Fujitsu's Security Technology Based on Practical Knowledge

Information and communications technology (ICT) is leveraged in wider applications today, and enterprises are faced with an ever-growing need to protect themselves against cyber-attacks, which continue each day to become technically more sophisticated. Measures against these attacks should aim to no...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Fujitsu scientific & technical journal 2015-04, Vol.51 (2), p.92-98
Hauptverfasser: Kurita, Takayoshi, Masuno, Michio, Wataki, Atsushi
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Information and communications technology (ICT) is leveraged in wider applications today, and enterprises are faced with an ever-growing need to protect themselves against cyber-attacks, which continue each day to become technically more sophisticated. Measures against these attacks should aim to not only prevent malicious intrusions, but also implement possible countermeasures in case such intrusions take place. It is crucial to respond to a security breach quickly, and the response time significantly impacts security risks such as those relating to data leakage and network contamination. Fujitsu has developed a software suite, FUJITSU Software Systemwalker Security Control (SSC), which follows a preprogrammed operation process and navigates through automated responses against cyber-attacks. This product has already been launched on the market. It helps enterprises to reduce the costs of process programming and actual security operation, and it can automate operation process to enhance flawless security operations by eliminating human error. Fujitsu has integrated its operation management technology with response scenarios developed through the company's practical knowledge. This paper describes a software product with built-in operational processes against standard cyberattacks based on this technology. It also outlines its features that significantly reduce the response time by automating a series of actions upon detecting malware (network shut-down, identification of infected terminals, response alert to operators, etc.).
ISSN:0016-2523