iPROS Manufacturing
  • Search for products by classification category

    • Electronic Components and Modules
      Electronic Components and Modules
      59257items
    • Machinery Parts
      Machinery Parts
      74927items
    • Manufacturing and processing machinery
      Manufacturing and processing machinery
      99350items
    • Scientific and Physics Equipment
      Scientific and Physics Equipment
      34523items
    • Materials
      Materials
      36905items
    • Measurement and Analysis
      Measurement and Analysis
      54668items
    • Image Processing
      Image Processing
      15018items
    • Control and Electrical Equipment
      Control and Electrical Equipment
      52970items
    • Tools, consumables, and supplies
      Tools, consumables, and supplies
      64219items
    • Design and production support
      Design and production support
      12426items
    • IT/Network
      IT/Network
      43319items
    • Office
      Office
      13690items
    • Business support services
      Business support services
      33165items
    • Seminars and Skill Development
      Seminars and Skill Development
      6287items
    • Pharmaceutical and food related
      Pharmaceutical and food related
      29311items
    • others
      73409items
  • Search for companies by industry

    • Manufacturing and processing contract
      7343
    • others
      4999
    • Industrial Machinery
      4418
    • Machine elements and parts
      3284
    • Other manufacturing
      2888
    • IT/Telecommunications
      2553
    • Trading company/Wholesale
      2470
    • Industrial Electrical Equipment
      2298
    • Building materials, supplies and fixtures
      1809
    • software
      1634
    • Electronic Components and Semiconductors
      1567
    • Resin/Plastic
      1486
    • Service Industry
      1446
    • Testing, Analysis and Measurement
      1129
    • Ferrous/Non-ferrous metals
      983
    • environment
      700
    • Chemical
      630
    • Automobiles and Transportation Equipment
      563
    • Printing Industry
      508
    • Information and Communications
      456
    • Consumer Electronics
      416
    • Energy
      326
    • Rubber products
      312
    • Food Machinery
      306
    • Optical Instruments
      278
    • robot
      271
    • fiber
      250
    • Paper and pulp
      233
    • Electricity, Gas and Water Industry
      169
    • Pharmaceuticals and Biotechnology
      167
    • Warehousing and transport related industries
      144
    • Glass and clay products
      142
    • Food and Beverage
      128
    • CAD/CAM
      125
    • retail
      110
    • Educational and Research Institutions
      105
    • Medical Devices
      102
    • Ceramics
      98
    • wood
      89
    • Transportation
      84
    • Medical and Welfare
      63
    • Petroleum and coal products
      62
    • Shipbuilding and heavy machinery
      52
    • Aviation & Aerospace
      48
    • Fisheries, Agriculture and Forestry
      42
    • Public interest/special/independent administrative agency
      31
    • equipment
      29
    • self-employed
      24
    • Government
      23
    • Research and development equipment and devices
      23
    • Materials
      22
    • Mining
      17
    • Finance, securities and insurance
      13
    • cosmetics
      11
    • Individual
      10
    • Restaurants and accommodations
      9
    • Police, Fire Department, Self-Defense Forces
      7
    • Raw materials for reagents and chemicals
      3
    • Laboratory Equipment and Consumables
      3
    • Contracted research
      3
  • Special Features
  • Ranking

    • Overall Products Ranking
    • Overall Company Ranking
Search for Products
  • Search for products by classification category

  • Electronic Components and Modules
  • Machinery Parts
  • Manufacturing and processing machinery
  • Scientific and Physics Equipment
  • Materials
  • Measurement and Analysis
  • Image Processing
  • Control and Electrical Equipment
  • Tools, consumables, and supplies
  • Design and production support
  • IT/Network
  • Office
  • Business support services
  • Seminars and Skill Development
  • Pharmaceutical and food related
  • others
Search for Companies
  • Search for companies by industry

