damage. [Service] ■ Visualization of DMARC reports - Email usage status - Impersonation status - Response status of sending hosts ■ Date and time alert settings ■ Regular diagnostic reports and consulting *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis catalog introduces various products and services that support large-scale email systems. As a group of engineers with many years of experience in the email system infrastructure of major ISPs, xSPs, and mobile operators, we provide consulting on the design and construction of large-scale email systems, as well as security and other related matters. [Contents (excerpt)] ■ Products & Services ■ TwoFive Products & Services Solutions ■ 01-1 Email delivery server for large-scale ■ 01-2 Message security for large-scale carriers ■ 01-3 Security filters for large-scale carriers / xSPs *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration