Solve business issues by integrating IT and management
What is Business + IT?
Login
Newsletter Registration
Business Expansion
There is no change in the structure that the weak yen is positive for the Japanese economy, and it is appropriate to continue easing = Bank of Japan Governor
2022/03/18
Renesas resumes production at three factories Temporarily halted after Fukushima offshore earthquake
2022/03/18
Yen exchange rate, 118 yen 86-87 sen = as of 5:00 pm on the 18th
2022/03/18
Sales Strategy
Farewell! "Annoying" mobile ads, the timing to "stab" consumers as seen in case studies
2022/03/10
How did TEPCO achieve a 130% increase in satisfaction with “improving customer experience” and “doubling efficiency”?
2022/03/09
The author of "Sales Is" talks about how to proceed with "sales DX" that is directly linked to results
2022/03/04
Cost reduction
What is the dangerous "SAP 2027 problem" as it is, how to "halve" the migration period and cost?
Special
2022/03/16
Paper documents that remain, hindering telework... is there a way to digitize them all at once?
2022/03/16
How to solve the troublesome "taxi receipt" problem for everyone involved
2022/02/09
Organizational Reform
A business improvement professional talks about the “corporate culture” that hinders DX, and the introduction of tools without thinking only creates bad habits?
Special
2022/03/18
The method by which Act Group centrally manages about 20 account information and shortens business hours to "1/3"
2022/03/18
How to create a “digital workplace” that is easy to work in both the office and remote
2022/03/16
Production/Manufacturing
What's so great about Walmart, ZARA, and UNIQLO? Reasons why “logistics” in the retail industry is extremely important
2022/02/21
Why did Daikin Industries become the top share in the world? Behind the scenes of inverter air conditioner development
2022/02/15
JR East, where the number of passengers has decreased sharply due to the corona virus.
2022/02/01
Crisis Management
How dangerous is Japan if crude oil "over 100 dollars per barrel" continues?
2022/03/18
How did you deal with cyberattacks in those days? "Information Leakage in the WinMX Era" "WannaCry"
2022/03/17
What is the impact of Russia's sanctions "SWIFT Exclusion"? Why is it called a financial “nuclear weapon”?
2022/03/09
Compliance
Experts explain why “sustainable products” became a hit, and the underlying change in consumer sentiment
2021/12/24
"Serious SDGs" promoted by L'Oreal, almost all facilities have already achieved carbon neutrality
2021/09/28
Apple's "child pornography detection technology" plan postponed, why was it criticized from all over the United States?
2021/09/07
Energy-saving and environmentally friendly
What are the odds of the United States embarking on a Russian crude oil embargo? Circumstances that shale mining will not be possible soon
2022/03/11
[Exclusive publication] 3 points seen in the sustainability survey of 110 companies
2022/01/27
Ajinomoto is also working on the triple bottom line of people, the environment, and profit, and the relationship between purpose management
2021/11/19
By industry and scale
Can the construction industry get out of the normalization of "overtime"? Structural problems emerging as DX progresses
2022/03/18
The 2024 problem of the construction industry is approaching, the wages of craftsmen who are not going up, and the labor shortage is accelerating... What is the solution?
2022/03/16
"Only one technology" that Mr. Audrey Tan emphasized in DX
2022/03/16
IT Strategy
The reason why Mr. Audrey Tan says "digital and IT are completely different things" for Japanese people
2022/03/09
Why is "medical digitization" delayed? What are Japan's challenges and solutions indicated by the 12,000 person survey?
2022/03/07
The reason why we were able to realize "120 hours of work reduction" with minor changes in expense settlement
2022/03/07
Backbone system
More than half of the people in charge are stressed, how can we improve the efficiency of the work "before" data analysis?
Special
2022/03/09
Why should we “respond now” to the “revised electronic book preservation law” with a two-year grace period?
2022/02/08
What are the tips for "data linkage that makes the site happy"? How to Drive “Automation” Without Programming
2022/01/24
Information system
How do you get "awareness" from customer's "qualitative data" such as tweets on Twitter?
Special
2022/03/18
65% fewer inquiries. Successful re-challenge! How to use Mobaoku's "AI chatbot"
2022/03/11
The end of retargeting, what is ad delivery using "customer data" required in the post-cookie era?
