Enterprise Europe Network

A Japanese cyber security company has developed an endpoint security software to detect unknown threats.

Country of origin:
Country: 
JAPAN
Opportunity:
External Id: 
TOJP20171208001
Published
08/12/2017
Last update
04/12/2018
Expiration date
06/12/2019

Keywords

Partner keyword: 
ELECTRONICS, IT AND TELECOMMS
Information processing & Systems, Workflow
Computer Software
Data Protection, Storage, Cryptography, Security
Internet of Things
Other computer services
Integrated software
Software services
Other information technology and computer service activities
Security systems service activities
EXPRESS YOUR INTEREST

Summary

Summary: 
The Japanese company is looking for Original Equipment Manufacturers in the Internet technology security field interested to implement its heuristic application based security software within their products: antivirus software, asset management and firewall/gateway products. Not depending on pattern files, the software is more efficient than others on the market. A technical agreement is expected with partners located in Finland, France, Germany, the Netherlands and the United Kingdom.

Description

Description: 

The Japanese company is a cyber security software developer that is now approaching the EU market after successfully expanding in Japan and the US with their products.

The company offers seeds based R&D in Cyber Security such as researches / threat analyses regarding security vulnerabilities used for targeted attacks and built-in systems etc. and developments of countermeasure technology. It has track record of discovering more than 100 critical vulnerabilities (most in Japan), achievements of research regarding targeted attack malware and development of countermeasure technology.

The company's technology, consists of a heuristic application of five types of engines:

1. Static analyses
Analysis performed without program operation. Detection is performed by using N-Static Analysis that incorporates numerous analysis methods including Portable Executable (PE) Structure Analysis, Linker Analysis, Packer Analysis, and Speculated Operation Analysis.

2. Sandbox
Runs programs on a virtual environment that includes a virtual CPU, virtual memory and virtual Windows subsystems. Detection is based on a combination of commands based on the company developed U-Sandbox Detection Logic software.

3. Dynamic analyses
Monitors the behavior of currently running programs. The company software detects behavior such as program intrusion, unusual network access, key logger and backdoor access behavior.

4. Machine learnings
Monitors running programs based on big data related to malware that has been captured by the Japanese company. Behavioral characteristics in big data are extracted to detect malicious behavior in computer terminals by using machine learning to analyze such characteristics.

5. Vulnerability attack protection
Protects against virus attacks that target known and unknown vulnerabilities such as attacks when viewing emails or Web pages. Protects against arbitrary code execution vulnerability attacks by use of company’s original technology.

The company was established in 2007 and their stocks are listed on the Mothers section of Tokyo Stock Exchange, which is for high-growth start-up companies.

The company has developed a leading edge next generation endpoint security software to detect unknown threats. The product was the No. 1 of units sold in the targeted attack protection field in Japan. However, this technology profile has been not known in Europe. That is why the company would like to use their technology in combination with European potential partners' products.

Targeting partners located in Finland, France, Germany, Netherlands and the United Kingdom, the company is looking for Original Equipment Manufacturers that would be interested to implement its software within their products: for example antivirus software, asset management and firewall/gateway products.

A commercial agency agreement with technical assistance is expected to be signed with the relevant partners.

The company's research results have been announced at major international conferences related to cyber security and raised interest from major media globally.

The company has technical capabilities to be chosen by most of Japanese national / local governments, major systems' integrators and financial institutions in order to protect their business systems as their endpoint security. This fact allows the company to create their own products such as targeted attack countermeasure software and automated malware analysis tool.

The CEO of the company has been serving as a researcher in a Japanese Governmental agency and is an adviser in many IT security related projects managed by various Japanese Ministries. He received an award from a national IT Institute and is member of a committee in a major IT organisation.

The company has shared their own information and knowledge with the world in order to develop proactive technology engines for detecting unknown threat and to lead security technology globally.

Advantages & innovations

Cooperation plus value: 
The company's technology, consists of a heuristic application of five types of engines that work in behavioural detection and provide better performance compared to similar products as detailed here below. Unlike most products of the competition, these engines do not depend on pattern files at all. In fact, these engines have successfully detected major unknown threats since 2009, for instance, ‘Bad Rabbit,’ ‘WannaCry,’ ‘Spora,’ and ‘PETYA’ and so on. Engines are updated generally twice per year by leading latest knowledge and information. With these engines, the PCs do not need to be scanned regularly, which means this system is less burdensome and comfortably operated. Moreover, no signature is required so that a result of detection does not change even if these computers are operated in an offline (closed) environment. Therefore, the engines are an ideal countermeasure for organisations who do not want to be connect online, to be scanned or having their data drawn onto the cloud.

Stage of development

Cooperation stage dev stage: 
Already on the market

Partner sought

Cooperation area: 
The ideal partners are Original Equipment Manufacturer (OEM) companies in the Internet technology security field and which have their own products such as antivirus software, asset management and firewall/gateway products. The European partners could make use of the above mentioned 5 engines for their own products. The partnership, which will integrate these Japanese companies' heuristic engines and European companies’ products, should help to expand both companies’ businesses in the European market.

Type and size

Cooperation task: 
SME 11-50,R&D Institution,>500 MNE,251-500,SME 51-250,>500

Dissemination

Dissemination sector group : 
Dissemination preferred : 
Finland, France, Germany, Netherlands, United Kingdom