  • Manufacturing and processing contract
  • others
  • Industrial Machinery
  • Machine elements and parts
  • Other manufacturing
  • IT/Telecommunications
  • Trading company/Wholesale
  • Industrial Electrical Equipment
  • Building materials, supplies and fixtures
  • software
  • Electronic Components and Semiconductors
  • Resin/Plastic
  • Service Industry
  • Testing, Analysis and Measurement
  • Ferrous/Non-ferrous metals
  • environment
  • Chemical
  • Automobiles and Transportation Equipment
  • Printing Industry
  • Information and Communications
  • Consumer Electronics
  • Energy
  • Rubber products
  • Food Machinery
  • Optical Instruments
  • robot
  • fiber
  • Paper and pulp
  • Electricity, Gas and Water Industry
  • Pharmaceuticals and Biotechnology
  • Warehousing and transport related industries
  • Glass and clay products
  • Food and Beverage
  • CAD/CAM
  • retail
  • Educational and Research Institutions
  • Medical Devices
  • Ceramics
  • wood
  • Transportation
  • Medical and Welfare
  • Petroleum and coal products
  • Shipbuilding and heavy machinery
  • Aviation & Aerospace
  • Fisheries, Agriculture and Forestry
  • Public interest/special/independent administrative agency
  • equipment
  • self-employed
  • Government
  • Research and development equipment and devices
  • Materials
  • Mining
  • Finance, securities and insurance
  • cosmetics
  • Individual
  • Restaurants and accommodations
  • Police, Fire Department, Self-Defense Forces
  • Raw materials for reagents and chemicals
  • Laboratory Equipment and Consumables
  • Contracted research
Special Features
Ranking
  • Overall Products Ranking
  • Overall Company Ranking
  • privacy policy
  • terms of service
  • About Us
  • Careers
  • Advertising
  1. Home
  2. IT/Telecommunications
  3. ネクフル
  4. Product/Service List
IT/Telecommunications
  • Added to bookmarks

    Bookmarks list

    Bookmark has been removed

    Bookmarks list

    You can't add any more bookmarks

    By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

    Free membership registration

ネクフル

EstablishmentNovember 2, 2011
capital525Ten thousand
number of employees10
addressTokyo/Chuo-ku/9th Floor, Soei Building, 2-4-4 Shintomi
phone03-6260-6809
  • Special site
  • Official site
last updated:Feb 10, 2026
ネクフルlogo
  • Contact this company

    Inquiry Form
  • Company information
  • Products/Services(55)
  • catalog(13)
  • news(0)

ネクフル Product Lineup

  • category

1~17 item / All 17 items

Displayed results

Filter by category

necfru MAM/DAM necfru MAM/DAM
【紹介資料】マルウェア感染“後”流出セキュリティ対策DDHBOX 【紹介資料】マルウェア感染“後”流出セキュリティ対策DDHBOX
自動車・輸送機器業界のコラム 自動車・輸送機器業界のコラム
部品・加工・受託製造業界のコラム 部品・加工・受託製造業界のコラム
機械・装置・ロボット業界のコラム 機械・装置・ロボット業界のコラム
素材・化学・建材業界のコラム 素材・化学・建材業界のコラム
商社・物流・流通業界のコラム 商社・物流・流通業界のコラム
医療業界のコラム 医療業界のコラム
重工・インフラ・大型設備業界のコラム 重工・インフラ・大型設備業界のコラム
【紹介資料】マルウェア感染“後”流出セキュリティ対策DDHBOX

【紹介資料】マルウェア感染“後”流出セキュリティ対策DDHBOX

TEST

Export Control Security DDHBOX

It is impossible to prevent intrusion 100%. Therefore, we stop it at the exit.

Modern cyber attacks have become sophisticated, making it impossible to prevent 100% of intrusions with just entry measures. Once infected, confidential data can be exfiltrated to the attacker's server (C2 server), leading to significant business losses and a loss of social credibility. DDHBOX is a dedicated appliance that fills the gaps in traditional "entry measures" with "exit measures." Utilizing the top-tier threat intelligence list from JSOC (LAC Co., Ltd.), it automatically detects and blocks unauthorized communications to attackers 24/7, preventing information leaks at the source. Its greatest feature is the easy installation that requires simply placing it on the network. There is no need for software installation or configuration changes on individual PCs. Additionally, to prepare for unforeseen circumstances, a cyber insurance policy of up to 3 million yen is included as standard. This covers investigation and recovery costs, with experts providing one-stop support. DDHBOX addresses the challenges faced by small and medium-sized enterprises, such as "lack of expertise" and "limited budgets," offering maximum defense and peace of mind with minimal operational burden. It achieves a "multi-layered defense" encompassing entry, internal, and exit measures, ensuring the protection of your company's digital assets.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Introduction Case] Precision Parts Manufacturer / Mechanical Elements and Components

Installed at the network exit! Detects and automatically blocks unauthorized communication to the attacker's command server.

