Construction, upgrading or backup of a system can be done instantly on a global scale. The system can promptly adapt to changes in its environment, such as rapid business growth or a disaster.
Autonomous resource allocation makes it possible to achieve both dramatic cost reduction and enhanced convenience.
Signs of threats are detected based on vulnerability information and information available in SNSs in addition to security operation logs and traffic data.
Security compromises are prevented by taking comprehensive measures, such as those deemed necessary as a result of security analysis, and application of robust and sophisticated next-generation encryption technologies.