Top of Page


Links to move inside this page.

  1. HOME
  2. About IIJ
  3. News / CSR
  4. Press Releases
  5. 2018
  6. IIJ to Launch "IIJ Secure Endpoint Service"

2018 Press Releases

IIJ to Launch "IIJ Secure Endpoint Service"

Defending against External Threats and Deters/Visualizes Internal Information Leaks as a Cloud-Based Service

September 19, 2018

TOKYO-September 19, 2018-Internet Initiative Japan Inc. (IIJ, NASDAQ: IIJI, TSE1: 3774), one of Japan's leading Internet access and comprehensive network solutions providers, today announced that it will launch the IIJ Secure Endpoint Service on October 1, 2018. As part of an enhanced security strategy for PCs, servers, and other endpoints on corporate networks, the service features cloud-based antivirus and IT asset management functions.

Many threats to corporations invade and act on internal networks via the Internet and e-mail traffic used in business. Thus it is essential that corporations know what programs have been executed and what files have been changed on the terminals that have been infected, so that corporations will have the information needed to estimate the impact of the threat. Furthermore, as the use of encrypted signals increases, there are threats that cannot be detected using gateway-based security policies. To respond to encrypted threats, corporations need to install additional systems dedicated to decrypting and inspecting encrypted signals. Under these circumstances, infected devices hold many keys to solving this problem, and attention is once again turning to endpoints, which allow for effective countermeasures.

Combining two antivirus services that have different threat detection logics, the soon-to-launch IIJ Secure Endpoint Service allows users to detect and isolate known and unknown malware before it executes and to discover information leakage caused by employees whether intentionally or not.. Furthermore, the IT asset management feature combines all the functions required to track and identify the causes and processes that led to the incident. Specifically, it uses operation logs acquired from before and after the incident to find any specific websites browsed or histories of targeted emails being opened. The feature then investigates and reports on malware influx routes, the scope of malware effects, and the internal impropriety situation, allowing users to dramatically reduce their operational burdens when considering measures to prevent recurrences.

The service has the following features:

Cloud-based antivirus and IT asset management

The service offers cloud-based antivirus and IT asset management features to both defend against external threats and prevent internal data leaks. Clients can choose the features they need to work with their existing security measures and issues, using an asset-less installation.

Visualizations of device security situations using IIJ's proprietary dashboard

Using IIJ's proprietary dashboard, users can review the infection status of managed devices and the information on detected malware. The dashboard displays information on both of the two features provided, allowing users to see the security status on a single screen. This allows users to rapidly assess the status of a huge number of managed devices and to take necessary measures.

Closed connections without the use of VPN devices

By combining the service with the IIJ Private Backbone Service, which extends user dedicated networks to IIJ's backbone, users can create closed connections within their networks without needing to install a new VPN device. This allows users to manage devices safely without the extra burden of changing network configuration settings or performing device maintenance.

IIJ plans to link this service with "the Data Analytic Platform" that collects and analyzes massive data logs and event data from all its services, and to promote threat data sharing and detection accuracy improvements. IIJ will also provide support for monitoring and incident response services through integration with the IIJ C-SOC Service.

Service Options

Basic Services Description
Antivirus: Symantec The service offers "Symantec Endpoint Protection (SEP)," an antivirus product from Symantec. It has the only lightweight SEP agent with excellent multilayered protections thanks to its combination of core security functions and the latest cutting-edge technologies, including signatureless vulnerability protection and advanced machine learning.
Antivirus: Cylance The service offers "CylancePROTECT," a next-generation antivirus product from Cylance. Using machine-learning technology that studies, detects, and models malware structures, this service detects and defends against known and unknown malware before it executes.
IT asset management The service offers "LanScope Cat," an IT asset management product from Motex. This product automatically collects data from devices on which its agent is installed and assesses the IT asset situation of these devices. Users can then manage licenses, distribute files, handle operations logs, and otherwise manage devices as needed. The service prevents internal improprieties by collecting logs of Internet browsing and email opening histories, and by thwarting the use of personal USB devices. Connecting the service with CylancePROTECT allows users to track from the management screen how malware invaded a given device.

In addition to these basic services, users may choose from a tunnel connection option that links service equipment with user networks, an on-site work option through which IIJ dispatches agents to perform work at customer locations, and a malware specimen analysis option through which IIJ will investigate samples of detected malware.

Service Fees

IIJ creates individual estimates in accordance with the installed functions and the number of devices.

With the aim of creating a society in which its customers will be able to safely use the Internet without having to concern themselves with threats, IIJ continues to employ its wizSafe brand, a security business brand based on the idea of "making safety a matter of course."

About IIJ

Founded in 1992, IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers. IIJ and its group companies provide total network solutions that mainly cater to high-end corporate customers. IIJ's services include high-quality Internet connectivity services, systems integration, cloud computing services, security services and mobile services. Moreover, IIJ has built one of the largest Internet backbone networks in Japan that is connected to the United States, the United Kingdom and Asia. IIJ listed on the U.S. NASDAQ Stock Market in 1999 and on the First Section of the Tokyo Stock Exchange in 2006.

The statements within this release contain forward-looking statements about our future plans that involve risk and uncertainty. These statements may differ materially from actual future events or results. Readers are referred to the documents furnished by Internet Initiative Japan Inc. with the SEC, specifically the most recent reports on Forms 20-F and 6-K, which identify important risk factors that could cause actual results to differ from those contained in the forward-looking statements.

For inquiries, contact

IIJ Corporate Communications

  • (*) All company names and service names used in this press release are the trademarks or registered trademarks of their respective owners.
Get Adobe Acrobat Reader
Download Adobe Acrobat Reader
If you don't have Adobe Acrobat Reader or are having problems viewing the document after download, please take a few moments to download the latest free Adobe Acrobat Reader.

End of the page.

Top of Page