We would like to introduce a case study where the precision parts manufacturer implemented the exit strategy security "DDHBOX." During a security check by a business partner, they were required to have "external communication blocking," "logs," and "reporting systems," and they faced the challenge of being uneasy about data exfiltration after an intrusion, as the entry point (UTM) alone was insufficient. By adding our product inside the UTM (at the exit) to block C2 communication, they have established an operational system that can continue even with dual roles by repurposing monthly reports for internal and partner presentations. [Case Overview] ■ Challenge: No dedicated IT personnel, lacking resources for monitoring/analysis ■ Solution: Automatic notification to the administrator's email upon detection ■ Effects: - Able to provide concrete answers to key items on the checklist (monitoring/communication control/logs/reporting/emergency response/insurance) - Operations centered around notification confirmation and monthly checks, allowing for continuity even with dual roles *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Introduction Case] Industrial Machinery Manufacturer / Industrial Machinery

A case where C2 communication, which is likely to occur after an intrusion, was detected and blocked to prevent data exfiltration!

We would like to introduce a case where the security solution "DDHBOX" for exit measures was implemented by an industrial machinery manufacturer. In light of reports of ransomware attacks in the same industry, concerns about external communications after an infection were increasing. There was also the challenge of understanding what constituted normal communication, given the high volume of interactions with overseas locations and partner companies. The product was installed at the network exit of the main site, with notifications set to go to "General Affairs and Information Systems + Executives." Monthly reports were regularly presented at management meetings, establishing a framework for the PDCA cycle. [Case Overview] ■ Challenge: Considered implementing EDR, but operational burden was a bottleneck ■ Solution: Clarified the role distribution between existing UTM/EDR (entry/internal/exit) ■ Effects: - Initial response procedures, such as device isolation, were triggered by notifications - A system was established to regularly explain the status of countermeasures through reports *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Introduction Case] Electronic Components Manufacturer / Electronic Components and Semiconductors

Detection of C2 server communication through a blacklist and automatic blocking! A case where explanations during client audits became easier.

We would like to introduce a case where the electronic component manufacturer implemented our exit security solution, "DDHBOX." There was a large amount of development data (drawings/specifications), and the responsibility for the risk of data leakage was significant. The situation was further complicated by the introduction of partner company terminals and the use of VPNs, which increased potential entry points. By installing our product at the exit (inside the FW/UTM), C2 communications are automatically blocked. The source IP is identified through notification emails, allowing for the rapid isolation of the affected terminal. Monthly reports are utilized as documentation for client audits. [Case Overview] ■ Challenge: Lack of budget/personnel to contract a SOC ■ Solution: Share monthly reports with management and use them as documentation for client audits ■ Effects: - An additional layer has been added to stop "external communications after intrusion," increasing peace of mind. - Even when detection occurs, the combination of blocking and notifications has improved initial response times. *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

【DDHBOX Introduction Case】 Resin Molding Manufacturer / Resin and Plastic

Preventing the risk of information leakage and exploitation after infection with export measures! Simplifying operations with notifications and monthly reports.

We would like to introduce a case where the security solution "DDHBOX" for exit measures was implemented by a resin molding manufacturer. In a situation where many factory PCs were outdated and management was lagging, a client pointed out concerns about "pivoting attacks," necessitating countermeasures. Additionally, the inability to conduct daily monitoring due to outsourced IT management was also a challenge. Our product was implemented at the factory network exit to block C2 communications. Notifications were forwarded to the outsourced IT management, clarifying initial response coordination. Monthly reports are used to understand the blocking status and organize areas for improvement. [Case Overview] ■ Challenge: Inability to conduct daily monitoring due to outsourced IT management ■ Solution: Forward notifications to the outsourced IT management to clarify initial response coordination ■ Effects: - Provided countermeasures against pivoting risks, reducing client anxiety - Daily operations were streamlined to "notification confirmation + isolation when necessary" *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Introduction Case] Building Material Manufacturer / Building Materials, Supplies, and Fixtures

Detect and automatically block C2 communications! Visualize the situation even for companies with multiple locations through notification emails and monthly reports.

