Centralized management of internal access to the server! A case where the quality and efficiency of access control have significantly improved.
We would like to introduce a case study of Internet Initiative Japan Inc., which has implemented the privileged ID access management tool "SecureCube Access Check." The company adopted this product in 2014 to integrate management of internal access to approximately 27,000 nodes of servers located on-premises and in a private cloud. This has achieved robust information security based on strict and flexible access control. 【Case Overview】 ■ Client: Internet Initiative Japan Inc. ■ Product Implemented: SecureCube Access Check ■ Implementation Effects - Complete digitization of access management - Significant improvement in the accuracy and efficiency of audit tasks *For more details, please refer to the PDF document or feel free to contact us.
Inquire About This Product
basic information
【Points】 - For hosting providers, access control to customer systems is a critical issue in information security. - Centralized management of internal access to servers totaling 27,000 nodes has improved work efficiency. - It can support an OS environment where 70% is occupied by Linux and UNIX, meeting sufficient conditions for log acquisition. *For more details, please refer to the PDF document or feel free to contact us.*
Price range
Delivery Time
Applications/Examples of results
For more details, please refer to the PDF document or feel free to contact us.
catalog(1)
Download All CatalogsCompany information
NRI Secure Technologies, as a specialized information security company of the Nomura Research Institute Group, has focused on continuously providing high-quality services and products since its establishment by accumulating not only technology but also knowledge and know-how, and by fostering world-class security personnel. Regardless of the era, we provide security services that empower companies to adapt to environmental changes, acting as a partner that leads our customers' challenges to success as professionals in information security, allowing them to concentrate on and develop their own businesses.