Innovating Security Operations Center
About IIJ SOCTop of Page
Innovating Security Operations Center
About IIJ SOCSYN-ACK reflection attacks using IoT devices as springboard (Security Diary) (Japanese text only.)
Observations of IoT botnet in 2018 and recent trends (Security Diary) (Japanese text only.)
Scanning activity to 8291/tcp by Hajime bots (Security Diary) (Japanese text only.)
Infection status of Mirai variant in Japan(December 2017) (Security Diary)
(Japanese text only.)
wizSafe - IIJ's Security Business - (IIJ.news vol.140) (Japanese text only.)
We provide optimal security measures to customers in terms of integrated operation via SOC,
from cloud solutions to access lines and endpoints.
With the comprehensive strength and technical prowess that we have developed as an ISP, we provide customers with optimal security protections in terms of unified operations using SOC. In order to protect our customers' systems from a variety of threats, both internal and external, we suggest multi-point security, which combines multiple countermeasures. This effective high-security plan helps bring our customers' security to higher levels.
We perform big data analysis based on information that is unique to ISP, such as a huge amount of logs of security equipment, backbone traffic, and DNS queries gathered by the Data Analytics Platform, and external information. From the results of analysis and the expertise of the security analysts, the SOC continues to defend customers from various threats through incident detection and notification, initial response, solution proposals, and even the implementation of countermeasures regarding IIJ operated equipment.
Since offering the first firewall service in Japan in 1994,
IIJ's security services have been selected by many customers covering all industry types and scales.
No. of subscriber accounts
About2.4million
(as of Dec 31,2020)
share of Cloud Email Security Service Market
No.1(*1)
No. of subscriber accounts
About1.1million
(as of Dec 31,2020)
share of SaaS Web gateway/
security Market
No.1(*2)
(*1)Source:Fuji Chimera Research Institute, Inc.,Fuji Marketing Report Business Technology September'19
(*2)Source:ITR,ITR Market View:Cyber Security Measures Market 2020
Market shares of vendor sales in FY2019 (Forecast)
End of the page.