About Jupiter Project
The most valuable thing in this world is information. All people act on information. Since humans are fighting various battles in a competitive society, confidentiality of information becomes important. Regardless of the times, importance of information is important from ancient times. As a result, the taxi family who carried out "the fortune-tellinger of the future information" had a high social status and carried out "the development of the information network based on mail delivery", became the first aristocrat. It is security to safely manage the valuable information. It is information security that includes everything from attacks such as cyber terrorism, leaks inside the company, and spies.
In this Jupiter project, we will develop and disseminate a framework that provides comprehensive security including it, while specializing on block chains. Even a national organization frequently receives a cyber attack and has leaked information. In order to deal with new cyber attacks such as targeted attacks that continue to be sophisticated and complex every day, it is necessary to deeply acknowledge how to deal with targeted attacks and to deal with necessary measures to function . The reason why our project is still necessary now will be obvious when we see examples of information leakage by the following government agencies.
Proportional to the importance of information, companies are now paying huge costs regarding security. More than that, it is said that companies' losses due to hacking and information leaks, etc. average more than 200 million yen per year. Why is this loss of security due to inadequacies inevitable? It is because the existing security system is incomplete and partial. Even companies that manage enterprise security do not have companies that can manage all cyber terrorism, corporate leaks, software bugs, etc. in one company.
In this Jupiter project, we will develop and disseminate a framework that provides comprehensive security including it, while specializing on block chains.
- Protection against cyber terrorism.
- AI monitors vulnerabilities within all managed nodes for 24 hours Monitoring Management attack IP address by automatic optimization assignment Attack avoidance system.
- System creation that prevents internal information leakage.
- Project Leader Information defense system centered on Matsuda studies.
- Unique defect-free block chain development.
- Smart Contract technology that enhances anonymity and has no hacking risk.