Top of Page
- Links to move inside this page.
-
- HOME
- Business
- Security
Security
Integrated Security
- IIJ Safous
- Advanced access control that outsmarts hackers is essential to stay protected from today’s sophisticated cyber threats. The IIJ Safous platform offers all the features you need, including ZTA, SOARaaS, and security assessment.
Network Security
- IIJ Secure Access Service
- IIJ Secure Access Service is a security framework that enables users or devices to securely access applications, data, and services on the cloud "whenever" and "wherever."
- IIJ DDoS Protection Service
- The IIJ DDoS Protection Service protects network systems from massive DDoS attacks designed to completely take you down.
- IIJ DDoS Protection Service/Edge
- IIJ DDoS Protection Service/Edge is a service where sensors are installed internally at the customer's company to constantly protect customer systems from DDoS attacks and targeted attacks. In addition to conventional DDoS mitigation functions, threat intelligence is used to block not only external attacks, but also malicious internal traffic. And, this service can be linked with the IIJ DDoS Protection Service to protect against large-scale DDoS attacks, too.
- IIJ Managed IPS/IDS Service
- The IIJ Managed IPS/IDS Service detects and blocks unauthorized access to your systems. Robust security through proactive defense against Internet threats.
- IIIJ CASB Solution
- The IIJ Cloud Access Security Broker (CASB) Solution helps prevent information leaks by providing a visualization of the cloud services used without permission (shadow IT) and the cloud services contracted for use by the company. Integrating this service with other IIJ services also helps control shadow IT issues. We provide full support of this solution from implementation through operations.
- IIJ C-SOC Service
- The IIJ C-SOC Service provides security monitoring and threat analysis of security logs collected from firewalls, other security devices, and your operations equipment 24 hours per day, 365 days per year to help keep environments secure.We beef up your security measures in ways that include suggesting countermeasures in response to incidents, and even changing the settings on IIJ-operated equipment.
Select from our three plans: Premium, Advanced, or Basic.
- IIJ Flex Mobility Service/ZTNA
- IIJ Flex Mobility Service/ZTNA is a remote access service that implements Zero Trust.
The service eliminates sluggish operation and constant disconnections, problems with conventional remote access, and provides features that implement Zero Trust, such as communication visualization, detailed policy settings, and access control.
The service also greatly supports applications that require real-time connection, such as Web meetings, conference calls, and virtual desktops.
- IIJ GIO Remote Access Service TypeA
- The IIJ GIO Remote Access Service TypeA provides highly reliable remote access to internal networks and IIJ services over the Internet from anywhere.
- IIJ Mobile Private Gateway Service
- The IIJ Mobile Private Gateway Service is a cloud-based gateway service that offers secure mobile communications with a closed network connection instead of with a mobile connection.
Mail Security
- IIJ Secure MX Service
- This is an integrated email security service that enhances email security in the cloud. You can implement one-stop security measures for receiving and sending emails, such as protection against threat email (e.g. Emotet) and protection against erroneous email transmissions.
- Microsoft 365 with IIJ
- Microsoft 365 with IIJ provides an extra layer of email security with Microsoft 365. With this service, you get Microsoft 365 at the normal price but with stronger security.
- IIJ Malware Analysis Solution
- With the IIJ Malware Analysis Solution, specialized analysts investigate and analyze unidentified samples provided by customers. Information on malware risk levels and recovery methods is then provided to help protect you against malware.
Web Security
- IIJ Secure Web Gateway Service
- The IIJ Secure Web Gateway Service is a cloud-based service that provides all necessary web security functions. With this service, you can improve business efficiency through optimized web security.
- Site Umpire Service
- Site Umpire Service is a URL filtering service that runs on a dedicated router. With one license and one router, you can control website access for all devices connected to the router.
- IIJ Malware Analysis Solution
- With the IIJ Malware Analysis Solution, specialized analysts investigate and analyze unidentified samples provided by customers. Information on malware risk levels and recovery methods is then provided to help protect you against malware.
- IIJ Change Detection and Recovery solution
- The IIJ Change Detection and Recovery solution detects website tampering threats accurately, and performs automatic recovery rapidly. This provides instantaneous detection and instantaneous recovery 24/7. We help customers operate safe and secure websites.
