• Vulnerability/penetration testing, vulnerability management and patch management implementation
  • Incident response and forensic root cause analysis
  • Secure technology architecture, secure coding, and secure technology strategy and planning
  • Secure technology implementation (firewall, IDS, IPS, and other)

Cyber Threat Intelligence

  • Intelligence analysis and reporting
  • Threat hunting workshops and training; outsourced threat hunting
  • Threat intelligence and IDS/firewall integration
  • CyberFusion implementation


  • GDPR, Japan Privacy Law and other privacy compliance services
  • Internal employee security training
  • Desktop recovery exercise creation and mentoring
  • ISMS, security audit, IT audit outsourcing
  • Outsourced security operations and outsource CSO