We would like to introduce a case where the construction materials manufacturer implemented the exit security solution "DDHBOX." With many locations/sites, security operations tended to be left to each site, and there was a requirement to submit security measures due to procurement requirements from major general contractors. Although a UTM was implemented, there were concerns about data exfiltration after an intrusion. We installed this product at the exits of key locations and centralized notifications to the headquarters management department. We established an operational system to monitor the situation by location through monthly reports and utilized this information for procurement requirement documentation. 【Case Overview】 ■ Challenge: Many locations/sites, with security operations left to each site ■ Solution: Designed with a structure that can be rolled out sequentially and unified the response flow ■ Effects: - Responses to procurement checks were standardized, meeting the requirements for project continuation - Operations that were previously left to each site are now managed centrally by headquarters *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Case Study] Food Machinery Manufacturer / Food Machinery

Prevent the expansion of damage that leads to factory shutdowns! Operations with notifications and monthly reports even in environments with thin information systems.

We would like to introduce a case where the security solution "DDHBOX" was implemented for a food machinery manufacturer. When ransomware attacks occur during busy periods, the impact of production and shipping halts is significant. While multi-layered defense is necessary, it was challenging to secure specialized personnel or SOC contracts. Additionally, security checks from business partners have become increasingly stringent over the years. By installing our product at the exit, we automatically block C2 communications. Based on notification emails, we established a procedure for "isolating the affected device" and set up a system for regular reporting to management through monthly reports. [Case Overview] ■ Challenge: Difficulty in securing specialized personnel and SOC contracts ■ Solution: Established a procedure for "isolating the affected device" based on notification emails ■ Effects: - Operations could continue even with a dual-role system, making it harder for countermeasures to become mere formalities - Monthly reports were utilized for explanations during business partner checks *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Introduction Case] Metal Processing Contracting / Manufacturing and Processing Contracting

Summarize and reinforce the "external communication control, logs, reporting, and emergency response" required for client checks!

We would like to introduce a case study of a company engaged in metal processing outsourcing that implemented the exit security measure "DDHBOX." They were requested by a major manufacturer to submit a security checklist and were pointed out the concern of being "used as a stepping stone" as a subcontractor/supplier. There was no dedicated information systems department, and the situation was being handled by someone with multiple responsibilities. With the introduction of our product, external unauthorized communication (C2) after an intrusion was blocked at the exit. When detected, the source IP was identified through email notifications, and procedures for isolating the terminal were established. A monthly report was created to explain the status of countermeasures both internally and externally. [Case Overview] ■ Challenge: No dedicated information systems department, handled by someone with multiple responsibilities ■ Solution: Created a format to explain the status of countermeasures both internally and externally through monthly reports ■ Effects: - The responses to the checklist became more specific, meeting the conditions for continuing the business relationship - The operational burden was low, allowing for continuity even with multiple responsibilities *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Introduction Case] Testing and Analysis Contracting / Testing, Analysis, and Measurement

Automatically block C2 communications! Simplify operations with notifications and monthly reports, supporting accountability.

We would like to introduce a case where a company engaged in testing and analysis services implemented our exit strategy security solution, "DDHBOX." The client experienced an increase in requests for confirmation regarding "information leakage measures" and "log management," and there were many data media brought in from external sources, making it impossible to eliminate infection risks completely. Additionally, there was a concern about a lack of confidence in investigations and explanations in the event of an accident. By installing our product at the exit and blocking C2 communication, we reduced the risk of data being taken out. We created procedures for device isolation and determining the need for investigation, starting from notification emails, and clarified the insurance-backed investigation/recovery/consulting support as a "last resort." 【Case Overview】 ■ Challenge: Lack of confidence in investigations/explanations in the event of an accident ■ Solution: Clarified insurance-backed investigation/recovery/consulting support as a "last resort" ■ Effects: - Prepared explanatory materials (reports, systems) for clients, making audit responses easier - Clarified initial actions during an incident, reducing the psychological burden on responsible personnel - Evaluated as "preparation including emergency response" *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Introduction Case] Robot SIer / Robot

Monitor and block C2 communications at the exit! Operations include automatic blocking, notifications, and monthly reports, allowing for management by a small team.

We would like to introduce a case where the security exit strategy "DDHBOX" was implemented for a robot SIer. In an environment with high security demands due to frequent connections to customer networks, the client required "control of external communications" and "incident response capabilities." It was also a challenge that operating a SOC with a small team was not realistic. The product was implemented at the headquarters exit, and automatic blocking of C2 communications was established. Notification emails were consolidated to the CSIRT contact point (also serving other roles), and a primary response flow was developed. Monthly reports are utilized as explanatory materials for the client. [Case Overview] ■ Challenge: It is not realistic for the company to operate a SOC with a small team. ■ Solution: Consolidated notification emails to the CSIRT contact point (also serving other roles) and developed a primary response flow. ■ Effects: - We were able to propose the implementation of exit measures in response to the client's security demands. - An additional layer was added to stop communications with attackers, allowing for continued maintenance with peace of mind. - Operations became less prone to becoming mere formalities, even with a small team. *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Introduction Case] Medical Device Manufacturer / Medical Devices

Prevent information leaks and business interruption risks! Utilize notifications and monthly reports for audit and reporting responses.

