GTM-MQNC2Z4
Skip to main content

Future Issue

Issue contents are tentative.

Vol. 55, No. 5, 2019, "Security to Support Connected Society"

Japanese version: Magazine FUJITSU (Vol. 70, No. 2, April 2019)

Cover Image

Preface

Junichi Saito, Corporate Executive Officer, EVP, Head of Global Cyber Security Business Group

Overview

Fujitsu's Engagement on Cyber Security in Supporting Connected Society
Innovative digital technologies, such as cloud, big data, AI, and the IoT have now become familiar, and the digitalization of society is accelerating. A connected society, formed by connecting everything—including humans and things—with data is affecting the structure of social and economic systems and the fundamental ways in which they work, which is in turn dramatically changing our daily lives. This connected society created by digital innovation, is advancing the digitalization of customers' business environments and businesses themselves in an unstoppable manner. As these changes bring improved convenience, at the same time, we are confronted by emerging new threats, which makes cyber security for protecting systems and data indispensable. In view of this situation, Fujitsu is aware that cyber security is the lifeline which supports the basis of its business, and it is recognized that it is the mission of Fujitsu to keep the ability trusted by the customer. This paper describes Fujitsu's engagement on cyber security to support a connected society.

Solutions to Support Connected Society

Global Managed Security Service to Protect Customers' ICT Environments
With an increase in security attacks in recent years, the methods of attacks are becoming increasingly complex and sophisticated, and security monitoring is critical for detecting such attacks quickly. Fujitsu provides FUJITSU Security Solution Global Managed Security Service (GMSS), which provides a one-stop solution for the operation of customers' security management. One feature of this service is that specialized security analysts with advanced skills grasp the latest security trends and the characteristics of customers' ICT environments. Based on these, the analysts closely examine alerts and suggest methods for handling any problems encountered to provide support with temporary to permanent measures. In addition, Fujitsu's proprietary technologies developed in-house and advanced technologies from security vendors all the world are combined to build a platform capable of detecting threats at a high level. This paper describes the features and scope of application of GMSS as well as the latest technological trends in cyber security monitoring.
Advanced Threat Centre and Future of Security Monitoring
With an increase in security attacks in recent years, the methods of attacks are becoming increasingly complex and sophisticated, and security monitoring is critical for detecting such attacks quickly. Fujitsu provides FUJITSU Security Solution Global Managed Security Service (GMSS), which provides a one-stop solution for the operation of customers' security management. One feature of this service is that specialized security analysts with advanced skills grasp the latest security trends and the characteristics of customers' ICT environments. Based on these, the analysts closely examine alerts and suggest methods for handling any problems encountered to provide support with temporary to permanent measures. In addition, Fujitsu's proprietary technologies developed in-house and advanced technologies from security vendors all the world are combined to build a platform capable of detecting threats at a high level. This paper describes the features and scope of application of GMSS as well as the latest technological trends in cyber security monitoring.
Supply Chain Security Measures Using Outcome-based Approach
In recent years, the increasing cyberattacks targeting companies and organizations that have supply chains without sufficient security measures and the fragmentation of security standards in various countries, e.g. similar but not identical and/or sometimes conflicting, have caused an increase in the burden of security measures on companies and organizations. Conventional supply chain security measures can hardly resolve the adverse effects of this fragmentation. To deal with this situation, Fujitsu thinks that it can contribute to supply chain security measures by making use of the outcome-based approach, which is increasingly being used by some regulators and standardization organizations. In this approach, only the results to be accomplished by security measures are specified as requirements, and the selection of the specific security measures is left up to those taking the security measures. This will provide benefits that include a reduction in the burden on both purchaser and suppliers involved in supply chains. This paper presents the method of introduction of this approach and its benefits.
Secure SI Ensuring Security in Entire Life Cycles of Systems
In recent years, cyberattacks have been on the rise, and the responsibility of system integrators offering secure systems to customers is becoming all the greater. In order to fulfill this responsibility, security must be incorporated into entire system integration (SI) that covers all processes, from planning and requirements definition to operation and maintenance. That is why Fujitsu is working on secure SI. Secure SI is ensured security added to conventional SI for the purpose of assuring quality. Fujitsu is discovering and developing human resources capable of practicing this secure SI and certifying them as Security Meisters to contribute to customers' projects. This paper describes specific secure SI activities.
Training of Cybersecurity Human Resources to Support Future Social Development
The training of security engineers with advanced technological capabilities to support future social development is a key issue, both in Japan and overseas. Securing and developing such human resources requires the formation of an ecosystem where organizations can cooperate broadly beyond corporate borders with the industrial world, public bodies, and educational institutions. Up until now, Fujitsu has carried out activities to train security engineers in cooperation with various organizations. Examples include the establishment of the Fujitsu Specialist Training Research Division at Kyushu University, participation in the task of defining security human resources by the Industry Cross-Sectoral Committee for Cybersecurity Human Resources Development, and a hands-on seminar held jointly with Ehime University and Ehime Prefectural Police. This paper describes the three activities for training security engineers through cooperation with these organizations and their results.

