In-house security
Protect your computer and company network
Corporate cyber security measures can be divided into “internal security” and “web security”.
Unlike in-house security such as PC virus countermeasures and firewalls, security to protect websites is often not supported, and in recent years there have been many incidents of personal information leaks.
We are pursuing web security services with good cost performance and a well-developed support system, and we are constantly improving the quality so that they can be used regardless of the size of the company or IT skills.
Protect your computer and company network
Protect websites that everyone visits
A service that automatically operates a WAF provided in the public cloud using “AI” and “big data”.
AWS WAF-specific rule sets available for purchase from AWS Marketplace. Certified as one of only 7 AWS WAF managed rule sellers in the world, currently providing services in over 90 countries and regions.
A fully managed security service that comprehensively manages and operates various AWS security services.
Our flagship Cloud-based WAF that visualizes and blocks cyberattacks on websites and web servers.
A service that automatically operates a WAF provided in the public cloud using “AI” and “big data”.
A fully managed security service that comprehensively manages and operates various AWS security services.
AWS WAF-specific rule sets available for purchase from AWS Marketplace. Certified as one of only 7 AWS WAF managed rule sellers in the world, currently providing services in over 90 countries and regions.
A service that collects OS and application vulnerability information from all over the world and provides patch information and workarounds in Japanese along with risks. It is also possible to automate operations (SOAR), such as issuing tickets under predetermined conditions for vulnerabilities in IT assets.
We provide comprehensive vulnerability assessments for vulnerability countermeasures of web applications, platforms, and API. With over 25 years of experience and know-how, we provide hybrid assessments by security experts and tools.
Software for protecting Web APIs is released as OSS. A plugin that adds security features to the API gateway Kong.
Cyber Security Cloud responds to ever-evolving cyber-attacks by developing cutting-edge AI technology and utilizing world-class threat intelligence.
Cyneural, an attack detection AI engine that uses deep learning, uses a feature extraction engine that utilizes knowledge cultivated through research on web access and many attack methods. By building multiple types of learning models in the engine, we can quickly detect not only general attacks, but also unknown attacks and false positives.
We have developed WRAO, a technology for automatic operation of rules for websites (patented), to reduce the cost of WAF rule operation. WRAO learns website access trends from users' web access data and predicts the characteristics of attacks on those websites. This enables automatic selection of flexible rules that match the modeled web application and attack model.
Demands for collection and evaluation of cyber threat information and speed of reflection in signatures are increasing day by day. Cyhorus is a team organized by our elite, and has partnered with an Israeli company that possesses world-class cyber threat intelligence information. We consistently carry out accurate evaluation and signature creation.