We would like to introduce a case where a medical device manufacturer implemented our exit strategy security solution, "DDHBOX." The impact of leaks of quality documents and design data is significant, and regulatory compliance and client audits required the presentation of logs and systems. Additionally, it was challenging to monitor and analyze daily due to a dual-role structure. Our product was installed at the network exit to automatically block C2 communications. Notification emails were shared with the quality and information systems dual-role team to determine initial response procedures. Monthly reports were incorporated into regular audit materials to establish ongoing operations. [Case Overview] ■ Challenge: Logs and systems were required for regulatory compliance and client audits. ■ Solution: Monthly reports were incorporated into regular audit materials to establish ongoing operations. ■ Effects: - It became easier to explain the "detection, blocking, logging, and reporting" required for audits. - Additional measures were put in place to mitigate damage after an intrusion, increasing peace of mind. - The operational burden was minimal, allowing for continuity. *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Introduction Case] Warehouse/Logistics / Warehouse and Transportation Related Industries

Automatically block C2 communications in logistics sites where operations cannot be halted! Accelerate initial response with notifications and understand operational status through monthly reports.

We would like to introduce a case where a company engaged in warehousing and transportation-related industries implemented our exit security solution, "DDHBOX." In an environment highly dependent on IT, such as WMS and shipping labels, where any downtime can lead to immediate losses, the challenge was that the locations were scattered, making it difficult to uniformly manage on-site PCs. Additionally, there was an increase in security checks from business partners (shippers). By installing our product at the exit, we were able to block external unauthorized communications after an intrusion. Notifications were centralized to the headquarters management department, allowing the on-site team to focus solely on terminal isolation. Monthly reports are also utilized for explanations to shippers. 【Case Overview】 ■ Challenge: Scattered locations made uniform management of on-site PCs difficult ■ Solution: Centralized notifications to the headquarters management department, allowing the on-site team to focus only on terminal isolation ■ Effects: - Enabled responses to exit security inquiries from shippers - Clarified the division of initial response duties, allowing for measures to be taken without increasing the burden on the on-site team *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Introduction Case] IT Vendor / IT and Information Communication

A case where measures that can be "explained" were established not only for our own company but also as a position handling customer information!

We would like to introduce a case where the exit strategy security "DDHBOX" was implemented by an IT vendor. While customers demanded security checks (monitoring/blocking/logging/emergency response), EDR/NDR was considered but posed challenges due to high operational difficulty. Additionally, there were situations where small-scale SOC operations were not feasible. With the introduction of our product, we implemented blocking of C2 communications at the exit. We prepared notification emails and monthly reports as materials for customer reporting, and established a system where investigation/recovery support with insurance can be utilized in emergencies. 【Case Overview】 ■ Challenge: EDR/NDR is a candidate, but operational difficulty is high ■ Solution: Prepared notification emails and monthly reports as materials for customer reporting ■ Effects - Responses to customer checks became more concrete, making contract renewals and new proposals easier - We were able to continuously submit operational results (reports) for measures - We were able to streamline operations to be manageable even with a small team *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Introduction Case] Chemical Manufacturer/Chemicals

Prevent the leakage of confidential information! With notifications and monthly reports, it's easier to maintain operations even in environments with thin IT resources.

We would like to introduce a case where a chemical manufacturer implemented our exit security solution, "DDHBOX." In a situation where there is highly confidential information related to formulations and prototypes, and the impact of leaks is significant, it was challenging to manage updates completely due to the presence of factory equipment networks. We felt the need for "damage mitigation after intrusion" rather than just "preventing intrusion." By installing our product at the exit, we automatically block C2 communications. We established procedures to identify and isolate the terminal of the source IP through notifications. We built an operation to report monthly to management and connect it to improvements. 【Case Overview】 ■ Challenge: Difficult to manage updates completely due to factory equipment networks ■ Solution: Established procedures to identify and isolate the terminal of the source IP ■ Effects: - Preparedness for information exfiltration after intrusion was enhanced, leading to risk reduction - Initial responses were determined based on notifications, making it less likely for responses to become dependent on individuals - Reports provided an understanding of the current situation, highlighting areas that should be prioritized for strengthening *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Introduction Case] Trading Company/Trading Company and Wholesale

Examples of exit strategies to meet security requirements as a business partner or contractor!

