Responding to cyber attacks

In recent years, we have developed effective countermeasures based on our experience in dealing with cyberattacks, and are using them to protect our externally accessible servers and our customers' remote environments. We are also developing new products in this field, aiming for an UNBREAKABLE system. Regarding data protection in particular, we place a "SAFE OF DATA" for important data within the network and ensure protection.

SAFE OF DATA

Routers are no longer the rigid boundary between inside and outside, as they used to be.
Even when intruded by ransomware, etc., important data is fully protected and always maintained in a recoverable state.

○The SAFE can physically communicate only with the server within the network.
○Server → SAFE: Inaccessible
○SAFE → Server: Accessible. SAFE will get the backup from the server.
○Backups can be accessed by special operations during recovery.
○SAFE are not found or accessible after being invaded and scanned through the network
○Survive a ransomware attack

Remote access measures

The method of exposing router ports to allow remote access has become very dangerous. Exposed ports are visible to enemies when they scan the network.
We enhance security by:

○Our externally accessible servers accept connections from customer's servers.
Our public server has strict access restrictions, 24 hour packet logs are acquired and monitored.
○Customer's servers access our server at regular intervals. Disconnect immediately unless a remote connection is required for maintenance.
○When remote connection is required, we will reverse connect based on the connected route.
○Communication is encrypted, so even if it is tapped along the way, the contents of the data cannot be read.
○This scheme allows customers to receive maintenance safely.