SYS-CON MEDIA Authors: Liz McMillan, Carmen Gonzalez, Elizabeth White, Pat Romanski, Gary Arora

News Feed Item

Fujitsu Bolsters Global Managed Security Service for Comprehensive Defense against Diversifying Cyberattacks



Strengthening endpoint and cloud security and providing dark web threat analyses

TOKYO, May 9, 2018 - (JCN Newswire) - Fujitsu today announced that it is expanding its Fujitsu Security Solution Global Managed Security Service, which provides centralized lifecycle support, from cyberattack prediction to system restoration. The company is strengthening endpoint(1) and cloud security, and will provide analyses of threat information from the dark web(2).

Fujitsu is offering in Japan from May "Fujitsu Security Solution Cybereason EDR Service," which offers a total package of deployment, operations, and maintenance for Cybereason EDR(3), software that can detect cyberattacks by unknown sources on endpoints using machine learning.

In the cloud domain, Fujitsu will offer a service to customers that use Microsoft 365 E5(4) whereby the company operates on their behalf accompanying integrated security services(5) that defend from, detect, and respond to cyberattacks, and Fujitsu will also offer a service that provides customers individualized reports detailing dark web and deep web(6) threats. Both services are planned to be steadily rolled out in Japan from August 2018.

In addition to these three services, Fujitsu is offering in Japan from May "Fujitsu Security Solution Global Managed Security Service Express," which expedites deployment by offering a package of only the required parts of the existing Global Managed Security Service.

Going forward, Fujitsu will support the business continuity of customers by continually enhancing its Global Managed Security Service using cutting-edge security technology, contributing to the creation of a comfortable and secure networked society.

These new services will be exhibited at Fujitsu Forum 2018, which will be held May 17-18 at Tokyo International Forum in Tokyo.

Background

In recent years, changes to the ways people work and the rise of cloud utilization have altered the ways ICT is used. It is also becoming difficult to deal with the entire range of increasingly diverse and sophisticated cyberattacks with just existing countermeasures, such as anti-virus products and firewalls. Under the Cybersecurity Management Guidelines 2.0, revised by the Ministry of the Economy, Trade and Industry (METI) and the Information-technology Promotion Agency, Japan (IPA) in November 2017, companies are asked not only to defend against cyberattacks, but to embrace wide-ranging countermeasures, from attack detection to recovery.

In light of this situation, Fujitsu is expanding its Global Managed Security Service, providing from May operations and maintenance for Cybereason EDR, which can detect previously unknown malware attacks in endpoints, and is also enhancing its security countermeasures, by rolling out a managed operations service for the integrated security services that accompany the cloud service Microsoft 365 E5 and a service that provides individualized reports to customers on threat information from the dark web.

About the Enhancements

1. An all-around service that performs deployment to operations of Cybereason EDR

Security countermeasures for endpoints, such as PCs, have mainly consisted of using antivirus products that block intrusion by existing malware, but in recent years, there has been a dramatic increase in the number of attacks by unknown malware that could not be blocked by these products, so post-intrusion malware countermeasures have become indispensable. Starting in May 2018, Fujitsu will offer a service using Cybereason Japan Corp.'s Cybereason EDR, which can detect cyberattacks that could not be blocked by antivirus products, in which Fujitsu's security engineers will comprehensively perform tasks like monitoring and operations. Because Cybereason EDR uses machine learning to recognize patterns of activity in a device that has been attacked, and analyzes movements unique to attackers, it can even detect attacks by unknown malware. With this service, Fujitsu's security engineers will analyze alerts detected by Cybereason EDR, identify infected devices, stop inappropriate processes, and suggest recommended countermeasures, 24 hours a day, 365 days a year. This will reduce the burden of security operations for customers in endpoints such as PCs.

2. Enable use of safe and secure Microsoft 365 E5 environment

Microsoft 365 E5, an integrated solution from Microsoft Corporation combining Office 365, Windows 10, and Enterprise Mobility + Security, offers cybersecurity countermeasure functions in a uniform manner across multiple services, namely, ID, e-mail, SaaS and endpoint. Running operations for those services not only requires high security skills, it also requires a 24-hour-per-day, 365-day-per-year monitoring system and rapid responses to intrusions such as malware. Fujitsu has accumulated a broad range of experience by developing proprietary tools to detect warning signs of an attack in Active Directory, which is an important component in managing user information in Microsoft products, and used those tools in countermeasures for targeted cyberattacks. Building on this experience, Fujitsu will steadily roll out from September of 2018 a service in which its security engineers will handle everything from the operation of the integrated security services included in Microsoft 365 E5, to 24/7/365 monitoring of customer environments, to the response after a cyberattack is detected.

