29.12.2014 Views

Information Security Report 2010 - Nec

Information Security Report 2010 - Nec

Information Security Report 2010 - Nec

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

(Centralized Management of <strong>Security</strong> Status)<br />

Status data associated with security measures, including<br />

the software patches and anti-virus software noted above,<br />

is collected in a centralized management system. The<br />

data is available for <strong>Information</strong> <strong>Security</strong> Managers and<br />

<strong>Security</strong> Promotion Managers in their own divisions in a<br />

timely manner.<br />

(2) Vulnerability Scans<br />

<strong>Information</strong> devices running on a variety of platforms,<br />

such as Windows, UNIX, LINUX, and Mac, connect to<br />

the NEC Intranet.<br />

We check the status of all information devices via our<br />

network by vulnerability scans.<br />

Managers in each division are able to view the status<br />

and address any vulnerabilities using specified methods.<br />

We can check the status of addressing the vulnerabilities<br />

across the NEC Group.<br />

By scanning vulnerabilities on a regular basis, we<br />

make it possible to address new vulnerabilities and thus<br />

maintain security levels.<br />

IT Platform for <strong>Information</strong> Protection<br />

To prevent information leak, it is necessary to identify<br />

the illegal route by which information is being distributed<br />

and to put in place appropriate measures based<br />

on a risk analysis. The NEC Group manages not only<br />

our own Group information but information from customers<br />

and information disclosed to suppliers. We<br />

maintain comprehensive measures based on the characteristics<br />

of networks, PCs, electronic media, and<br />

other IT components.<br />

(1) System to Prevent <strong>Information</strong> Leak<br />

The NEC Group has built a system to prevent information<br />

leak using its proprietary InfoCage system. Specifically,<br />

the system encrypts hard disks and files, restricts use of<br />

USB flash drives and other external storage media, and<br />

monitors PC operations. The system has proved to be<br />

enormously effective in preventing information leak.<br />

■ Overview of IT Platform for<br />

<strong>Information</strong> Protection<br />

■ Overview of System to Prevent<br />

<strong>Information</strong> Leak<br />

NEC Group System to Prevent<br />

<strong>Information</strong> Leak<br />

Preventing leak of customer information, confidential<br />

information and information on contracted work<br />

Secure <strong>Information</strong><br />

Exchange Site<br />

Enables secure exchange<br />

of information with<br />

customers<br />

Secure Email<br />

Distribution System<br />

Prevents misdelivery of<br />

emails sent from NEC<br />

Thin Client Service<br />

System in which customer<br />

information is not stored<br />

on the PC<br />

InfoCage PC <strong>Security</strong><br />

Function 1: Hard Disk Encryption<br />

Function 2: Control Over Use of<br />

External Storage Media<br />

Through policy settings,<br />

allow use of only particular<br />

USB flash drives and other<br />

devices<br />

Function 3: Pc Operation Logging<br />

Client PC<br />

Policy Receipt Client<br />

File Access Control<br />

Management<br />

Function 5: File Auto-Encryption<br />

Regular automated<br />

scanning finds unencrypted<br />

files and automatically<br />

encrypts them<br />

Function 4: Obtains Latest Policy Settings<br />

as Defined Company-Wide or<br />

by Division<br />

NEC CORPORATION<br />

<strong>Information</strong> <strong>Security</strong> <strong>Report</strong> <strong>2010</strong> 11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!