News Feed Item

Fujitsu Organizes Security Products and Services under New FUJITSU Security Initiative

Opening of the new Security Initiative Center and other improved security measures aim to provide greater safety and security to customers and society

Tokyo, Jan 20, 2014 - (JCN Newswire) - Fujitsu today announced that it has organized its security-related products and services to bolster ICT safety and security for its customers and society into its new FUJITSU Security Initiative. This newly organized collection of products and services will initially only be available in Japan but will roll out globally in stages.

With the FUJITSU Security Initiative, Fujitsu will provide integrated security support to customers by combining the advanced products and services it has been offering with its expertise in building and executing security measures as well as education and training for staff that was developed for its own operations. Fujitsu will also establish the new Security Initiative Center staffed with security experts. Through a lifecycle consisting of services for customers' security environments, from threat identification and consideration of appropriate countermeasures, to building and operating solutions, Fujitsu will provide support to maintain constant security against increasingly sophisticated cyber-attacks.

Through its FUJITSU Security Initiative, in cooperation with security vendors and other external organizations around the world, Fujitsu will deliver a comprehensive package of security products and services for the safety and security of its customers and society as a whole.

With the spread of cloud computing and smart devices, ICT is used in an increasingly wide range of environments. At the same time, however, cyber-attacks are becoming increasingly sophisticated. In creating countermeasures against such attacks, making ICT both easy to use and secure is a significant challenge.

Fujitsu has continuously been developing and providing security-related products and services. Through appropriate countermeasures and operations, Fujitsu, which is comprised of approximately 300 companies worldwide, currently deals with several hundred million individual cyber-attacks each day on its own Intranet. In order to apply this expertise to the security measures of its customers and deliver integrated support, including enhanced systems and operations as well as education and training of a company's personnel, Fujitsu has organized its line of products and services into the new FUJITSU Security Initiative. It is also establishing the Security Initiative Center to provide a one-stop shop of support functions for constantly maintaining the optimal level of customer security environments.

About the FUJITSU Security Initiative

Fujitsu has organized all of the products and services that support ICT safety and security into the FUJITSU Security Initiative to provide a solid foundation for innovation for its customers and society as a whole. The company will bring together the most advanced solutions from Fujitsu and other companies from around the world for the integrated offering of optimized combinations and operational services to customers.

1. Offerings (upgraded)

In addition to each offering within the existing SafetyValue safety and security solution, Fujitsu now provides a one-stop shop for security measures, operations, and education / training based on a model that can be tailored to the scale of the customer's business environment, social responsibility, and ICT infrastructure.

2. Security consulting (upgraded)

By adding CSIRT(1) configuration-support service to Information Security Support Consulting, Fujitsu is expanding its support for cyber-attack countermeasures to customers. Based on the company's own CSIRT-compliant Fujitsu Cloud CERT, which protects cloud services, this provides a system and set of rules for responding to security incidents, and strengthens customers' ability to function as an organization.

3. Security operations (upgraded)

Through information sharing carried out by Fujitsu Cloud CERT and the internal information system department, threats and vulnerabilities can be quickly discovered and their impact can be analyzed. This information sharing has resulted in improvements to the Security Optimization Monitoring Service. Monitoring and operating rules will change depending on the assessment and analysis, and will provide a complete service that includes a comprehensive situational assessment from attack monitoring and local countermeasure support, all in order to take appropriate action against new threats, such as constantly evolving cyber-attacks.

4. Education & training program (new)

Building on the training expertise that the company has cultivated in-house, Fujitsu will be offering the Cyber Security Training Course. The service is aimed at business managers, incident managers, security experts, and system developers, with education and training in the respective skills required for each of these roles. Classes will use a "cyber range(2)" as a training tool to help people learn methods for diagnosing vulnerabilities and understanding how malware works.

About the New Security Initiative Center

The Security Initiative Center is being created to provide continuous support to customers by building and operating secure environments for them. This will provide a Cyber Security One-Stop Shop, offering Cyber Security Workshops, Design & Construction Validation, and Assessment & Analysis of Current Threats & Vulnerabilities. By making this available to customers, their security will be continuously updated and they will be provided with support in the form of optimized security countermeasures in the face ever-evolving cyber-attacks.

1. Cyber Security One-Stop Shop

Security experts will use Fujitsu's own methods to develop measures based on the customer's current situation and assist with drawing up a roadmap. Fujitsu will also assess the feasibility of optimized operation when developing countermeasures, as well as taking the lead in validating the content of the countermeasures.

2. Design & Construction Validation

By constructing a system in the cyber range that is similar to customer environments, Fujitsu can assess the design of proposed security measures, validate the content of the design and verify functional excesses and deficiencies.

3. Assessment & Analysis of Current Threats & Vulnerabilities

Working together with Fujitsu Cloud CERT and the internal information system department, threats and vulnerabilities can be quickly discovered and assessed, and their impact analyzed. The assessment and analysis of the results can be shared with the operation service, enabling countermeasures to be prioritized and reflected in the operational policy with the aim of minimizing risk.

About the New Center

The Center has been established to provide customer workshops on security upgrades and to carry out assessments and education & training.

Name: Security Initiative Center
Location: Tokyo
Facilities: Conference rooms, cyber range, hands-on demos, testing equipment (servers, storage, networking), etc.
Pricing and Availability
Pricing and Availability Service Name Pricing (Excl. Tax) Availability
Consulting Support for Enhanced Information Security By individual quote

(Reference price)
Support for Building CSIRT: from 1 million yen Already available
Security Optimization Monitoring Service By individual quote Already available
Cyber Security Training Course From 34,000 yen per course Fees for training for individual companies by individual quote April 2014

Endorsements (in alphabetical order)

Blue Coat Systems Inc.