2022/02/02
Operation management
Only one thing to prepare before upgrading to Windows 11
2022/03/17
Ransomware still tops, increase in supply chain attacks, latest trends in cyber threats
2022/03/11
Is server power consumption a hindrance to AI and machine learning? What are the pain points unique to high performance?
2022/03/08
Security
I don't want too many alerts and false positives anymore, "Simple and smart protection" next-generation endpoint defense
Special
2022/03/11
“Spies” become active in the struggle for supremacy, and the “state-backed” cyber attacks are too dangerous
2022/03/11
Is there anything I can do if I get infected? Why Backup Data Needs a “Zero Trust” Concept
2022/03/07
Network
World market research for IoT investment (Part 2), which is the most interesting? Is the investment standard "cost" after all?
2022/01/26
World market research for IoT investment (Part 1), top 10 by application? Explanation along with success stories
2022/01/25
Six major trends to watch in the IoT market in 2022, 42% are willing to invest aggressively, but why the gap between companies is widening
2021/12/23
Mobile
Telework increases the load on device security, is there a more flexible and efficient way?
Special
2021/04/02
Telework's biggest concern... why "ensuring security" is not so easy
2020/08/28
What is IEEE802.11ax (Wi-Fi 6)? Details of the latest wireless LAN standards to understand with 5 advantages
2020/06/03
Hardware
Eight companies including Pana and Honda also established an association, full-scale spread of delivery robots and future issues
2022/03/03
The Possibility of Data Sharing Talked by a Storage Leader, What is a Budding Super City in Tohoku?
2022/02/09
Intelligent robots and data-driven transform warehouses and factories
2022/02/03
Development
Even though I introduced RPA, "no results"? Common points of failed companies
Special
2022/03/04
An easy-to-understand illustration of what CI/CD is, along with specific tools and approaches
2022/03/01
The low-code/no-code development market will grow significantly by 24.3%, reaching 100 billion yen by FY2023
2022/02/18
Newsletter Registration
What is Business + IT?
Related genres
Content provided by Japan HP Co., Ltd.
The rapid changes in the business environment triggered by the corona crisis have also affected the way companies think about security. Due to the spread of telework and the accompanying increase in mobile devices, reviewing endpoint security has become an urgent issue for companies. Let's explain a new defense that will be effective in the unlikely event that it is invaded by an external enemy that is already difficult to completely prevent.
The traditional security model was based on a perimeter-type defense that raised the walls to prevent intrusion into the internal network from the outside. However, due to the spread of telework, it is necessary to review this method. In addition, increasingly sophisticated cyberattacks such as malware and phishing have the potential to slip through perimeter defenses no matter how high they are, and in some cases even if the threat is already inside, it goes undetected. Against this background, zero trust network access has been proposed based on the basic concept of "always verify without unconditionally trusting" without distinguishing between the inside and outside of the network. One of the points of implementation is to apply strict security to the terminal used by each employee. In order to strengthen the security of terminals, in addition to antivirus software, EDR (Endpoint Detection and Response), which continuously monitors and responds to threats, can be used to detect malware, prevent execution of unauthorized programs, and improve device security. It is common to adopt a method such as isolation of Among them, a new security model has also emerged that uses application virtualization to contain attacks so that they do not affect the operating system. Continuation of this article >>・Outline of the new security model, why can it be “isolated” even if it is invaded by malware?・How to make up for the missing elements in EDR and EPP?・Mechanism to observe and understand attacker's intentions without being infectedThis continuation is for members only
From here onwards, only those who have registered as a "Business + IT Premium Member" (registration is free) can use it.
Register now (free) Log inRegister as a Business + IT member now.
All free! Full of benefits for business and IT!
Completely free of charge What are the benefits of a business + IT premium membership?Malware that can no longer be completely prevented, what is a method that allows you to "swim" even if it is invaded?
[Case study] The best way to protect customer information from the latest threats, chosen by one of Japan's most famous hotels
Survey results show the limits of existing telework environment security measures What is the solution?
Thorough explanation of actual examples of cyber attacks that occurred in the first half of 2021 Hints for defense measures obtained from the latest trends
SB Creative Co., Ltd.
Business + IT is operated by SB Creative Corp. of the SoftBank Group.
By registering as a business+IT member, you can subscribe to members-only content and e-mail newsletters, and be invited to special seminars!
Navigation Lists
Malware that can no longer be completely prevented, what is a method that allows you to "swim" even if it is invaded?Category
Related Articles
Hot Articles