We would like to introduce a case where the export security solution "DDHBOX" was implemented for a trading company. As the verification of supply chain measures increased for business partners and contractors, the environment became complex with multiple locations, remote work, and VPNs. It was also a challenge for the IT department to monitor 24/7 with a small team. Our product was implemented at the headquarters' exit to block unauthorized communications to the outside. We established an operation that consolidates notifications to a primary contact point and issues isolation instructions to locations when necessary. Monthly reports are generated to provide materials for external explanations. 【Case Overview】 ■ Challenge: Complex communication routes with multiple locations, remote work, and VPNs ■ Solution: Consolidating notifications to a primary contact point and issuing isolation instructions to locations when necessary ■ Effects - We were able to demonstrate "blocking external communications" during checks from business partners. - We were able to streamline operations to be manageable with a small team. - Including support/insurance in case of emergencies made it easier to get approvals. *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Introduction Case] CAD/CAM Contracted/CAD/CAM

Block C2 communications that could lead to the exfiltration of design data! Strengthen the ability to respond to security demands from business partners.

We would like to introduce a case study of a company engaged in CAD/CAM outsourcing that implemented the exit strategy security solution "DDHBOX." Handling customer design data makes information leakage critical, and submitting a checklist from mid-sized manufacturers has become mandatory. While there was a desire to invest in security, the lack of personnel available for operations was also a challenge. Our product was installed at the network exit to automatically block C2 communications. Upon receiving a notification, we defined the procedure of "isolation of the terminal → investigation support if necessary," and established a system to utilize monthly reports for customer explanations and internal management. 【Case Overview】 ■ Challenge: Desire to invest in security but lack of personnel for operations ■ Solution: Utilize monthly reports for customer explanations and internal management ■ Effects: - The basis for checklist responses was organized, leading to continued outsourcing - The operations became lighter, allowing for continued measures even with shared duties - The initial response and support system in case of an incident became clear *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[DDHBOX Case Study] Automotive Parts Manufacturer / Automotive and Transportation Equipment

Added exit strategies for industries with strict supply chain demands! Mitigating risks of platformization and information leakage.

We would like to introduce a case where the exit strategy security "DDHBOX" was implemented at an automotive parts manufacturer. As security requirements from complete vehicle manufacturers have become increasingly stringent year by year, although UTM/antivirus measures were already in place, the "external communication blockage after intrusion" was weak, and the environment had many entry points such as factories, offices, and partner companies. By implementing our product at the exit, C2 communication is automatically blocked. Notifications trigger the isolation of target devices and standardize initial responses, ensuring ongoing operations with regular monthly reports on the status of countermeasures. [Case Overview] ■ Challenge: Although UTM/antivirus measures are in place, "external communication blockage after intrusion" is weak. ■ Solution: Standardization of target device isolation and initial response triggered by notifications. ■ Effects: - Ability to present "exit strategies" during client checks, facilitating smooth audit responses. - Increased materials for explaining the risk of being used as a stepping stone, providing reassurance for continued transactions. - Operations centered around automatic blocking, reducing the burden on the field. *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
Prev 1 Next
  • 高品質×短納期 アキツなら金型費不要 0円 1個から対応可能 試作・小ロット 最短当日出荷 3Dデータ対応 ゴム切削加工はお任せください!
  • 展示会に出展したいけど準備が大変 展示会の情報をまとめて知りたい そんな展示会のお悩み 展サポで解決! ブース装飾で実績豊富 展示会情報を多数掲載 出展前~後まで支援
    • Contact this company

      Inquiry Form

    Products

    • Search for Products

    Company

    • Search for Companies

    Special Features

    • Special Features

    Ranking

    • Overall Products Ranking
    • Overall Company Ranking

    support

    • site map
    IPROS
    • privacy policy Regarding external transmission of information
    • terms of service
    • About Us
    • Careers
    • Advertising
    COPYRIGHT © 2001-2026 IPROS CORPORATION ALL RIGHTS RESERVED.
    Please note that the English text on this page is automatically translated and may contain inaccuracies.