GMO Internet establishes new information security business
The new company – GMO Pepabo Guardian, will have its headquarters in Fukuoka.
GMO Internet Inc. (TYO:9449) is expanding further its lineup of activities by launching an information security business – GMO Pepabo Guardian. The new business will be headquartered in Fukuoka, the place where GMO Pepabo, another of GMO Internet’s subsidiaries, was established.
The official launch of GMO Pepabo Guardian is scheduled for September 3, 2018.
The company explains that the need for such a business has grown over the past years along with the increasing development of IoT and AI, as well as the ballooning use of mobile gadgets. All these trends have resulted in the need to provide enhanced information security online.
The new business will develop apps for the safe use of Internet, as well as all-in-one solutions for corporate clients. There will be collaborations with related businesses.
The launch of the new business is announced as GMO Internet has been seeking to bolster cyber defenses fr its customers. In March this year, the company unveiled its plans to establish “Group Information Security Audit Office” in an effort to strengthen information security management and audit function in the entire group. The aim is to protect important customer information from increasingly sophisticated cyber-attacks. The company also seeks to improve information security literacy and to foster security personnel.
Let’s also note that several of GMO’s businesses have been developing and implementing solutions related to cyber security. In April this year, for instance, Onamae.com, an ICANN-accredited domain registrar which is a part of GMO Internet, said it was launching a domain protection service for the administrators of websites it manages.
The owner of the website gets to set additional protections to a range of parameters – any change concerning these parameters will require an approval by the owner. The parameters include domain management, server name management, “whois” information management, automated updates management, etc. This means that even if a third-party manages to log in, the attacker will not be able to make any changes to the website, as the changes will require an approval by the lawful administrator and/or owner.