Security

We conduct assessments and vulnerability diagnoses for possible risks such as external intrusions and attacks, system failures, and leaks by insiders, and take highly reliable measures based on the results obtained.

Principal authentication and access control (Member site)

  • Password policy settings

    You can set default values ​​for password length (Number of characters) and complexity (combination of numbers, symbols, uppercase and lowercase letters).

  • Password reset function

    When a member forgets their password, they can reset it by themselves. Resetting will be done through an authentication E-mail which will have a set-time limit.

  • Automatic Login Suspension Setting

    If the attempt to login fails more than a certain number of times within a certain period of time, login with the particular ID will be blocked for a certain period of time. You can set the conditions for the same according to the policy of the organization.

  • Two-factor authentication through an authentication code

    While logging into the member site, you will not be able to log in unless you enter an authentication code in addition to entering your ID and password. The Two-factor authentication procedure reduces the risk of login by spoofing.

  • Member information viewing restriction setting

    Ensure that other unspecified member information cannot be easily extracted.

Principal authentication and Access control (Administrator site)

    IP filter (Address restriction)

    Restrict access to the administrator's site for specific IP addresses only. By preventing access from unspecified IP addresses, the risk of external attacks and intrusions will be reduced. Using it along with the two-factor authentication can further increase security.

  • Two-factor authentication through an authentication code

    There are two types of two-factor authentication on the administrator site.

    1. E-mail authentication
    A verification code will be sent to the email address you registered in with.

    2. Google Authentication System (Google Authenticator)
    An authentication code will be sent to your mobile phone. You will be required to install the Google Authenticator app on your mobile phone.

    Security can be further enhanced by using it together with an IP filter.

  • Automatic Login Suspension Settings

    If the login attempts fails more than a certain number of times within a certain period of time, the login from that particular ID will be blocked for a certain period of time.

権限管理

  • Administrator authority settings

    If there are multiple administrators, they can be divided into two groups; the first administrator and the second administrator, and each group can be given different privileges. You can set up detailed settings for the authority to change various settings related to system use, such as: the authority to create contents, the authority to view and change personal information data etc.

  • Content usage restrictions for members

    You can limit the available content for each membership type.

  • Management of personal information by members themselves

    By changing the settings on My Page, members can determine the scope of disclosure of personal information at their own discretion. If you wish to restrict the viewing of your personal information on the member site, administrator can restrict members from changing their settings.

Countermeasures against unauthorized access, malware, and eavesdropping

  • Firewall

    Set the access permissions to the server at a minimum, and block unnecessary and unauthorized access to the server.

  • Anti-virus

    All files on the server are regularly scanned for viruses. In the unlikely event that a malicious program is detected, it will be removed immediately.

  • Communication encryption

    Encryption of all communications during system use prevents personal and other confidential information from being intercepted by third parties.

Fault tolerant measures

  • System maintenance & monitoring

    We continously monitor the performance of the web and DB servers and are prepared to respond quickly in the event of emergencies such as a sudden rise in access or system failure.

  • Data Backup

    Back up data to a highly durable storage to prepare for any emergencies.

  • Reliable data center

    We employ highly reliable data centers with a strong backbone and thorough management systems.