- IIJ Managed WAF Service
- The IIJ Managed WAF Service detects and protects against attacks that exploit various Web system vulnerabilities with a high-performance WAF engine. This cloud-based WAF service is operated by IIJ security engineers and can be deployed for a wide range of Web systems.
Endpoint
- IIJ Secure Endpoint Service
- The IIJ Secure Endpoint Service is a cloud-based system that defends against external threats and prevents internal information leaks. By utilizing a number of antivirus and IT asset management features that detect and isolate malware and track the path to infection, the operation that caused the infection can be countered to prevent recurrence. The "IT asset protection" feature provides safe backup to the cloud environment and recovery, as well as antivirus functionality. It ensures the continuity of business operations in emergency situations.
- IIJ Flex Resilience Service
- IIJ Flex Resilience Service allows you to selectively delete files on any device from anywhere and remotely perform an end-of-life device wipe in accordance with NIST 800-88.
ID Management and Authentication
- IIJ Directory Service for Microsoft
- IIJ Directory Service for Microsoft provides Active Directory (AD) as a cloud-based service.
Providing Active Directory with Azure AD Connect enables users to access both internal systems and cloud services using a single ID and password.
Furthermore, the cloud services can also support WSUS. Providing the systems essential for office IT as a service lessens the burden on information system administrators.
- IIJ ID Service
- The IIJ ID Service is a cloud-based ID management service (IDaaS) that enables single sign-on (SSO) to access multiple services. It also provides a powerful multi-factor authentication feature that can detect and prevent unauthorized logins.
- IIJ Identity Governance and Administration Service
- The IIJ Identity Governance and Administration Service is a service that automates ID management, starting with human resource events such as joining the company, transferring positions, and retiring.
It introduces a time-based concept not found in conventional ID management services. You can check various types of master information from any point in the past, present, or future.
- IIJ Identity & Access Management Solution
- We provide a wide variety of freely combinable features that are required for ID management, authentication, and authorization, such as ID inventory, ID life cycle management, single sign-on, authentication control based on the conditions of the end device in use, and multi-factor authentication. This enhances ID governance and authentication security.
Security Assessment / Consulting
- IIJ Security Audit Solution
- With the IIJ Security Audit Solution, an experienced security consultant learns the customer's business and system configurations to provide an optimal solution in accordance with the overall corporate security level.
- IIJ Vulnerability Management Solution with Tenable.io
- The IIJ Vulnerability Management Solution with Tenable.io is a solution that centralizes the management of vulnerability information on the cloud. This solution is based on an annual flat-rate fee, enabling vulnerability diagnosis to be performed any number of times. Users can improve system security without worrying about costs. Furthermore, we provide optional analysis in which highly experienced security analysts create diagnosis reports. We provide strong support to counteract customer vulnerabilities.
- IIJ IaaS Security Audit Solution
- The IIJ IaaS Security Audit Solution provides centralized management of multi-cloud systems under a unified policy and monitors whether there are vulnerable settings. This solution identifies potential risks by visualizing cloud environments that are prone to complexity.
- IIJ SaaS Security Audit Solution
- The IIJ SaaS Security Audit Solution centrally manages various SaaS environments and visualizes security risks. Detection rules for security incidents occurring worldwide are automatically registered. Security risks such as vulnerable settings and suspicious operations are quickly detected.
This solution uses the AppOmni service by AppOmni Inc.
- IIJ CSIRT Advisory Solution
- The IIJ CSIRT Advisory Solution is a packaged, fixed fee service that provides initial support in establishing CSIRT in your organization as well as ongoing support after implementation.
- IIJ Attack Surface Assessment Solution
- IIJ Attack Surface Assessment Solution visualizes intrusion points that can be at the origin of security breach incidents by remotely collecting and analyzing information about servers, network devices, IoT devices, and other assets exposed on the Internet. It discovers and evaluates IT assets of organizations that may become targets.
- IIJ Leaked Account Detection Solution
- IIJ Leaked Account Detection Solution provides investigation and advice for leaked accounts. It prevents the exploitation of account information and the commercialization of criminal activities, supporting the reduction of risks in customers' cloud usage.
End of the page.
Top of Page