Hitachi’s solutions thoroughly protects social infrastructure systems from security threats.
We offer a comprehensive security solution that covers everything from consulting in the upstream stages to the monitoring of operation, resulting in robust, multi-layered defenses.
In the current digital age, services in various business areas need to run uninterrupted, 24 hours a day, 365 days a year. While progress has been made in providing services more efficiently through technologies such as IoT, the methods of cyber attacks have become increasingly diverse and sophisticated—even verging on cyberterrorism.
That’s why security within the system is essential. But that alone won’t guarantee total protection.
Hitachi’s security approach
At Hitachi, we understand that rigorous security involves continuous improvements, which require additional protection at both the operational and organizational levels. With this understanding, Hitachi employs a security approach that focuses on four key attributes: Hardening (strong protection), Adaptive (flexibility), Responsive (dealing rapidly) and Cooperative (working with clients based on their needs). Under the principals of this security approach, we deliver a comprehensive defense solution that includes organizational, operational and systematic protection.
Hitachi also works closely with clients to co-create and develop scalable security measures, while offering a full range of services that cover the entire value chain—from consulting in the upstream stages to the monitoring of operations. At Hitachi, we’re committed to the protection of our social infrastructure systems. Together with our clients, we’ll continue to safeguard our future from the security threats of today and tomorrow.
We developed our security approach based on our wealth of experience in offering security services.
Hitachi has a long history of building social infrastructure systems. Based on the concept of a value chain, we have been providing a total solution ranging from consulting in the upstream stage to operations. In these initiatives, we’ve always focused on one question: What do customers need in order to provide their services with peace of mind? At Hitachi, we have continued to propose our security solution to social infrastructure companies based on a thorough understanding of their on-site operations.
Meanwhile, Hitachi also has a track record of operating IT infrastructure for approximately 300,000 internal users within the Hitachi Group. Through this initiative, we are continuing to add to our extensive knowledge on how to deal with cyber attacks.
Hitachi’s security approach was established on the basis of this experience and our history of safeguarding public and private institutions against threats.
Along with our cultivated capabilities in cyber and physical technologies, we’ll continue to work collaboratively with our clients to deliver comprehensive security solutions.
We customize the details of each solution based on our client’s needs, while providing systems for a broad range of fields .
Security Measures for Power Control Systems
We identify and anticipate every single risk in the entire large-scale system. We then establish a security policy based on developed countermeasures, which encompass the physical, informational and control systems. Through this structure, we’re able to protect infrastructures operating 24 hours a day, 365 days a year.
Security Measures for Information Systems
Information leakage is a reality of today’s digital age. Amid increasingly diverse and sophisticated cyber attacks, vulnerabilities in IT infrastructures are being discovered every day. But that doesn’t mean risks are unavoidable. At Hitachi, we protect IT infrastructures with a defense-in-depth framework—integrating perspectives ranging from entrance and exit, to diffusion countermeasures. By doing so, we safeguard information assets that are the lifeline to any company.
Service that Supports Hitachi’s Solution
CSMS-Based Security Consulting
In order to implement effective security measures, it’s important to gain an overview of the threats and countermeasures, while clarifying the baseline protection. That’s the first step we take with our clients through Hitachi’s consulting service, Support Service to Build CSMS. CSMS is a security management system for control systems, prescribed by international standards. This consulting service not only covers the planning of security measures based on risk assessment, but also operations. In establishing a secure organization, we build an internal security system for clients, implement exercises to their employees, enhance physical security and offer training in matters of compliance standards. With this service, clients gain a foundational knowledge of security measures required to effectively safeguard their organization.
Broad Range of Physical Security Technologies
In order to implement physical security, Hitachi provides a broad range of technologies—including access control, video surveillance systems, license-plate recognition and video management. We also have a highly sophisticated analytics solution that puts data gathered from these technologies to use. For example, in the area of analysis of image data, we offer technologies such as behavioral analysis that recognizes people’s movements, people flow analysis that recognizes the flow of people and multi-perspective people search that can search for suspects based on external characteristics. In addition to the detection of abnormal movements, these technologies can also be leveraged in solving management issues such as quality improvements, streamlining of operations and diagnosis of potential problems.
Integrated Cyber/Physical Security Systems
At Hitachi, we’re able to continually strengthen security through an integrated monitoring of cyber and physical systems. Through advanced analytics, and using data obtained from monitoring technologies, we’re able to make quick decisions and take actions against potential threats.
All of this is possible through Lumada, a comprehensive IoT platform that serves as the basis for our physical and digital technologies. We’ve also created a system that enables clients to entrust us with operations—from design and development to operation and maintenance—so we can improve their ability to respond effectively to cyberattacks.