|By JCN Newswire||
|May 7, 2014 12:23 AM EDT||
Tokyo, May 7, 2014 - (JCN Newswire) - Fujitsu today announced the availability of Japan's first software to automate detection of cyber attacks and response. The software, FUJITSU Software Systemwalker Security Control, dramatically shortens the initial response time after malware has been detected to prevent damage from spreading. Also being offered is FUJITSU Security Solution Information Security Enhancement Support Consulting, which are services designed to improve the security of control systems. Both are part of the FUJITSU Security Initiative, a systematized suite of products and services that support safe and secure ICT for customers and society, with FUJITSU Software Systemwalker Security Control planned to be rolled out to other markets outside of Japan later in Fiscal 2014.
Systemwalker Security Control automates what has previously been a manual process of responding to cyber attacks, dramatically shortening the response time and limiting the extent of the attack. In Fujitsu's own experience, this product has cut initial response times by roughly 97%.
There are two services being offered as a part of Information Security Enhancement Support Consulting. One is the identification of security risks, and the other is training services for establishing security policies. Both are aimed at strengthening the security of control systems.
While working with outside security vendors and organizations, Fujitsu will continue to enhance its comprehensive security products and services based on the FUJITSU Security Initiative to contribute to safety and security for customers and society at large.
As ICT is used more widely, companies are being challenged to respond to increasingly sophisticated and damaging cyber attacks. These responses require both preventing intrusion in the first place and reacting quickly and effectively to those intrusions that succeed, as that will largely determine the extent of privacy breaches and attendant problems. In the past, measures taken after malware had been detected included determining the risk level of the attack, identifying the vulnerable terminal and requesting the responder to take action. Fujitsu therefore knew it was necessary to have a process that used automation to respond swiftly and appropriately. Moreover, automating a response process would also enable action to be taken with limited resources.
Cyber attacks do not stop at information systems; their scope has expanded to the control systems essential to infrastructure and that are used at manufacturing facilities. Given the deep concern that control systems infected by malware will cause machinery or entire systems to stop work or break down, Fujitsu recognized the need to strengthen the security management of these systems.
Product & Service Overview
1. FUJITSU Software Systemwalker Security Control (new)
1.Automates operational processes for fast initial response
Based on a process Fujitsu developed in-house, the steps that previously were performed manually after a malware infection had been detected (severing network connections, identifying the infected device, tasking a responder), were automated to greatly reduce initial-response times. This offers more time for a quick and appropriate initial response, which enables risk to be reduced.
2.Knowhow based on internal practices is continually applied
Fujitsu continually updates operational scenarios so as to maintain a constant level of security for its customers in the face of threats from increasingly sophisticated cyber attacks.
2. FUJITSU Security Solution Information Security Enhancement Support Consulting (updated)
Information Security Enhancement Support Consulting adds two new services to strengthen control systems.
1.Control-system security assessment
This includes an assessment of the control systems used in production facilities, following the control-system security-management standard IEC62443-2-1, identification of inherent security risks in the control-system environment, and proposals for remediation.
2.Control-system security-policy development support
This provides support tailored to each customer's requirements in developing a security policy that makes clear the basic policy and standards for countermeasures in securing control systems, in order to establish a security management system for control systems.
About Fujitsu Limited
Fujitsu is the leading Japanese information and communication technology (ICT) company offering a full range of technology products, solutions and services. Approximately 170,000 Fujitsu people support customers in more than 100 countries. We use our experience and the power of ICT to shape the future of society with our customers. Fujitsu Limited (TSE: 6702) reported consolidated revenues of 4.4 trillion yen (US$47 billion) for the fiscal year ended March 31, 2013 For more information, please see www.fujitsu.com.
Source: Fujitsu Limited
Fujitsu Limited Public and Investor Relations www.fujitsu.com/global/news/contacts/ +81-3-3215-5259
Copyright 2014 JCN Newswire. All rights reserved. www.japancorp.net
The consumption economy is here and so are cloud applications and solutions that offer more than subscription and flat fee models and at the same time are available on a pure consumption model, which not only reduces IT spend but also lowers infrastructure costs, and offers ease of use and availability. In their session at 15th Cloud Expo, Ermanno Bonifazi, CEO & Founder of Solgenia, and Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia, discussed this shifting dynamic with an ...
