Top Page | English | 简体中文 | 繁體中文 | 한국어 | 日本語
Friday, 12 May 2017, 10:49 HKT/SGT
Share:
    

Source: Fujitsu Ltd
Fujitsu Enhances Intranet and Endpoint Security by Expanding its Global Managed Security Service
High-speed forensic technology identifies in minutes damage done by targeted cyberattacks

TOKYO, May 12, 2017 - (JCN Newswire) - Fujitsu announces its high-speed forensic technology(1) to identify the extent of damage targeted cyberattacks cause to an organization's intranet. The new technology, developed by Fujitsu Laboratories Ltd. and to be made available in Japan from June 2017, will accelerate time required to identify damage, from several weeks with conventional technology to several tens of minutes.

Fujitsu will offer the new technology as a function added to its Fujitsu Security Solution Global Managed Security Service, which provides integrated lifecycle support to strengthen security resilience, mitigate risks and minimize damage of cyberattacks.

Fujitsu has also signed an agreement with US-based Dtex Systems to launch solutions in Japan that combine Fujitsu's services with Dtex Systems' advanced user behavior intelligence technology that looks at the ordinary behavior of users at endpoints(2) such as PCs, and then detects and analyzes behavior that suggests internal wrongdoing. The solutions will detect and analyze risks of internal impropriety that could lead to information leaks. These solutions will be made available and represent Dtex Systems' first collaboration in Japan.

Going forward, Fujitsu will continue to contribute to the creation of a networked society in which everyone can feel safe and at ease, and will support the business continuity of customers by further strengthening its Global Managed Security Service using cutting-edge security technology.

Background

The Cybersecurity Management Guidelines(3), published by Japan's Ministry for Economy, Trade and Industry and the Information-technology Promotion Agency (IPA), call for companies to take such steps as preparing an emergency response system if one is the victim of a cyberattack, and preparing a system for rapid disclosure after damage has been discovered. When subjected to a targeted cyberattack, it is important to prevent the damage from spreading by taking rapid initial countermeasures such as identifying where the attack has penetrated and removing attacked devices from the network, but identifying the extent of an attack on an intranet requires advanced technology and several weeks, making it difficult to rapidly determine attack status and disclose it.

In addition, intentional internal wrongdoing by someone related to an organization is one of the main causes of information leaks, alongside targeted cyberattacks, and companies also face issues in discovering this type of activity.

In order to resolve these issues, Fujitsu is offering functionality that can rapidly identify the extent of damage from a targeted cyberattack, and is expanding its Global Managed Security Service to detect the risk of internal impropriety through its collaboration with Dtex Systems. This will work to strengthen security on the boundaries between the internet and an intranet, and also within intranets and endpoints.

http://www.acnnewswire.com/topimg/Low_FujitsuIntranetFig1.jpg
Figure 1: Strengthened areas of the Global Managed Security Service

New Functionality to Rapidly Identify the Extent of Damage

A proprietary high-speed forensic technology developed by Fujitsu Laboratories enables the rapid determination of the extent of damage from an attack by detecting and analyzing only behaviors unique to targeted attacks from internet communications data. With this new functionality, the Global Managed Security Service monitors a customer's intranet 24 hours a day, 365 days a year from the Security Operation Center(4). When an external intrusion from a targeted attack is detected, Fujitsu's security experts determine the extent of the damage in several tens of minutes, using the high-speed forensic technology developed by Fujitsu Laboratories, enabling rapid reporting to the customer.

With this functionality, customers can rapidly grasp the infection pathway used by the malware sent by the attacker, and which devices are infected. This means they can not only prevent the spread of the infection by removing only infected devices from the network, enabling early restoration of the attacked network environment, but they can also take immediate countermeasures aimed at business continuity, minimizing the damage.

http://www.acnnewswire.com/topimg/Low_FujitsuIntranetFig2.jpg
Figure 2: New functions utilizing high-speed forensic technology

About the Collaboration with Dtex Systems

Dtex Systems provides technology that collects metadata(5) of users' ordinary behavior in business, such as usage status and communications with outside parties, from endpoints such as PCs, and uses machine learning to understand the pattern of action in ordinary times. With this technology, it is possible to detect and notify supervisors of actions deviating from ordinary activity patterns.

Fujitsu is now set to collaborate with Dtex Systems in its first deal in Japan to offer solutions. Fujitsu's security experts will analyze the risks of internal impropriety leading to intentional information leaks and other potential harm, supporting rapid countermeasures by customers.

