Fujitsu cuts response time to cyberattacks by 97%
ntttttttttttt
Fujitsu has announced the availability of Japan’s first software to automate detection of cyberattacks and response. The software, FUJITSU Software Systemwalker Security Control, dramatically shortens the initial response time after malware has been detected to prevent damage from spreading.
n
Also being offered is FUJITSU Security Solution Information Security Enhancement Support Consulting, which are services designed to improve the security of control systems. Both are part of the FUJITSU Security Initiative, a systematized suite of products and services that support safe and secure ICT for customers and society, with FUJITSU Software Systemwalker Security Control planned to be rolled out to other markets outside of Japan later in fiscal 2014.
n
Systemwalker Security Control automates what has previously been a manual process of responding to cyber attacks, dramatically shortening the response time and limiting the extent of the attack. In Fujitsu’s own experience, this product has cut initial response times by roughly 97%.
n
There are two services being offered as a part of Information Security Enhancement Support Consulting. One is the identification of security risks, and the other is training services for establishing security policies. Both are aimed at strengthening the security of control systems.
n
As ICT is used more widely, companies are being challenged to respond to increasingly sophisticated and damaging cyber attacks. These responses require both preventing intrusion in the first place and reacting quickly and effectively to those intrusions that succeed, as that will largely determine the extent of privacy breaches and attendant problems. In the past, measures taken after malware had been detected included determining the risk level of the attack, identifying the vulnerable terminal and requesting the responder to take action.
n
Fujitsu said it was necessary to have a process that used automation to respond swiftly and appropriately. Moreover, automating a response process would also enable action to be taken with limited resources.
n
Cyberattacks do not stop at information systems; their scope has expanded to the control systems essential to infrastructure and that are used at manufacturing facilities. Given the deep concern that control systems infected by malware will cause machinery or entire systems to stop work or break down, Fujitsu said it recognized the need to strengthen the security management of these systems.
tttttttntttntttntttttttttttt© JCN Newswirenttttttttt