3. Collaboration with IntSights for technology capable of collecting dark web threat information

In order to be prepared for advanced cyberattacks, it is important to plan countermeasures in advance with an understanding of the attacker's motives, goals, characteristics, and methods, but the judgment of a security expert with specialized knowledge is indispensable in extracting information relating to one's own company from voluminous and wide-ranging attacker information. Fujitsu has agreed to collaborate with IntSights Cyber Intelligence Ltd., which offers a service that can collect threat information from the places that attackers use to share information, such as the dark web, which are difficult for ordinary people to access. Scheduled for August 2018, Fujitsu is set to offer a service to extract and analyze threat information for specific customers from the massive amounts of information flowing through the dark web and deep web.

4. Global Managed Security Service Express, cuts time for deployment to one third

Based on the insights and experience gained from providing the Global Managed Security Service to customers across a variety of industries, handling monitoring and operations, Fujitsu is now launching Global Managed Security Service Express, which can reduce deployment time from the previous three months to just one month by systematizing and offering only the most essential services in the Global Managed Security Service, such as 24-hour-per-day, 365-day-per-year real-time log monitoring.

Sales Target

300 billion yen in annual sales of security-related products and services globally in fiscal 2019.
Endorsements

Comment by Lior Div, CEO, Cybereason Inc. and Director, Cybereason Japan Corp.

Cybereason Inc. warmly welcomes the launch of Fujitsu's Global Managed Security Service using Cybereason EDR. As threats become more advanced and sophisticated, day by day, and as it is becoming impossible to block 100% of security threats, the question of how to implement countermeasures and operations that prioritize defense, assuming an intrusion will occur, has become an important element of business continuity. By combining the Global Managed Security Service offered by Fujitsu with Cybereason's technology, based on a machine learning engine (AI) and experience developed in Israel's military intelligence corps (Unit 8200), I firmly believe that customers will be able to detect and visualize the signs of a cyberattack in real time, gaining an environment that can prevent advanced cyberattacks, including targeted attacks. Going forward, Cybereason Inc. will work with Fujitsu to provide optimal cybersecurity for customer environments, first in Japan, as well as APAC and EMEA, with an eye toward expansion around the globe.

Comment by Yoshinami Takahashi, Managing Executive Officer, Microsoft Japan

Microsoft Japan sincerely welcomes the enhancements to Fujitsu's Global Managed Security Service utilizing Microsoft 365 E5. To help customers realize their future business growth strategies by digital transformation, Microsoft and Fujitsu are partnering tightly in key initiatives including work-style transformation, AI, and cyber security. By combining Fujitsu's Global Managed Security Services, the Intelligent Security Graph and Microsoft 365 E5, customers will be able to effectively eliminate the risk of targeted cyberattacks in real time and realize the safe and secure customer experiences for the cloud services. The Intelligent Security Graph is the big data from over one billion Windows devices, 450 billion user authentications per month and 400 billion email messages per month. Microsoft 365 E5 is powered by AI services for comprehensive cyber security protection, detection to response. Moving forward, Microsoft Japan and Fujitsu will continue to collaborate to support the digital transformation of customers.

Comment by Guy Nizan, CEO, IntSights Cyber Intelligence Ltd.

Tailored threat intelligence, including 'indicators of attack' and adversary motive and means, analyzed alongside internal IOCs, community, and open source threat feeds, provides customers a highly customized and comprehensive picture of the risks threatening their business and brand. This actionable intelligence in the hands of Fujitsu's expert security services team as part of their leading Cyber MSSP Platform will deliver customers a new level of proactive defense that renders targeted attacks dead-on-arrival. We are extremely proud to have had our MSSP offering chosen by Fujitsu to deliver their customers such an innovative solution.

(1) Endpoint A computer or information device connected to a communications line or networking device
(2) Dark web Websites that can only be accessed from specialized web browsers, used for applications such as collecting information and sharing tools.
(3) Cybereason EDR The Japanese distributor for this product is SoftBank Corp.
(4) Microsoft 365 E5 A package product containing three services: Office 365, an integrated information sharing cloud service that aggregates such functions as email, Office, scheduling, and online meetings, Windows 10, the latest OS, and Enterprise Mobility + Security, a cloud-based solution that provides both security countermeasures and productivity improvements.
(5) Integrated security services Refers to three services: Office365 Advanced Threat Protection, Windows Defender Advanced Threat Protection, and Azure Advanced Threat Protection.
(6) Deep web Websites that are difficult to access, used for applications such as collecting information and sharing tools.