Technologies to Support Connected Society

Latest Trends in Research on Security Technologies
Digital co-creation is underway mainly in relation to data, which is being referred to as the "new oil of the 21st century." Meanwhile, new risks are also emerging, such as cyberattacks, which are expected to intensify due to the utilization of the IoT, compliance with regulations relating to personal data, and ensuring the reliability of data to be fed to AI. Security technologies are raising expectations as technologies that support the trust of humans, data, and systems. Fujitsu Laboratories is conducting research and development in the three core areas of authentication/authorization, data security, and cyber security for the purpose of supporting safety and security of all customer businesses. This paper first outlines the security technologies that Fujitsu Laboratories is working on. Next, as a topic of the latest research, it describes a technology to ensure the trust of data by making use of blockchain technology.
Security Technology ConnectionChain for Securely Linking Blockchains
Blockchain, which is used for the management of virtual currency, is raising expectations in many different fields as a distributed ledger technology that realizes secure transactions between multiple blockchain participants through decentralized operation. Increasing the value of blockchains requires linking various blockchains, but linking at an application level is insufficient to ensure transparency, as shown by the possibility of unauthorized operations by system operators. There is also a need to deal with errors that may occur when these operations are executed. In order to address these issues, Fujitsu Laboratories has developed Connection Chain, a security technology for securely linking and operating different blockchains. This paper presents the features of Connection Chain and its prototype system.
Biometric Authentication Technology Facilitating Protection and Management of Biometric Data
Recently, amendments to laws such as the Amended Act on the Protection of Personal Information (implemented in May 2017) in Japan and the General Data Protection Regulation in the EU (implemented in May 2018) have been increasing the need for safe management of personal data, with biometric data used for biometric authentication also falling under this scope. In utilizing biometric data, biometric data protection technology that allows for the easy handling of data while strengthening biometric data protections is attracting attention. However, there is a problem with this technology, with it difficult to achieve both security against biometric data leaks and accuracy in the provided biometric authentication. To deal with this issue, Fujitsu Laboratories has taken advantage of its palm vein authentication technology, one of its strength, to develop a biometric data protection technology that is robust against vein deformation. This technology facilitates the protection and management of biometric data and is expected to contribute to the expansion of personal authentication services that make use of empty-handed authentication, which requires centralized management of biometric data in the system. This paper presents examples of use of palm vein authentication technology and empty-handed authentication, which only requires biometric data for authentication without the need to enter IDs.
Cyber Range CYBERIUM for Training Security Meisters to Deal with Cyberattacks
Customers' systems today are constantly exposed to the threat of cyberattacks. To protect customers' business in this age, the response capabilities to minimize the damage in the event of cyberattacks on customers' systems are key. Fujitsu addresses this issue by training security meisters, human resources capable of responding to cyberattacks. To improve response capabilities against cyberattacks, training in a cyber range-a virtual space allowing trainees to experience simulated cyberattacks-is useful. With existing cyber ranges, however, it was difficult to reproduce various systems and for systems engineers in various parts of the country to use them on demand. Accordingly, we have developed CYBERIUM, a cyber range in which various systems can be reproduced in a virtual environment where trainees can learn online without time or location constraints. This paper describes the usefulness of CYBERIUM.
GTM-TTVHKKG

Services & Products

Corporate Information

Country Selector

Global

Change

World Map