It is impossible to prevent intrusion 100%. Therefore, we stop it at the exit.
Modern cyber attacks have become sophisticated, making it impossible to prevent 100% of intrusions with just entry measures. Once infected, confidential data can be exfiltrated to the attacker's server (C2 server), leading to significant business losses and a loss of social credibility. DDHBOX is a dedicated appliance that fills the gaps in traditional "entry measures" with "exit measures." Utilizing the top-tier threat intelligence list from JSOC (LAC Co., Ltd.), it automatically detects and blocks unauthorized communications to attackers 24/7, preventing information leaks at the source. Its greatest feature is the easy installation that requires simply placing it on the network. There is no need for software installation or configuration changes on individual PCs. Additionally, to prepare for unforeseen circumstances, a cyber insurance policy of up to 3 million yen is included as standard. This covers investigation and recovery costs, with experts providing one-stop support. DDHBOX addresses the challenges faced by small and medium-sized enterprises, such as "lack of expertise" and "limited budgets," offering maximum defense and peace of mind with minimal operational burden. It achieves a "multi-layered defense" encompassing entry, internal, and exit measures, ensuring the protection of your company's digital assets.
Inquire About This Product
basic information
■Provisioning Type: Hardware Appliance (Bridge Connection) ■Target: All industries (especially small and medium-sized enterprises and locations without dedicated security personnel) ■Supported Network: 10/100/1000BASE-T (depending on the plan) ■Main Features: - Automatic blocking of unauthorized communication to C2 servers (attacker command servers) - Utilization of the latest threat intelligence (JLIST) provided by JSOC (Rack Corporation) - Automatic blacklist updates more than once a day - Physical bypass function (maintains communication even in case of failure or power outage) - Alert notification function (confirmation on management screen and immediate email notifications) ■Additional Services: - Standard cyber insurance included (up to 3 million yen annually) - Covers costs for forensic investigation, recovery, consulting, etc. ■Operational Concept: Strengthening exit measures based on the premise of "being breached." No PC operation or configuration changes are required. By simply installing it at the exit of the internal LAN, it protects all internal devices, including PCs, multifunction printers, servers, and IoT devices. It physically prevents the "data exfiltration" process from advanced targeted attacks and ransomware that existing firewalls and UTMs cannot fully block.
Price information
Basic usage fee: From 30,000 yen per month (for Plan 10, estimated for a 7-year lease) *The above includes all initial installation costs, maintenance fees, and cyber insurance premiums. *The monthly fee varies depending on the number of PCs connected and the traffic volume (Plan 10 to 1000). For a detailed estimate, we will present the optimal plan after a hearing.
Delivery Time
※The shortest time is approximately 1 to 2 weeks. It may vary depending on the stock status, your preferred plan, and the confirmation of the local network environment (such as VLAN settings and the presence of proxy configurations). We provide smooth support from equipment delivery to installation and connectivity verification, and we can respond nationwide.
Applications/Examples of results
【Purpose】 - Ransomware countermeasures: Block remote communication after intrusion to prevent damage expansion and data encryption. - Prevention of information leakage: Automatically block the outflow of confidential data to C2 servers at the perimeter. - Protection of OA equipment/IoT: Monitor unauthorized communication from printers and surveillance cameras that cannot have software installed. - Completion of multi-layered defense: Improve security levels by reinforcing the "exit" in addition to existing firewalls/UTMs. - Compensation in emergencies: Significantly reduce investigation and recovery costs in the event of an incident through standard cyber insurance. 【Achievements】 - Manufacturing industry: Detected and blocked external outflow of design data for intellectual property protection. Alerts were detected in 1 out of 4 companies. - Medical and nursing care: Implemented for electronic medical record protection and BCP measures. Achieved automatic operation even in the absence of specialized staff. - Professional services and management departments: Adopted to ensure reliability in managing clients' confidential information and hedge risks through insurance coverage.
catalog(1)
Download All CatalogsCompany information
Our company is a professional firm that provides services and support related to video distribution. We can accommodate a wide range of needs, from short-term projects involving a single video or a single day, to large-scale and long-term video distribution businesses. Whether you want to easily obtain an original video distribution system right away, or you are looking for a partner who can provide one-stop consultation on planning and features, please feel free to contact us.


![[Data] Secure Internet Gateway](https://image.mono.ipros.com/public/product/image/015/2000615527/IPROS55993140493579679394.jpeg?w=280&h=280)
![[Security Implementation Case] Kashiwazaki City, Niigata Prefecture](https://image.mono.ipros.com/public/product/image/2055128/IPROS3592194868351063839.png?w=280&h=280)

