service

Deploy security services to protect websites from hackers

Corporate cyber security measures can be divided into “internal security” and “web security”.
Unlike in-house security such as PC virus countermeasures and firewalls, security to protect websites is often not supported, and in recent years there have been many incidents of personal information leaks.
We are pursuing web security services with good cost performance and a well-developed support system, and we are constantly improving the quality so that they can be used regardless of the size of the company or IT skills.

In-house security

In-house security

Protect your computer and company network

web security

web security

Protect websites that everyone visits

Assumed damage on websites
 from cyber attacks

  • Lost sales opportunities
  • Damage to brand image
  • Compensation for damages
  • Leakage of personal information
  • Stock price decline
  • Shareholder derivative lawsuit

List of services

wafcharm

A service that automatically operates a WAF provided in the public cloud using “AI” and “big data”.

Service site

CSC Managed Rules for AWS WAF

AWS WAF-specific rule sets available for purchase from AWS Marketplace. Certified as one of only 7 AWS WAF managed rule sellers in the world, currently providing services in over 90 countries and regions.

Service site

CloudFastener

A fully managed security service that comprehensively manages and operates various AWS security services.

Service site

Shadankun

Our flagship Cloud-based WAF that visualizes and blocks cyberattacks on websites and web servers.

Service site

wafcharm

A service that automatically operates a WAF provided in the public cloud using “AI” and “big data”.

Service site

CloudFastener

A fully managed security service that comprehensively manages and operates various AWS security services.

Service site

CSC Managed Rules for AWS WAF

AWS WAF-specific rule sets available for purchase from AWS Marketplace. Certified as one of only 7 AWS WAF managed rule sellers in the world, currently providing services in over 90 countries and regions.

Service site

SIDfm

A service that collects OS and application vulnerability information from all over the world and provides patch information and workarounds in Japanese along with risks. It is also possible to automate operations (SOAR), such as issuing tickets under predetermined conditions for vulnerabilities in IT assets.

Service site

Vulnerability Assessment Service

We provide comprehensive vulnerability assessments for vulnerability countermeasures of web applications, platforms, and API. With over 25 years of experience and know-how, we provide hybrid assessments by security experts and tools.

Service site

OSS (Open Source Software)

sasanka

Software for protecting Web APIs is released as OSS. A plugin that adds security features to the API gateway Kong.

view the details

Technology supporting CSC

Cyber Security Cloud responds to ever-evolving cyber-attacks by developing cutting-edge AI technology and utilizing world-class threat intelligence.

Web attack detection technology by AI Cyneural

Cyneural, an attack detection AI engine that uses deep learning, uses a feature extraction engine that utilizes knowledge cultivated through research on web access and many attack methods. By building multiple types of learning models in the engine, we can quickly detect not only general attacks, but also unknown attacks and false positives.

Web attack detection technology by AI Cyneural

WRAO, automatic rule operation technology using AI

We have developed WRAO, a technology for automatic operation of rules for websites (patented), to reduce the cost of WAF rule operation. WRAO learns website access trends from users' web access data and predicts the characteristics of attacks on those websites. This enables automatic selection of flexible rules that match the modeled web application and attack model.

WRAO, automatic rule operation technology using AI

World-leading cyber threat intelligence and
by security researchers
Cyber Threat Intelligence Monitoring Team Cyhorus

Demands for collection and evaluation of cyber threat information and speed of reflection in signatures are increasing day by day. Cyhorus is a team organized by our elite, and has partnered with an Israeli company that possesses world-class cyber threat intelligence information. We consistently carry out accurate evaluation and signature creation.

Cyhorus