service SERVICE
-
crypto module library
C4CS Lite
With C4CS Lite, you have all the security modules your system needs. We provide a library (set) of security modules necessary for the system, such as encryption (common key/public key), hash functions, secret sharing, pseudo-random number generation, etc.
-
Cryptographic module (ActiveX)
C4Sax
A security module that allows you to easily encrypt data in Windows web applications and web services. Data is encrypted using our proprietary encryption “C4Custom”.
-
Cryptographic module (compatible with multiple OS)
MonoCrypt AES
A cryptographic module that has passed the high security standard "FIPS140-2" and is applicable and compatible with many target operating systems. AES, the US government recommended cipher, can be used as an encryption library.
-
Cryptographic library service for IBMi
Crypt for DB2 (“DB2 for i” only)
A cryptographic library exclusively for the database "DB2 for i" for IBM i. Enables column-by-column data encryption to protect personal information in the database.
-
file security solution
C4U Enterprise
A security product that allows you to easily encrypt files by inserting and removing a dedicated USB key. With a single USB key, you can log on and off to your PC and encrypt files.
-
Encrypted backup tool for IBMi
C4 Back up/400
“C4 Back up/400” is a security product for highly confidential IBM i backups. This highly secure and fast encrypted backup package allows you to encrypt your library without changing IBM i-specific members and files. An English version is also available.
-
Heterogeneous File Encryption Tool
CRYPTO RELAY
Encryption software that enables the exchange of encrypted files between various platforms such as general-purpose machines, UNIX, and Windows.
-
File encryption solution
FP Pro. Series
Advanced security measures with easy operation. Even those who are not familiar with IT can easily encrypt files and prevent leakage of personal and confidential information.
-
Vulnerability diagnosis service
We diagnose vulnerabilities in web applications and networks and implement risk countermeasures such as information leakage from the system.
-
Copyright protection solution
acuagraphy series (electronic watermark)
By embedding information (watermarks) in digital content such as still images, videos, and audio in a format that is difficult for humans to discern, it is useful for copyright protection and measures against unauthorized use.
-
Print security solutions
acuaprint (background pattern printing)
By embedding invisible information (a background pattern watermark) in the background of printed materials and printing a background pattern (hidden text), we can prove the original, prevent unauthorized use, and protect important assets.
-
Network security solutions (next generation firewall products)
Palo Alto Networks products
We propose advanced security measures using Palo Alto Networks products that are used all over the world. It can also be used for security measures during telework.
-
Network security solutions (UTM products)
Fortinet
Fortinet provides high-performance network security solutions that protect networks, users, and data from constantly evolving threats. We can propose a combination of products to suit your needs and budget.
-
Information leak prevention solution
ScreenWatermark
A solution that prevents information leaks due to unauthorized screenshots, screen shooting, and printing. You can easily output watermark text and images (watermarks) just by installing it on your PC.
-
Cloud environment construction support service
Google Cloud
Google Cloud is a cloud computing service provided by Google. You can use the same technology and infrastructure that Google uses in-house, such as Google search and Youtube.
-
virtualization solution
VMware
We use various virtualization solution products provided by VMware to help customers solve their problems. We will help you realize a highly flexible IT platform with agility, scalability, and fault tolerance using cutting-edge cloud technology.
Achievements left behind
48 years since its establishment.
We have a proven track record because we have focused on what is important.
It has a long track record in both the public and private sectors.
Number of projects per year
500 PJ
Annual number of business partners/customers
200 companies
Maximum number of trading years
47 years
Total number of qualified persons
1,870 people