close
Trouble with tuning/maintenance work (in preparation)

Not used

Misconfiguration risk

Not used

Device vulnerability risk

Risk via external storage media

HFW setting mistake

Lack of understanding of devices and software to be managed

Unable to analyze intruded malware

There are threats that traditional antivirus cannot detect

I am having trouble with over-detection and false detection.

There are threats that EDR cannot detect

Trouble with tuning and maintenance work

Device vulnerability risk

Risk via external storage media

HFW setting mistake

Not used

Not used

Device vulnerability risk

Risk via external storage media

HFW setting mistake

Inability to collect attack information

Click for risk explanation video

[Regarding your environment] * Single-byte numeric input

Please tell me the number of terminals used on the internal network (headquarters)


client platform

server platform

Please tell me the number of terminals used on the internal network (branch offices, branches, etc.)


client platform

server platform

Please let me know the usage status of the terminal on the cloud (AWS/Azure/GCP, etc.)

[About security measures]

What are your endpoint security requirements?

Please tell us about the status of support for asset visualization.


product name:

Have you installed a malware analysis platform?


product name:

Are you gathering security intelligence?


product name:

*Please answer the unanswered questions (red).

* Diagnosis cannot be performed unless there is at least one terminal at the head office or branch office.

Press "Diagnose" and the results will be displayed here

To reproduce the previous diagnosis, enter the diagnostic key below and press the reproduce button.

[Diagnosis key]

Thank you for your answer

Since the customer's environment is before AV measures, how about starting with the introduction of antivirus first?

The customer's environment is a defense system centered on AV,

The customer's environment is a defense system centered on AV / EDR,

It seemed that there was a difference in the response status of each base.
Infringements across bases have also been reported as incidents, so please consider standardizing countermeasures between bases.

The same was true for the response status of each site.

"The first step in endpoint security is the introduction of NGAV"

"The first step toward EDR countermeasures is to replace with NGAV"

In the case of customer environments, we recommend that measures begin with the introduction of NGAV.

Considering the operating costs that are not directly included in the product cost, such as the presence or absence of an antivirus-related management server and the time and effort required to update signature files, how about considering a move that can serve as a basis for EDR considerations from the next fiscal year onwards? Is not it?

Build a state-of-the-art threat posture with logic against unknown malware and threats, including behavioral detection and machine learning detection.

Start with antivirus Replace antivirus with NGAV and prepare an environment that can be expanded to EDR in the future

“Real-time performance is essential for EDR that responds to the latest threats.”

We recommend you to accurately understand the merits and demerits of each EDR product based on the customer's requirements and the introduction status of each product, and to consider the introduction after verification.

Build a system that can respond to the latest threats with or without detection logic for unknown malware and threats, such as behavior detection and machine learning detection logic.

With EDR, it is important to judge whether the product is capable of countering attacks that are similar to actual targeted attacks, from the perspective of whether detailed information linked to detection can be comprehensively confirmed. In addition, in order to respond to the rapid development of such attacks, the ability to collect logs in real time is essential. Also, build a secure environment with EDR, which has a hunting function, to capture threats using standard tools.

Introduction of EDR that responds to advanced attacks such as targeted attacks in real time and minimizes damage

"Comprehensive endpoint security with a single agent"

We recommend that you consider the EDR product from the perspective of whether it can be used as an endpoint platform based on your requirements and the status of each product's introduction.

Build a state-of-the-art threat posture with logic against unknown malware and threats, including behavioral detection and machine learning detection.

With EDR, it is important to judge whether the product is capable of countering attacks that are similar to actual targeted attacks, from the perspective of whether detailed information linked to detection can be comprehensively confirmed. In addition, in order to respond to the rapid development of such attacks, the ability to collect logs in real time is essential. Also, build a secure environment with EDR, which has a hunting function, to capture threats using standard tools.

We cannot overlook the burden on users due to the coexistence of various products, such as asset management products and vulnerability management products that are currently being used on endpoints, and the cost of mastering the separate consoles of target products on the administrator side. part. By using an integrated platform, you can reduce various costs in the medium to long term.

アンチウイルス、脆弱性管理、資産管理を統合することで、強固なセキュリティと運用工数の削減を両立

[Diagnosis key]