About Fujitsu Ltd

Fujitsu is the leading Japanese information and communication technology (ICT) company, offering a full range of technology products, solutions, and services. Approximately 155,000 Fujitsu people support customers in more than 100 countries. We use our experience and the power of ICT to shape the future of society with our customers. Fujitsu Limited (TSE: 6702) reported consolidated revenues of 4.5 trillion yen (US$40 billion) for the fiscal year ended March 31, 2017. For more information, please see http://www.fujitsu.com.

* Please see this press release, with images, at:
http://www.fujitsu.com/global/about/resources/news/press-releases/

Source: Fujitsu Ltd

Contact:
Fujitsu Limited
Public and Investor Relations
Tel: +81-3-3215-5259
URL: www.fujitsu.com/global/news/contacts/




Copyright 2018 JCN Newswire . All rights reserved.

More Stories By ACN Newswire

Copyright 2008 ACN Newswire. All rights reserved. Republication or redistribution of ACN Newswire content is expressly prohibited without the prior written consent of ACN Newswire. ACN Newswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Blockchain has shifted from hype to reality across many industries including Financial Services, Supply Chain, Retail, Healthcare and Government. While traditional tech and crypto organizations are generally male dominated, women have embraced blockchain technology from its inception. This is no more evident than at companies where women occupy many of the blockchain roles and leadership positions. Join this panel to hear three women in blockchain share their experience and their POV on the futu...
Concerns about security, downtime and latency, budgets, and general unfamiliarity with cloud technologies continue to create hesitation for many organizations that truly need to be developing a cloud strategy. Hybrid cloud solutions are helping to elevate those concerns by enabling the combination or orchestration of two or more platforms, including on-premise infrastructure, private clouds and/or third-party, public cloud services. This gives organizations more comfort to begin their digital tr...
Cloud Storage 2.0 has brought many innovations, including the availability of cloud storage services that are less expensive and much faster than previous generations of cloud storage. Cloud Storage 2.0 has also delivered new and faster methods for migrating your premises storage environment to the cloud and the concept of multi-cloud. This session will provide technical details on Cloud Storage 2.0 and the methods used to efficiently migrate from premises-to-cloud storage. This session will als...
In very short order, the term "Blockchain" has lost an incredible amount of meaning. With too many jumping on the bandwagon, the market is inundated with projects and use cases that miss the real potential of the technology. We have to begin removing Blockchain from the conversation and ground ourselves in the motivating principles of the technology itself; whether it is consumer privacy, data ownership, trust or even participation in the global economy, the world is faced with serious problems ...
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). According to the survey, a quarter of the respondents have already deployed Docker containers and nearly as many (23 percent) are employing the AWS Lambda serverless computing framework. It's clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. Th...
For enterprises to maintain business competitiveness in the digital economy, IT modernization is required. And cloud, with its on-demand, elastic and scalable principles has resoundingly been identified as the infrastructure model capable of supporting fast-changing business requirements that enterprises are challenged with, as a result of our increasingly connected world. In fact, Gartner states that by 2022, 28% of enterprise IT spending will have shifted to cloud. But enterprises still must d...
Cloud-Native thinking and Serverless Computing are now the norm in financial services, manufacturing, telco, healthcare, transportation, energy, media, entertainment, retail and other consumer industries, as well as the public sector. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that pro...
The level of trust we have with individuals, businesses, and technology affects our lives daily. This is important to remember when discussing new technologies. For example, our level of trust is a critical factor when evaluating a new technology as a potential solution for providing business value. Given the importance of trust, imagine one's reaction upon hearing that blockchain is a "trustless trust" system. On the surface, that does sound like an oxymoron. This paper discusses how "trustless...
Public clouds dominate IT conversations but the next phase of cloud evolutions are "multi" hybrid cloud environments. The winners in the cloud services industry will be those organizations that understand how to leverage these technologies as complete service solutions for specific customer verticals. In turn, both business and IT actors throughout the enterprise will need to increase their engagement with multi-cloud deployments today while planning a technology strategy that will constitute a ...
Data center, on-premise, public-cloud, private-cloud, multi-cloud, hybrid-cloud, IoT, AI, edge, SaaS, PaaS... it's an availability, security, performance and integration nightmare even for the best of the best IT experts. Organizations realize the tremendous benefits of everything the digital transformation has to offer. Cloud adoption rates are increasing significantly, and IT budgets are morphing to follow suit. But distributing applications and infrastructure around increases risk, introdu...
Moving to Azure is the path to digital transformation, but not every journey is effective. Organizations that start with a cohesive, well-planned migration strategy can avoid common mistakes and stay a step ahead of the competition. Learn from Atmosera CEO, Jon Thomsen about the opportunities and challenges found in three pivotal phases of the journey to the cloud: Evaluation and Architecting, Migration and Management, and Optimization & Innovation. In each phase, there are distinct insights tha...
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomp...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
Andrew Keys is co-founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereum.