News & Events

Get up to date to our latest updates and new highlights information, such as news, press releases and our upcoming events.

news-events
  Return to Events

IIJ to Offer IIJ Secure Web Gateway Service to Optimize Security in Web Access Environment

dl button PDF [122 KB] 03 February 2009

TOKYO--February 3, 2009--Internet Initiative Japan Inc. (IIJ, NASDAQ: IIJI, TSE1: 3774), one of Japan's leading Internet access and comprehensive network solutions providers, today announced the launch of the IIJ Secure Web Gateway Service, a gateway service that integrates Web access security policy.

The IIJ Secure Web Gateway Service provides Web filtering, anti-virus, and log management/downloading features through a gateway server located at the IIJ data center. Below is a list of service highlights.

Web access policy optimization

This service integrates Web filtering, anti-virus protection, and log analysis features that enable customers to maintain Web access security at optimum levels.

Information leak prevention and compliance reinforcement

Web viewing activity within the company can be monitored through the log analysis feature, and productivity can be improved by blocking access to non-work-related websites (Web mail, BBS, etc.). This also raises employee awareness about security.

Respond to increased traffic and the latest threats without the burden of asset risk

The service is scalable from a few accounts to several tens of thousands of accounts to meet the needs of a wide range of enterprises. In addition, dedicated IIJ engineers quickly respond to each new threat as they evolve. The customer can avoid the asset risk involved with building an internal dedicated system whose features may become outdated or which is unable to handle traffic increases.

Reduced operational overhead costs through outsourced service

Redundant gateway servers are managed by dedicated IIJ engineers 24/7 to create a secure, safe Web access environment. This reduces the burden on the customer of complicated log administration and system recovery measures in the case of system failure.

As corporate Web use grows dramatically with the advent of cloud-computing services, Web access holds the threat of mal-ware infections, data leaks, personal Web surfing on company time, and the threat of civil suits in the event of unexpected incidents. As these concerns grow, increased Web security measures are called for from the point of view of risk management. At the same time, the construction and operation of systems that can handle the ever-evolving threats and continuously increasing traffic are costly, which is making it increasingly difficult for enterprises to protect themselves.

Used in conjunction with IIJ Secure MX Service-an enterprise-level integrated mail security service-customers can outsource the necessary security measures required on today's Internet and create a secure Internet environment.

IIJ Secure Web Gateway Service Outline

Main features

  • Web filtering
    Filtering is implemented using Digital Arts' i-FILTER (*1), which has a great track record across a wide range of categories. Web filtering helps to block Web-born threats as well as data leaks through bulletin boards, and Web mail.
  • Anti-virus
    Anti-virus protection is provided through a technology tie-up with Kaspersky Labs Japan (*2), whose unbeatable virus detection engine is one of the best in the industry and is recognized globally for its performance. This software will detect and disinfect viruses and spyware before they reach your internal network.
  • Log administration and downloading
    The log created in the filtering and virus checking process includes a time stamp, category, originating IP address and other information. A monthly report is generated as a PDF file that shows the effectiveness of these processes.

Optional feature (charged separately) (*3)

  • Proxy option
    IIJ-managed proxy equipment is available for use on the customer's network. Proxy equipment reduces the customer's operational burden and is monitored 24/7 so that the system can be restored quickly should a failure occur.
  • Bypass option
    IIJ-managed bypass equipment is available for use on the customer's network. This option provides a high level of security while minimizing changes in the customer's network by passing through HTTP requests only to the IIJ service equipment on the IIJ side.
  • Long-term log storage option
    Logs are stored on IIJ's highly reliable storage devices. Backups can be stored on secondary storage as well to accommodate digital forensics (*4).

(*1) iFILTER: Web filtering software provided by Digital Arts Inc., a leader in this field. Boasts highest number of category settings (94) and a Web filtering database of over 200 million pages, and provides defense against harmful sites using the ZBRAIN harmful site evaluation technology. In addition, there is a POST filtering feature that regulates what can be written to a bulletin board or Web mail interface. (http://www.daj.jp/)

(*2) Kaspersky Labs Japan: Boasts the industry's highest virus/spyware detection rate, short outbreak response time, and global experience installing antivirus products. Often receives high marks in testing by Independent third-party research institutes. (http://www.kaspersky.co.jp/)

(*3) More optional features are scheduled to be released.

(*4) Digital forensics: Preservation of digital information evidence used in investigating and prosecuting data leaks, unauthorized access, and other security breaches.

Products and Prices

There are three categories for each feature, and these are designed to meet a range of customer needs and network configurations. 
Estimates will be tailored to each customer because prices depend on the number of accounts and the features selected.

Features Category FV Category F Category V
Web filtering O O -
Antivirus detection O - O
Log administration and downloading O O O

If you have any further enquiries, please email us at: events@ap.iij.com.

skyline