Comment from Christy Wyatt, CEO of Dtex Systems

"Insider incidents represent a majority of data breaches globally, which makes understanding user behavior critical to preventing data loss. We are thrilled to partner with Fujitsu, a trusted industry leader, to offer comprehensive and scalable security solutions that provide deep, contextual understanding of user behavior in Japan."

Sales Targets

Sales of security-related products and services of 300 billion yen per year in fiscal 2019.

(1) Forensic technology
Technology that collects and analyzes logs kept on electronic devices such as PCs, providing clear evidence of unauthorized access and information leaks.
(2) Endpoint
A computer or information device connected to a wireless network or network device.
(3) Cybersecurity Management Guidelines
A document incorporating three principles managers should recognize, and ten instructions they should give their Chief Information Security Officers (CISO), in order for companies to promote cybersecurity countermeasures under the leadership of management. This was first formulated in December of 2015, and revised in December 2016.
(4) Security Operation Center
An organization that monitors and analyzes logs, such as from security products, network devices, and servers, and detects and notifies customers of cyberattacks.
(5) Metadata
Data (information) that provides information about other data.


About Fujitsu Ltd

Fujitsu is the leading Japanese information and communication technology (ICT) company, offering a full range of technology products, solutions, and services. Approximately 132,000 Fujitsu people support customers in more than 100 countries. We use our experience and the power of ICT to shape the future of society with our customers. For more information, please see www.fujitsu.com.

This release can be found at https://www.fujitsu.com/global/about/resources/news/press-releases/2019/.


Contact:
Fujitsu Limited
Public and Investor Relations
Tel: +81-3-3215-5259
URL: www.fujitsu.com/global/news/contacts/


May 12, 2017 10:49 HKT/SGT
Source: Fujitsu Ltd

Fujitsu Ltd (TSE: 6702)

Topic: Press release summary
Sectors: Enterprise IT, Security/Biometrics
http://www.acnnewswire.com
From the Asia Corporate News Network


Copyright © 2019 ACN Newswire. All rights reserved. A division of Asia Corporate News Network.


Multimedia
Figure 1: Strengthened areas of the Global Managed Security Service
View Image
 
Figure 2: New functions utilizing high-speed forensic technology
View Image
 
Fujitsu Ltd Links

http://www.fujitsu.com

https://plus.google.com/+Fujitsu

https://www.facebook.com/FujitsuJapan

https://twitter.com/Fujitsu_Global

https://www.youtube.com/user/FujitsuOfficial

https://www.linkedin.com/company/fujitsu/

Fujitsu Ltd
Aug 22, 2019 10:13 HKT/SGT
Fujitsu and Qualcomm Complete 5G Data Calls in Sub-6 GHz and mmWave Spectrum Bands
Aug 16, 2019 13:15 HKT/SGT
Fujitsu Develops AI Disaster Mitigation Technology to Predict River Flooding with Limited Data
Aug 9, 2019 10:27 HKT/SGT
Fujitsu Initiates Year-Round Recruitment
Aug 8, 2019 08:00 HKT/SGT
Fujitsu RunMyProcess Joins Google Cloud Partner Program
Aug 5, 2019 10:25 HKT/SGT
Fujitsu Launches Latest Version of its VPS Digital Production Preparation Tool, Supporting Improved Manufacturing Productivity
Aug 2, 2019 10:26 HKT/SGT
Fujitsu's Encryption Technology for Biometric Information Provides Safer Authentication in Open Environments
July 31, 2019 10:17 HKT/SGT
Fujitsu Delivers Complete Set of 5G Base Station Products to NTT DOCOMO for Commercial 5G Service
July 29, 2019 09:17 HKT/SGT
Fujitsu to Deliver Australia's Most Powerful Supercomputer to Help Solve Complex and Pressing Global Challenges
July 19, 2019 10:40 HKT/SGT
Fujitsu Harnesses Quantum-Inspired Digital Annealer Technology to Optimize Output Efficiency in Power Generation for Renewable Energy Devices
July 19, 2019 10:09 HKT/SGT
Fujitsu Completes Survey of Business Leaders across 9 Countries on the Global State of Digital Transformation
More news >>
 News Alerts
Copyright © 2019 ACN Newswire - Asia Corporate News Network
Home | About us | Services | Partners | Events | Login | Contact us | Privacy Policy | Terms of Use | RSS
US: +1 800 291 0906 | Beijing: +86 400 879 3881 | Hong Kong: +852 2217 2912 | Singapore: +65 6304 8926 | Tokyo: +81 3 6859 8575

Connect With us: