A Japanese cyber security company has developed an endpoint security software to detect unknown threats.
The Japanese company is looking for Original Equipment Manufacturers in the Internet technology security field interested to implement its heuristic application based security software within their products: antivirus software, asset management and firewall/gateway products. Not depending on pattern files, the software is more efficient than others on the market. A technical agreement is expected with partners located in Finland, France, Germany, the Netherlands and the United Kingdom.
The ideal partners are Original Equipment Manufacturer (OEM) companies in the Internet technology security field and which have their own products such as antivirus software, asset management and firewall/gateway products. The European partners could make use of the above mentioned 5 engines for their own products. The partnership, which will integrate these Japanese companies' heuristic engines and European companies’ products, should help to expand both companies’ businesses in the European market.
The Japanese company is a cyber security software developer that is now approaching the EU market after successfully expanding in Japan and the US with their products. The company offers seeds based R&D in Cyber Security such as researches / threat analyses regarding security vulnerabilities used for targeted attacks and built-in systems etc. and developments of countermeasure technology. It has track record of discovering more than 100 critical vulnerabilities (most in Japan), achievements of research regarding targeted attack malware and development of countermeasure technology. The company's technology, consists of a heuristic application of five types of engines: 1. Static analyses Analysis performed without program operation. Detection is performed by using N-Static Analysis that incorporates numerous analysis methods including Portable Executable (PE) Structure Analysis, Linker Analysis, Packer Analysis, and Speculated Operation Analysis. 2. Sandbox Runs programs on a virtual environment that includes a virtual CPU, virtual memory and virtual Windows subsystems. Detection is based on a combination of commands based on the company developed U-Sandbox Detection Logic software. 3. Dynamic analyses Monitors the behavior of currently running programs. The company software detects behavior such as program intrusion, unusual network access, key logger and backdoor access behavior. 4. Machine learnings Monitors running programs based on big data related to malware that has been captured by the Japanese company. Behavioral characteristics in big data are extracted to detect malicious behavior in computer terminals by using machine learning to analyze such characteristics. 5. Vulnerability attack protection Protects against virus attacks that target known and unknown vulnerabilities such as attacks when viewing emails or Web pages. Protects against arbitrary code execution vulnerability attacks by use of company’s original technology. The company was established in 2007 and their stocks are listed on the Mothers section of Tokyo Stock Exchange, which is for high-growth start-up companies. The company has developed a leading edge next generation endpoint security software to detect unknown threats. The product was the No. 1 of units sold in the targeted attack protection field in Japan. However, this technology profile has been not known in Europe. That is why the company would like to use their technology in combination with European potential partners' products. Targeting partners located in Finland, France, Germany, Netherlands and the United Kingdom, the company is looking for Original Equipment Manufacturers that would be interested to implement its software within their products: for example antivirus software, asset management and firewall/gateway products. A commercial agency agreement with technical assistance is expected to be signed with the relevant partners. The company's research results have been announced at major international conferences related to cyber security and raised interest from major media globally. The company has technical capabilities to be chosen by most of Japanese national / local governments, major systems' integrators and financial institutions in order to protect their business systems as their endpoint security. This fact allows the company to create their own products such as targeted attack countermeasure software and automated malware analysis tool. The CEO of the company has been serving as a researcher in a Japanese Governmental agency and is an adviser in many IT security related projects managed by various Japanese Ministries. He received an award from a national IT Institute and is member of a committee in a major IT organisation. The company has shared their own information and knowledge with the world in order to develop proactive technology engines for detecting unknown threat and to lead security technology globally.
Advantages and innovations
The company's technology, consists of a heuristic application of five types of engines that work in behavioural detection and provide better performance compared to similar products as detailed here below. Unlike most products of the competition, these engines do not depend on pattern files at all. In fact, these engines have successfully detected major unknown threats since 2009, for instance, ‘Bad Rabbit,’ ‘WannaCry,’ ‘Spora,’ and ‘PETYA’ and so on. Engines are updated generally twice per year by leading latest knowledge and information. With these engines, the PCs do not need to be scanned regularly, which means this system is less burdensome and comfortably operated. Moreover, no signature is required so that a result of detection does not change even if these computers are operated in an offline (closed) environment. Therefore, the engines are an ideal countermeasure for organisations who do not want to be connect online, to be scanned or having their data drawn onto the cloud.
Already on the market
Intellectual Property Rights (IPR)
Patents granted,Trade Marks
Register your interest
How it works
- Tell us about yourself
- We’ll discuss with you
- We put the right partners in touch
EEN help you find the right partner, rather than you going it alone.
Our role is to review and collate the most suitable submissions, and then send them to the client who posted the opportunity. We consult with you, and the client, to make the process professional and easy.
These are live opportunities. Your registration of interest on the site is just like a professional approach to a business at a networking event. To stand the best chance of success, make your submission really sing. Sell why the client who posted the opportunity should work with you. Excite them. Ask questions. Try and avoid copy and pasting words from elsewhere.
Once the client has chosen their partner, we'll introduce them over email and keep in touch with both parties to see how it's going. Sometimes things progress quickly. Sometimes because of changing priorities for either party, things progress slowly, but you never know - your next big business break could start right here.
First we need to check you’re human.
Thank you for verifying your email. We have sent you a confirmation email containing a 6 digit verification code to unlock the form below