May. 26, 2015 02:00 AM EDT Reads: 3,093
As enterprises engage with Big Data technologies to develop applications needed to meet operational demands, new computation fabrics are continually being introduced. To leverage these new innovations, organizations are sacrificing market opportunities to gain expertise in learning new systems. In his session at Big Data Expo, Supreet Oberoi, Vice President of Field Engineering at Concurrent, Inc., discussed how to leverage existing infrastructure and investments and future-proof them against e...
May. 26, 2015 02:00 AM EDT Reads: 2,980
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackI...
May. 26, 2015 01:00 AM EDT Reads: 4,364
Once the decision has been made to move part or all of a workload to the cloud, a methodology for selecting that workload needs to be established. How do you move to the cloud? What does the discovery, assessment and planning look like? What workloads make sense? Which cloud model makes sense for each workload? What are the considerations for how to select the right cloud model? And how does that fit in with the overall IT transformation?
May. 26, 2015 12:00 AM EDT Reads: 4,165
The recent trends like cloud computing, social, mobile and Internet of Things are forcing enterprises to modernize in order to compete in the competitive globalized markets. However, enterprises are approaching newer technologies with a more silo-ed way, gaining only sub optimal benefits. The Modern Enterprise model is presented as a newer way to think of enterprise IT, which takes a more holistic approach to embracing modern technologies.
May. 25, 2015 11:00 PM EDT Reads: 5,905
For better or worse, DevOps has gone mainstream. All doubt was removed when IBM and HP threw up their respective DevOps microsites. Where are we on the hype cycle? It's hard to say for sure but there's a feeling we're heading for the "Peak of Inflated Expectations." What does this mean for the enterprise? Should they avoid DevOps? Definitely not. Should they be cautious though? Absolutely. The truth is that DevOps and the enterprise are at best strange bedfellows. The movement has its roots in t...
May. 25, 2015 10:00 PM EDT Reads: 6,198
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impac...
May. 25, 2015 09:00 PM EDT Reads: 4,734
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. 8th International Big Data Expo, co-located with 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. As advanced data storage, access and analytics technologies aimed at handling high-volume and/or fast moving data all move center stage, aided by the cloud computing bo...
May. 25, 2015 08:45 PM EDT Reads: 1,349
Every day we read jaw-dropping stats on the explosion of data. We allocate significant resources to harness and better understand it. We build businesses around it. But we’ve only just begun. For big payoffs in Big Data, CIOs are turning to cognitive computing. Cognitive computing’s ability to securely extract insights, understand natural language, and get smarter each time it’s used is the next, logical step for Big Data.
May. 25, 2015 08:00 PM EDT Reads: 1,858
The 4th International Internet of @ThingsExpo, co-located with the 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - announces that its Call for Papers is open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
May. 25, 2015 07:00 PM EDT Reads: 1,510
Enterprises are fast realizing the importance of integrating SaaS/Cloud applications, API and on-premises data and processes, to unleash hidden value. This webinar explores how managers can use a Microservice-centric approach to aggressively tackle the unexpected new integration challenges posed by proliferation of cloud, mobile, social and big data projects. Industry analyst and SOA expert Jason Bloomberg will strip away the hype from microservices, and clearly identify their advantages and d...
May. 25, 2015 07:00 PM EDT Reads: 1,311
There's no doubt that the Internet of Things is driving the next wave of innovation. Google has spent billions over the past few months vacuuming up companies that specialize in smart appliances and machine learning. Already, Philips light bulbs, Audi automobiles, and Samsung washers and dryers can communicate with and be controlled from mobile devices. To take advantage of the opportunities the Internet of Things brings to your business, you'll want to start preparing now.
May. 25, 2015 07:00 PM EDT Reads: 5,695
In a world of ever-accelerating business cycles and fast-changing client expectations, the cloud increasingly serves as a growth engine and a path to new business models. Dynamic clouds enable businesses to continuously reinvent themselves, adapting their business processes, their service and software delivery and their operations to achieve speed-to-market and quick response to customer feedback. As the cloud evolves, the industry has multiple competing cloud technologies, offering on-premises ...
May. 25, 2015 06:00 PM EDT Reads: 3,943
The 5th International DevOps Summit, co-located with 17th International Cloud Expo – being held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the...
May. 25, 2015 05:30 PM EDT Reads: 3,925
Over the years, a variety of methodologies have emerged in order to overcome the challenges related to project constraints. The successful use of each methodology seems highly context-dependent. However, communication seems to be the common denominator of the many challenges that project management methodologies intend to resolve. In this respect, Information and Communication Technologies (ICTs) can be viewed as powerful tools for managing projects. Few research papers have focused on the way...
May. 25, 2015 05:00 PM EDT Reads: 1,666