|By JCN Newswire||
|May 7, 2014 12:23 AM EDT||
Tokyo, May 7, 2014 - (JCN Newswire) - Fujitsu today announced the availability of Japan's first software to automate detection of cyber attacks and response. The software, FUJITSU Software Systemwalker Security Control, dramatically shortens the initial response time after malware has been detected to prevent damage from spreading. Also being offered is FUJITSU Security Solution Information Security Enhancement Support Consulting, which are services designed to improve the security of control systems. Both are part of the FUJITSU Security Initiative, a systematized suite of products and services that support safe and secure ICT for customers and society, with FUJITSU Software Systemwalker Security Control planned to be rolled out to other markets outside of Japan later in Fiscal 2014.
Systemwalker Security Control automates what has previously been a manual process of responding to cyber attacks, dramatically shortening the response time and limiting the extent of the attack. In Fujitsu's own experience, this product has cut initial response times by roughly 97%.
There are two services being offered as a part of Information Security Enhancement Support Consulting. One is the identification of security risks, and the other is training services for establishing security policies. Both are aimed at strengthening the security of control systems.
While working with outside security vendors and organizations, Fujitsu will continue to enhance its comprehensive security products and services based on the FUJITSU Security Initiative to contribute to safety and security for customers and society at large.
As ICT is used more widely, companies are being challenged to respond to increasingly sophisticated and damaging cyber attacks. These responses require both preventing intrusion in the first place and reacting quickly and effectively to those intrusions that succeed, as that will largely determine the extent of privacy breaches and attendant problems. In the past, measures taken after malware had been detected included determining the risk level of the attack, identifying the vulnerable terminal and requesting the responder to take action. Fujitsu therefore knew it was necessary to have a process that used automation to respond swiftly and appropriately. Moreover, automating a response process would also enable action to be taken with limited resources.
Cyber attacks do not stop at information systems; their scope has expanded to the control systems essential to infrastructure and that are used at manufacturing facilities. Given the deep concern that control systems infected by malware will cause machinery or entire systems to stop work or break down, Fujitsu recognized the need to strengthen the security management of these systems.
Product & Service Overview
1. FUJITSU Software Systemwalker Security Control (new)
1.Automates operational processes for fast initial response
Based on a process Fujitsu developed in-house, the steps that previously were performed manually after a malware infection had been detected (severing network connections, identifying the infected device, tasking a responder), were automated to greatly reduce initial-response times. This offers more time for a quick and appropriate initial response, which enables risk to be reduced.
2.Knowhow based on internal practices is continually applied
Fujitsu continually updates operational scenarios so as to maintain a constant level of security for its customers in the face of threats from increasingly sophisticated cyber attacks.
2. FUJITSU Security Solution Information Security Enhancement Support Consulting (updated)
Information Security Enhancement Support Consulting adds two new services to strengthen control systems.
1.Control-system security assessment
This includes an assessment of the control systems used in production facilities, following the control-system security-management standard IEC62443-2-1, identification of inherent security risks in the control-system environment, and proposals for remediation.
2.Control-system security-policy development support
This provides support tailored to each customer's requirements in developing a security policy that makes clear the basic policy and standards for countermeasures in securing control systems, in order to establish a security management system for control systems.
About Fujitsu Limited
Fujitsu is the leading Japanese information and communication technology (ICT) company offering a full range of technology products, solutions and services. Approximately 170,000 Fujitsu people support customers in more than 100 countries. We use our experience and the power of ICT to shape the future of society with our customers. Fujitsu Limited (TSE: 6702) reported consolidated revenues of 4.4 trillion yen (US$47 billion) for the fiscal year ended March 31, 2013 For more information, please see www.fujitsu.com.
Source: Fujitsu Limited
Fujitsu Limited Public and Investor Relations www.fujitsu.com/global/news/contacts/ +81-3-3215-5259
Copyright 2014 JCN Newswire. All rights reserved. www.japancorp.net
SYS-CON Events announced today that WHOA.com, an ISO 27001 Certified secure cloud computing company, participated as “Bronze Sponsor” of SYS-CON's 16th International Cloud Expo® New York, which took place June 9-11, 2015, at the Javits Center in New York City, NY. WHOA.com is a leader in next-generation, ISO 27001 Certified secure cloud solutions. WHOA.com offers a comprehensive portfolio of best-in-class cloud services for business including Infrastructure as a Service (IaaS), Secure Cloud Desk...
Jul. 6, 2015 12:45 PM EDT Reads: 138
"What Dyn is able to do with our Internet performance and our Internet intelligence is give companies visibility into what is actually going on in that cloud," noted Corey Hamilton, Product Marketing Manager at Dyn, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 6, 2015 12:45 PM EDT Reads: 1,376
Jul. 6, 2015 12:45 PM EDT Reads: 2,050
Jul. 6, 2015 12:37 PM EDT
Jul. 6, 2015 12:30 PM EDT Reads: 1,407
Jul. 6, 2015 12:15 PM EDT Reads: 2,130
Jul. 6, 2015 12:15 PM EDT Reads: 2,019
Jul. 6, 2015 12:00 PM EDT Reads: 981
Jul. 6, 2015 11:45 AM EDT Reads: 392
Jul. 6, 2015 11:45 AM EDT Reads: 2,559
Jul. 6, 2015 11:30 AM EDT Reads: 1,667
Jul. 6, 2015 11:30 AM EDT Reads: 2,306
Jul. 6, 2015 11:15 AM EDT Reads: 1,701
Jul. 6, 2015 11:15 AM EDT Reads: 1,432
Jul. 6, 2015 11:15 AM EDT Reads: 1,608