We are conducting research on security orchestration technology, which realizes a total, robust defense system against cyber attacks, with comprehensive and multi-layer security functionality. We have also developed technology targeting office networks and the cloud.
In the coming 2020's, various types of devices will connect to networks, and there are menaces that vulnerabilities will be exploited. It is assumed that attacks exploiting vulnerabilities turn IoT devices into "bots" that will be used for DDoS and other types of large-scale, increasingly-sophisticated cyber attacks. Our goal is to establish security orchestration technology that accounts for issues in the IoT era, in addition to what we have been working on for office and cloud environments, in order to respond to these changing threats.
Security Orchestration Technology