Advanced access control that outsmarts hackers is essential to stay protected from today’s sophisticated cyber threats. The IIJ Safous platform offers all the features you need, including ZTA, SOARaaS, and security assessment.
IIJ Secure Access Service is a security framework that enables users or devices to securely access applications, data, and services on the cloud "whenever" and "wherever."
IIJ DDoS Protection Service/Edge is a service where sensors are installed internally at the customer's company to constantly protect customer systems from DDoS attacks and targeted attacks. In addition to conventional DDoS mitigation functions, threat intelligence is used to block not only external attacks, but also malicious internal traffic. And, this service can be linked with the IIJ DDoS Protection Service to protect against large-scale DDoS attacks, too.
The IIJ Managed IPS/IDS Service detects and blocks unauthorized access to your systems. Robust security through proactive defense against Internet threats.
The IIJ Cloud Access Security Broker (CASB) Solution helps prevent information leaks by providing a visualization of the cloud services used without permission (shadow IT) and the cloud services contracted for use by the company. Integrating this service with other IIJ services also helps control shadow IT issues. We provide full support of this solution from implementation through operations.
The IIJ C-SOC Service provides security monitoring and threat analysis of security logs collected from firewalls, other security devices, and your operations equipment 24 hours per day, 365 days per year to help keep environments secure.We beef up your security measures in ways that include suggesting countermeasures in response to incidents, and even changing the settings on IIJ-operated equipment.
Select from our three plans: Premium, Advanced, or Basic.
IIJ Flex Mobility Service/ZTNA is a remote access service that implements Zero Trust. The service eliminates sluggish operation and constant disconnections, problems with conventional remote access, and provides features that implement Zero Trust, such as communication visualization, detailed policy settings, and access control. The service also greatly supports applications that require real-time connection, such as Web meetings, conference calls, and virtual desktops.
The IIJ GIO Remote Access Service TypeB provides secure web access to internal systems and cloud services from secure browsers with built-in VPN functionality.
The IIJ Mobile Private Gateway Service is a cloud-based gateway service that offers secure mobile communications with a closed network connection instead of with a mobile connection.
This is an integrated email security service that enhances email security in the cloud. You can implement one-stop security measures for receiving and sending emails, such as protection against threat email (e.g. Emotet) and protection against erroneous email transmissions.
Microsoft 365 with IIJ provides an extra layer of email security with Microsoft 365. With this service, you get Microsoft 365 at the normal price but with stronger security.
With the IIJ Malware Analysis Solution, specialized analysts investigate and analyze unidentified samples provided by customers. Information on malware risk levels and recovery methods is then provided to help protect you against malware.
The IIJ Secure Web Gateway Service is a cloud-based service that provides all necessary web security functions. With this service, you can improve business efficiency through optimized web security.
Site Umpire Service is a URL filtering service that runs on a dedicated router. With one license and one router, you can control website access for all devices connected to the router.
With the IIJ Malware Analysis Solution, specialized analysts investigate and analyze unidentified samples provided by customers. Information on malware risk levels and recovery methods is then provided to help protect you against malware.
The IIJ Change Detection and Recovery solution detects website tampering threats accurately, and performs automatic recovery rapidly. This provides instantaneous detection and instantaneous recovery 24/7. We help customers operate safe and secure websites.
The IIJ Block Unauthorized Access Solution for Website includes an easily deployable cloud-based protection system to protect your websites from unauthorized access.
The IIJ Managed WAF Service detects and protects against attacks that exploit various Web system vulnerabilities with a high-performance WAF engine. This cloud-based WAF service is operated by IIJ security engineers and can be deployed for a wide range of Web systems.
The IIJ Secure Endpoint Service is a cloud-based system that defends against external threats and prevents internal information leaks. By utilizing a number of antivirus and IT asset management features that detect and isolate malware and track the path to infection, the operation that caused the infection can be countered to prevent recurrence.
IIJ Directory Service for Microsoft provides Active Directory (AD) as a cloud-based service.
Providing Active Directory with Azure AD Connect enables users to access both internal systems and cloud services using a single ID and password.
Furthermore, the cloud services can also support WSUS. Providing the systems essential for office IT as a service lessens the burden on information system administrators.
The IIJ ID Service is a cloud-based ID management service (IDaaS) that enables single sign-on (SSO) to access multiple services. It also provides a powerful multi-factor authentication feature that can detect and prevent unauthorized logins.
We provide a wide variety of freely combinable features that are required for ID management, authentication, and authorization, such as ID inventory, ID life cycle management, single sign-on, authentication control based on the conditions of the end device in use, and multi-factor authentication. This enhances ID governance and authentication security.
With the IIJ Security Audit Solution, an experienced security consultant learns the customer's business and system configurations to provide an optimal solution in accordance with the overall corporate security level.
The IIJ Vulnerability Management Solution with Tenable.io is a solution that centralizes the management of vulnerability information on the cloud. This solution is based on an annual flat-rate fee, enabling vulnerability diagnosis to be performed any number of times. Users can improve system security without worrying about costs. Furthermore, we provide optional analysis in which highly experienced security analysts create diagnosis reports. We provide strong support to counteract customer vulnerabilities.
The IIJ CSPM Solution provides centralized management of multi-cloud systems under a unified policy and monitors whether there are vulnerable settings. This solution identifies potential risks by visualizing cloud environments that are prone to complexity.
The IIJ CSIRT Advisory Solution is a packaged, fixed fee service that provides initial support in establishing CSIRT in your organization as well as ongoing support after implementation.