Return to Events
IIJ Launches "IIJ Unified Security Solution" for Quickly Detecting Cyberattacks
TOKYO-July 7, 2015-Internet Initiative Japan Inc. (IIJ, NASDAQ: IIJI, TSE1: 3774), one of Japan's leading Internet access and comprehensive network solutions providers, today announced that it has begun offering "IIJ Unified Security Solution" to counter cyberattacks, which are growing more sophisticated and advanced every day. The solution collects log data from a variety of security devices and performs correlation analysis on these data for rapid attack detection.
Cyberattacks on companies are becoming more complex: Even if a company has implemented "multi-layered" security measures at points such as its corporate network, Internet gateway, and client PCs, it will face increasing numbers of attacks that are difficult to defend against with individual countermeasures. To prevent information leaks and other incidents, it has become essential to detect threats at an early stage and then respond to them rapidly and precisely. Thus, IIJ has partnered with Symantec Japan Inc. (Symantec) to offer the IIJ Unified Security Solution, which provides integrated monitoring and analysis of multiple devices to discover previously hard-to-detect threats quickly and to enable customers to take measures against such threats.
The following is an overview of the solution:
Discovers security incidents quickly through correlation analysis of logs
The solution collects transmission logs from all the customer's networking devices—routers, switches, firewalls, and so forth-and conducts correlative analyses of all the logs. It then compares the results against the latest threat data from the Symantec Global Intelligence Network-the world's largest. Expert cyber security analysts are busy 24 hours a day, 365 days a year, analyzing data, monitoring warning signs that incidents will occur, and reporting accurate incident alerts, free of false positives. Detecting attacks that would have been difficult to do so with individual security measures on individual devices early, at the warning-sign stage, enables customers to discover hidden threats and prevent security incidents.
Provides comprehensive operational support at a one-stop shop
IIJ's expert engineers offer everything from deployment consulting to design, implementation, and operations at a one-stop shop. IIJ has a wealth of operational experience from handling network operations and security measures for numerous companies over many years. Using this experience, IIJ offers a highly reliable support system that reports incidents to customers immediately after they have occurred and that provides emergency responses tailored to the customer's environment.
Offers the optimal investment in assetless security measures
IIJ builds the system infrastructure for transmission log collection and analysis in its cloud computing and also operates, monitors, and maintains it, as well performing other functions relating to the infrastructure. Customers can deploy the solution without any new capital spending on their part. In addition, because the solution integrates security measures that were previously implemented by individual device, it improves operational efficiency and can be used to optimize security-related spending.
IIJ will continue to leverage its expertise which has been accumulated by operating comprehensive security services for everything from networks to applications to offer its customers optimal security services.