National Research Institute Collaboration: Rocket Works' Cloud-based WAF Aegis
Aegis Server Security
We detect and block cyber attacks on websites at a low cost. Equipped with an AI engine, it automatically responds to the latest attacks, eliminating the need for manual operation.
A cloud-based WAF "Aegis" developed by companies participating in a national project, overcoming the challenges of traditional WAFs. Achieving high security 24/7, 365 days a year with 【no construction or operation required】, 【low cost】, and 【no risk】. ■ No construction or operation required No construction or environmental changes are needed during installation. ■ Equipped with AI engine With an AI engine, it automatically responds quickly to new vulnerabilities and attack methods 24/7, 365 days a year. ■ No risk of speed delays or server downtime Unlike other products, there is no analysis engine placed on the communication path, eliminating the risk of speed delays or server downtime. ■ Low cost Since it is a flat-rate system rather than pay-per-use, you can use it with peace of mind. It can be used for as little as one month, making it suitable for campaign sites as well. ■ Plans with DDoS protection features available We also offer plans that include DDoS protection. ■ Monthly reports sent every month We create monthly reports summarizing cyber attacks on the target website, saving you the hassle of preparing reporting materials.
Inquire About This Product
basic information
"【Visualizing Cyber Attacks】Aegis (Cloud-based WAF) is currently offering a 1-month free trial" "Are we really experiencing cyber attacks?" "Does a low-cost WAF really work?" These are the top two inquiries we receive from our customers. To alleviate your concerns, we are currently running the "1-Month Free Trial Campaign" for Aegis. - IP address of the server to be maintained - Email address for defense proof reporting Once you provide us with these two points, Aegis, the "Cloud WAF + IPS," will be implemented for your company without any construction required. *Please note that the free cyber attack diagnosis does not constitute a contract, so feel free to apply.
Price range
P2
Delivery Time
P3
Applications/Examples of results
■Tokyo / Company J Based on the "Defense Proof Report," the system department holds a countermeasure meeting every month. We also share the same report with the outsourced system company. ■Osaka / Company H I appreciate that they are willing to consult on additional measures and equipment purchases. It is also helpful that they provide insights into industry trend services. ■Fukuoka / Company S I was pleased that the president came all the way to Kyushu for our contract consultation. Even with cloud services, it is still difficult to finalize contracts without face-to-face interaction. ■Tokyo / Company K Considering the "what if" scenarios, I wanted to ask a company strong in legal matters. The fact that Ogawahara Rokukawa International Comprehensive Law Office is in charge of legal affairs was a significant deciding factor. ■Tokyo / Company U The fixed-rate system made it easier to get approvals. I think it could be priced higher. ■Tokyo / Company I The "Defense Proof Report" is inexpensive at 20,000 yen. I feel that just this alone covers the costs. By visualizing the protection measures, my superior is also convinced.
Company information
Our company is engaged in research, development, and sales aimed at the practical application and standardization of quantum ICT technology, as well as the development and sales of cybersecurity services. We will focus on catching up with the rapid advancements in information and communication technology that were unimaginable in the past, and on refining security technologies that complement their convenience. Please feel free to contact us for the following requests: ● Support for enhancing website security ・Detection and blocking of cyber attacks on the target website ・Preparation of monthly reports summarizing cyber attacks on the target website ● Web security consulting ・Support for building websites that mitigate risks from cyber attacks ● Collaboration with external support organizations ・Introduction to companies that respond to security incidents