Security has become a high priority for organizations that are embracing new technologies that drive the business while contending with a fast-growing wave of sophisticated, targeted attacks. Fujitsu's business strategy in the security market is aligned with the new market requirements created by these dual forces. Fujitsu and Blue Coat have a long-standing partnership of delivering advanced security technology, and Fujitsu's new direction provides an excellent opportunity for us to extend our relationship and drive greater mutual success moving forward.

Marc Andrews, senior vice president of worldwide field operations at Blue Coat Systems

Check Point Software Technologies

We at Check Point look forward to the continued success of our valued 10 year partnership with Fujitsu. Our support of this new security initiative with Fujitsu ICT and participation in the new Offering Center underscores a joint commitment to our partners and customers. Together, we will continue to provide the most advance network security solutions to protect our customers from a constantly evolving threat landscape.

Amnon Bar-Lev, President, Check Point Software Technologies

FireEye, Inc.

FireEye welcomes the security initiative of Fujitsu. FireEye is the leading provider of real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks using continuous protection by unique virtual machine technology. The new collaboration between Fujitsu and FireEye will set a new standard of security integration bringing higher security levels to customers.

David DeWalt, Chairman of the Board and CEO, FireEye, Inc.


The opening of the new Fujitsu Security Initiative center will help structure and maintain the security environment for our customers who are dealing with the challenge of addressing today's advanced threats. The combination of Fujitsu's Security Initiative services and operations with our leading security platform will deliver solutions that help secure our customer's businesses as we continue our global partnership.

Gavin Struthers, Senior Vice President of Worldwide Channel Operations, McAfee

Palo Alto Networks

Palo Alto Networks gratefully welcome the new effort from Fujitsu Limited. Our security platform safely enables business operations and delivers protection based on what matters most in today's dynamic computing environments: applications, users, and content. We will enhance the cooperation with Fujitsu and provide security technology to contribute to the further development of customers' business.

Morihiro Kinjo, President, Palo Alto Networks G.K.

Qualys, Inc.

Qualys, Inc. welcome this new approach from Fujitsu. We have leading vulnerability management technology, and have offered various products based on it. We have been cooperating in the security business for years, and have supported customer's security with Fujitsu. We believe it is possible to contribute further to the progress of our customers business' via this approach.

Philippe Courtot, Chairman & CEO, Qualys, Inc.

Symantec Corporation

We would like to congratulate Fujitsu on the opening of their security center in Japan. The changing threat landscape and the sophistication of attacks have made information security and its availability critical success factor for companies. And to achieve this tighter integration and partnership between private and public sector is extremely important.

As the global leader committed to making the world a safer place by protecting and managing people's information, Symantec is excited about working closely with Fujitsu to enable businesses to focus on achieving their goals without worrying about data breach and loss.

Hiroaki Kawamura, President, Symantec Japan Inc.

Trend Micro Incorporated

Trend Micro welcomes the establishment of Fujitsu's new security center. It order to counter cyber threats, which evolve on a daily basis, a thorough understanding of cyber security is essential. Based on information obtained from recent threat analysis, Trend Micro has been offering advanced solutions to its customers. Through this initiative, we have accelerated our cooperation with Fujitsu, enabling us to develop and provide solutions that meet the needs of our customers' environments.

Akihiko Omikawa, Executive Vice President, Trend Micro Incorporated


(1) CSIRT:
Computer Security Incident Response Team. As organization that responds to incidents relating to computer security.
(2) Cyber Range:
A hardware- and software-based virtual environment for practicing cyber attacks and defenses against such attacks.

About Fujitsu Limited

Fujitsu is the leading Japanese information and communication technology (ICT) company offering a full range of technology products, solutions and services. Approximately 170,000 Fujitsu people support customers in more than 100 countries. We use our experience and the power of ICT to shape the future of society with our customers. Fujitsu Limited (TSE: 6702) reported consolidated revenues of 4.4 trillion yen (US$47 billion) for the fiscal year ended March 31, 2013 For more information, please see www.fujitsu.com.

Source: Fujitsu Limited

Fujitsu Limited
Public and Investor Relations

Copyright 2014 JCN Newswire. All rights reserved. www.japancorp.net

More Stories By JCN Newswire

Copyright 2008 JCN Newswire. All rights reserved. Republication or redistribution of JCN Newswire content is expressly prohibited without the prior written consent of JCN Newswire. JCN Newswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 C...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory? In her Day 2 Keynote at @DevOpsSummit at 21st Cloud Expo, Aruna Ravichandran, VP, DevOps Solutions Marketing, CA Technologies, was jo...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Evan Kirstel is an internationally recognized thought leader and social media influencer in IoT (#1 in 2017), Cloud, Data Security (2016), Health Tech (#9 in 2017), Digital Health (#6 in 2016), B2B Marketing (#5 in 2015), AI, Smart Home, Digital (2017), IIoT (#1 in 2017) and Telecom/Wireless/5G. His connections are a "Who's Who" in these technologies, He is in the top 10 most mentioned/re-tweeted by CMOs and CIOs (2016) and have been recently named 5th most influential B2B marketeer in the US. H...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of bus...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...