{"id":2978,"date":"2021-07-09T03:10:18","date_gmt":"2021-07-08T19:10:18","guid":{"rendered":"https:\/\/kirin.mycycraft.com\/threatwall\/"},"modified":"2024-01-19T17:14:54","modified_gmt":"2024-01-19T09:14:54","slug":"threatwall","status":"publish","type":"page","link":"https:\/\/kirin.mycycraft.com\/ja\/threatwall\/","title":{"rendered":"THREATWALL"},"content":{"rendered":"
[vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”100px” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” bg_color=”rgba(10,10,10,0.01)” bg_image=”2041″ bg_position=”left top” background_image_loading=”default” bg_repeat=”no-repeat” scene_position=”center” top_padding=”8%” bottom_padding=”8%” top_padding_tablet=”30%” bottom_padding_tablet=”30%” top_padding_phone=”30%” bottom_padding_phone=”30%” translate_x=”0″ text_color=”light” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”2\/4″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][image_with_animation image_url=”1920″ animation=”Fade In” hover_animation=”none” alignment=”” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”50%” max_width_mobile=”default” margin_bottom=”3%”][vc_column_text css_animation=”fadeInRight”]\n<\/p>
The CyCraft ThreatWall Threat Intelligence Gateway (TIG) unifies automated detection and response with the latest in global threat intelligence surveillance in one multi-purpose box that stands guard 24\/7\/365. ThreatWall blocks both potential inbound threats from entering and compromising your environment as well as outbound traffic towards any unauthorized or malicious C2 server.[\/vc_column_text][nectar_btn size=”medium” button_style=”regular” button_color_2=”Accent-Color” icon_family=”none” css_animation=”fadeInLeft” url=”#popmake-2903″ text=”資料請求”][nectar_btn size=”medium” open_new_tab=”true” button_style=”regular” button_color_2=”Accent-Color” solid_text_color_override=”#ffffff” icon_family=”fontawesome” text=”情報データシート” css_animation=”fadeInRight” icon_fontawesome=”fa fa-arrow-right” url=”https:\/\/cycraft.com\/download\/CyCraft-ThreatWall-Data-Sheet_JP.pdf” margin_left=”8%”][\/vc_column][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”2\/4″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid” offset=”vc_hidden-sm vc_hidden-xs”][\/vc_column][\/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” top_padding=”5%” bottom_padding=”5%” top_padding_tablet=”10%” top_padding_phone=”10%” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none” exclude_row_header_color_inherit=”true” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text]\n<\/p>
CyCraft ThreatWall fully integrates with our CyberTotal global threat intelligence platform, routinely self-updates with the latest in global intelligence, provides enterprises with effective solutions to prevent new types of threats, and leverages contextual threat information to enrich indicators of compromise (IoC).<\/p>\n
ThreatWall can display multiple records in real-time, including all blocked traffic, recognize relevant evidence of malicious behavior, block outbound traffic to known C2 servers, provide reputation and confidence ratings of multiple intelligence companies for blocked targets from numerous international threat intel sources, and display the geographic address and country of origin of IP addresses. ThreatWall should be the first and last line of defense for any network seeking resilience against modern threats.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”30px” equal_height=”yes” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” bottom_padding=”3%” top_padding_tablet=”6%” bottom_padding_tablet=”16%” top_padding_phone=”6%” bottom_padding_phone=”16%” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none” exclude_row_header_color_inherit=”true” shape_type=””][vc_column column_padding=”padding-2-percent” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”5px” column_link_target=”_self” boxed=”true” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none”][image_with_animation image_url=”1337″ animation=”Fade In” hover_animation=”none” alignment=”center” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”custom” max_width_custom=”30%” margin_bottom=”10%” margin_top=”6%”]<\/p>
Generate compliance reports that adhere to standards issued by various National Information Security Information Sharing and Analysis Centers (ISAC) and other institutions (including F-ISAC, etc.)[\/fancy_box][\/vc_column_inner][vc_column_inner column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/4″ tablet_width_inherit=”default” bg_image_animation=”none” enable_animation=”true” animation=”fade-in-from-bottom” border_type=”simple” column_border_width=”none” column_border_style=”solid” delay=”200″][fancy_box box_style=”color_box_basic” icon_family=”iconsmind” box_color=”rgba(112,112,112,0.75)” box_color_opacity=”0″ box_alignment=”left” border_radius=”default” image_loading=”default” color_scheme=”dark” secondary_content=”here’s some awesome text that would only be shown on hover” icon_iconsmind=”iconsmind-Timer2″ min_height=”323″]\n<\/p>
ThreatWall enriches IOCs with up-to-date global cyber threat intelligence. Combined with AI-driven analysis, ThreatWall provides enriched and contextual threat intel on blacklists and malicious behavior.[\/fancy_box][\/vc_column_inner][vc_column_inner column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/4″ tablet_width_inherit=”default” bg_image_animation=”none” enable_animation=”true” animation=”fade-in-from-bottom” border_type=”simple” column_border_width=”none” column_border_style=”solid” delay=”300″][fancy_box box_style=”color_box_basic” icon_family=”iconsmind” box_color=”rgba(112,112,112,0.75)” box_color_opacity=”0″ box_alignment=”left” border_radius=”default” image_loading=”default” color_scheme=”dark” secondary_content=”” icon_iconsmind=”iconsmind-Money-2″ min_height=”408″]\n<\/p>
Gain up-to-date intel on malicious domains, C2 servers, IP addresses. Enjoy an IoC Capacity of over 50 million, and reduce the risk of zero-day attacks.[\/fancy_box][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”30px” equal_height=”yes” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” top_padding=”4%” bottom_padding=”6%” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none” exclude_row_header_color_inherit=”true” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”2\/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][image_with_animation image_url=”906″ animation=”Fade In” hover_animation=”none” alignment=”” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”100%” max_width_mobile=”default”][\/vc_column][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text]\n<\/p>
CyCraftの担当者がインシデントの解決をお手伝いします。また、インシデント対応、侵害調査、マネージド検出・対応の各サービスについてのご質問は随時受け付けております。<\/span><\/p>\n[\/vc_column_text][nectar_btn size=”small” button_style=”regular” button_color_2=”Accent-Color” icon_family=”none” text=”資料請求” url=”#popmake-2903″][nectar_btn size=”small” open_new_tab=”true” button_style=”regular” button_color_2=”Accent-Color” solid_text_color_override=”#ffffff” icon_family=”fontawesome” text=”情報データシート” css_animation=”fadeInRight” icon_fontawesome=”fa fa-arrow-right” url=”https:\/\/cycraft.com\/download\/CyCraft-ThreatWall-Data-Sheet_JP.pdf” margin_left=”8%”][\/vc_column_inner][vc_column_inner column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/4″ tablet_width_inherit=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":" [vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”100px” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” bg_color=”rgba(10,10,10,0.01)” bg_image=”2041″ bg_position=”left top” background_image_loading=”default” bg_repeat=”no-repeat” scene_position=”center” top_padding=”8%” bottom_padding=”8%” top_padding_tablet=”30%” bottom_padding_tablet=”30%” top_padding_phone=”30%” bottom_padding_phone=”30%” translate_x=”0″ text_color=”light” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column…<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"\n