News Feed Item

Fujitsu Cuts Response Times to Cyber Attacks by 97% with Japan's First Automated Detection and Process Software

Prevents spread of cyber attacks through Fujitsu's own in-house software that automates processes and cuts initial response time

Tokyo, May 7, 2014 - (JCN Newswire) - Fujitsu today announced the availability of Japan's first software to automate detection of cyber attacks and response. The software, FUJITSU Software Systemwalker Security Control, dramatically shortens the initial response time after malware has been detected to prevent damage from spreading. Also being offered is FUJITSU Security Solution Information Security Enhancement Support Consulting, which are services designed to improve the security of control systems. Both are part of the FUJITSU Security Initiative, a systematized suite of products and services that support safe and secure ICT for customers and society, with FUJITSU Software Systemwalker Security Control planned to be rolled out to other markets outside of Japan later in Fiscal 2014.

Systemwalker Security Control automates what has previously been a manual process of responding to cyber attacks, dramatically shortening the response time and limiting the extent of the attack. In Fujitsu's own experience, this product has cut initial response times by roughly 97%.

There are two services being offered as a part of Information Security Enhancement Support Consulting. One is the identification of security risks, and the other is training services for establishing security policies. Both are aimed at strengthening the security of control systems.

While working with outside security vendors and organizations, Fujitsu will continue to enhance its comprehensive security products and services based on the FUJITSU Security Initiative to contribute to safety and security for customers and society at large.


As ICT is used more widely, companies are being challenged to respond to increasingly sophisticated and damaging cyber attacks. These responses require both preventing intrusion in the first place and reacting quickly and effectively to those intrusions that succeed, as that will largely determine the extent of privacy breaches and attendant problems. In the past, measures taken after malware had been detected included determining the risk level of the attack, identifying the vulnerable terminal and requesting the responder to take action. Fujitsu therefore knew it was necessary to have a process that used automation to respond swiftly and appropriately. Moreover, automating a response process would also enable action to be taken with limited resources.

Cyber attacks do not stop at information systems; their scope has expanded to the control systems essential to infrastructure and that are used at manufacturing facilities. Given the deep concern that control systems infected by malware will cause machinery or entire systems to stop work or break down, Fujitsu recognized the need to strengthen the security management of these systems.

Product & Service Overview

1. FUJITSU Software Systemwalker Security Control (new)

1.Automates operational processes for fast initial response
Based on a process Fujitsu developed in-house, the steps that previously were performed manually after a malware infection had been detected (severing network connections, identifying the infected device, tasking a responder), were automated to greatly reduce initial-response times. This offers more time for a quick and appropriate initial response, which enables risk to be reduced.
2.Knowhow based on internal practices is continually applied
Fujitsu continually updates operational scenarios so as to maintain a constant level of security for its customers in the face of threats from increasingly sophisticated cyber attacks.

2. FUJITSU Security Solution Information Security Enhancement Support Consulting (updated)

Information Security Enhancement Support Consulting adds two new services to strengthen control systems.
1.Control-system security assessment
This includes an assessment of the control systems used in production facilities, following the control-system security-management standard IEC62443-2-1, identification of inherent security risks in the control-system environment, and proposals for remediation.
2.Control-system security-policy development support
This provides support tailored to each customer's requirements in developing a security policy that makes clear the basic policy and standards for countermeasures in securing control systems, in order to establish a security management system for control systems.

About Fujitsu Limited

Fujitsu is the leading Japanese information and communication technology (ICT) company offering a full range of technology products, solutions and services. Approximately 170,000 Fujitsu people support customers in more than 100 countries. We use our experience and the power of ICT to shape the future of society with our customers. Fujitsu Limited (TSE: 6702) reported consolidated revenues of 4.4 trillion yen (US$47 billion) for the fiscal year ended March 31, 2013 For more information, please see www.fujitsu.com.

Source: Fujitsu Limited

Fujitsu Limited
Public and Investor Relations

Copyright 2014 JCN Newswire. All rights reserved. www.japancorp.net

More Stories By JCN Newswire

Copyright 2008 JCN Newswire. All rights reserved. Republication or redistribution of JCN Newswire content is expressly prohibited without the prior written consent of JCN Newswire. JCN Newswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, will draw together recent research and lessons learned from emerging and established ...
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...
SYS-CON Events announced today that Enzu will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to focus on the core of their online busine...
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Established in 1998, Calsoft is a leading software product engineering Services Company specializing in Storage, Networking, Virtualization and Cloud business verticals. Calsoft provides End-to-End Product Development, Quality Assurance Sustenance, Solution Engineering and Professional Services expertise to assist customers in achieving their product development and business goals. The company's deep domain knowledge of Storage, Virtualization, Networking and Cloud verticals helps in delivering ...
SYS-CON Events announced today that Cloudbric, a leading website security provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Cloudbric is an elite full service website protection solution specifically designed for IT novices, entrepreneurs, and small and medium businesses. First launched in 2015, Cloudbric is based on the enterprise level Web Application Firewall by Penta Security Sys...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
In the next five to ten years, millions, if not billions of things will become smarter. This smartness goes beyond connected things in our homes like the fridge, thermostat and fancy lighting, and into heavily regulated industries including aerospace, pharmaceutical/medical devices and energy. “Smartness” will embed itself within individual products that are part of our daily lives. We will engage with smart products - learning from them, informing them, and communicating with them. Smart produc...
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
SYS-CON Events announced today that Coalfire will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Coalfire is the trusted leader in cybersecurity risk management and compliance services. Coalfire integrates advisory and technical assessments and recommendations to the corporate directors, executives, boards, and IT organizations for global brands and organizations in the technology, cloud, health...
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, will contrast how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He will show the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He will also have live demos of building immutable pipe...
SYS-CON Events announced today that Transparent Cloud Computing (T-Cloud) Consortium will exhibit at the 19th International Cloud Expo®, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The Transparent Cloud Computing Consortium (T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data proces...
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.