Macnica

Macnica

security advisory

In order to implement information security measures, it is necessary to secure personnel with knowledge of security. Determine whether the current security measures and operations of the company's systems are appropriate, and what impact new vulnerabilities and the latest security threat trends will have on the company. It is necessary to compare the threats to security, prioritize them, and promptly implement countermeasures.

The security advisors we provide are security advisors close to our customers, and based on our wealth of experience and knowledge, S&J consultants give realistic advice to our customers' issues and concerns. to hold.
Please consult us about security measures for internal systems, web applications that provide services to external users, and security measures for smartphone applications.

support

We will advise you on security measures, issues and concerns.

  • Security consultation
    • Responding to inquiries by email
  • Advice at regular meetings
    • Advice on security measures and issues
      Examples) Advice on security technology, advice on CSIRT activities, etc.
    • Providing information on the latest security threat trends, etc.

*As part of Security Advisor, "Fast Forensics" is an IR response in the event of an emergency, and "Suspicious Email" analyzes suspicious emails to determine whether they are harmful or harmless, and provides information on the recipients of unauthorized communications. We also offer an optional analysis service, as well as the provision of information on critical software vulnerabilities according to the customer's environment. Please contact us separately.

Security Advisory Implementation Flow

Vulnerability information provision option

Vulnerability information related to network devices and software is reported daily. If the impact is wide and the severity is high, you may notice it because it will be widely reported, but if the impact is limited or it is difficult to become a news source, security personnel have no choice but to search for it themselves.
Even if you check newly disclosed vulnerability information, it is difficult to always check it in your daily work. However, it is not easy to judge whether it is urgent and necessary to respond.

Vulnerability information is provided in advance by receiving detailed information on the system that the customer is using, and S&J compares the publicly available vulnerability information to provide "highly important vulnerability information specific to the customer's environment." " is an option that provides

Summary of Vulnerability Reporting Options

  • We will receive in advance the device information, OS/firmware information, and software information that the customer will use.
    *We will provide a separate hearing sheet.
    *Customers who separately performed ASM (Attack Surface Management) will use the ASM results.
  • S&J compares the above information with the vulnerability information provided by JVN *1.
    *1 JVN is an abbreviation for “Japan Vulnerability Notes”. Jointly operated by the JPCERT Coordination Center and the Information-technology Promotion Agency (IPA) since July 2004
  • We provide the above results monthly. We also accept consultations on management of response status for provided vulnerabilities.

In addition to this service, S&J offers a wide range of services, from assessment/consulting of the customer's security system to comprehensive monitoring of various devices including EDR, servers, and NW equipment, to response support in the event of a serious incident. We can support you. Please refer to each service page for details.

Inquiry/Document request

In charge of Macnica Security Service Co., Ltd.

Mon-Fri 8:45-17:30