{"id":1757,"date":"2025-01-16T13:55:22","date_gmt":"2025-01-16T06:55:22","guid":{"rendered":"http:\/\/localhost\/wordpress\/?page_id=1757"},"modified":"2026-02-27T12:57:46","modified_gmt":"2026-02-27T03:57:46","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/tekino-japan.com\/en\/services\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1757\" class=\"elementor elementor-1757\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d4b94b e-con-full e-flex e-con e-parent\" data-id=\"7d4b94b\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4d7a598 e-flex e-con-boxed e-con e-child\" data-id=\"4d7a598\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-076ea26 elementor-widget elementor-widget-heading\" data-id=\"076ea26\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber Security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6473c85 e-con-full e-flex e-con e-child\" data-id=\"6473c85\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-79952a3 e-con-full e-flex e-con e-child\" data-id=\"79952a3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f0e48fd elementor-widget elementor-widget-text-editor\" data-id=\"f0e48fd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"take-chance__info-title\">Staying safe in this cyber world<\/h2><p>The relentless pace of change in the digital world has fueled a surge in cyber threats. Proactive cybersecurity measures are no longer a luxury but a fundamental requirement for any enterprise seeking to thrive in today\u2019s competitive landscape. Tekino understands this critical need and offers comprehensive cybersecurity solutions tailored to your specific requirements. Our team of experts will work closely with you to assess your vulnerabilities, implement robust security measures, and provide ongoing monitoring and support to safeguard your business from evolving threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd8538a elementor-widget elementor-widget-image\" data-id=\"dd8538a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"838\" height=\"838\" src=\"https:\/\/tekino-japan.com\/wp-content\/uploads\/2025\/02\/security-concept-with-wooden-blocks-with-icons.jpg\" class=\"attachment-large size-large wp-image-3032\" alt=\"\" srcset=\"https:\/\/tekino-japan.com\/wp-content\/uploads\/2025\/02\/security-concept-with-wooden-blocks-with-icons.jpg 838w, https:\/\/tekino-japan.com\/wp-content\/uploads\/2025\/02\/security-concept-with-wooden-blocks-with-icons-300x300.jpg 300w, https:\/\/tekino-japan.com\/wp-content\/uploads\/2025\/02\/security-concept-with-wooden-blocks-with-icons-150x150.jpg 150w, https:\/\/tekino-japan.com\/wp-content\/uploads\/2025\/02\/security-concept-with-wooden-blocks-with-icons-768x768.jpg 768w, https:\/\/tekino-japan.com\/wp-content\/uploads\/2025\/02\/security-concept-with-wooden-blocks-with-icons-12x12.jpg 12w\" sizes=\"(max-width: 838px) 100vw, 838px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9837c16 elementor-widget elementor-widget-text-editor\" data-id=\"9837c16\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 style=\"line-height: 39px; color: #061d87;\">Our services<\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7cb154 elementor-widget elementor-widget-accordion\" data-id=\"e7cb154\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2431\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2431\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Security Services for Application<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2431\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2431\"><ul><li>Secure Application Design<\/li><li>Penetration Testing and Vulnerability Scanning<\/li><li>Authentication and Access Control<\/li><li>Secure Software Development Life Cycle<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2432\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2432\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Security Services for Cloud<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2432\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2432\"><ul class=\"info\"><li class=\"line\">Security Design<\/li><li class=\"line\">Identity and Access Management (IAM)<\/li><li class=\"line\">Data Encryption and Protection<\/li><li class=\"line\">Continuous Monitoring and Threat Detection<\/li><li>Network Security for Cloud Environments<\/li><li>Disaster Recovery and Business Continuity<\/li><li>Secure Cloud Migration<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2433\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2433\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Security Services for Cyber Operation<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2433\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2433\"><ul class=\"info\"><li>24\/7 Security Monitoring<\/li><li>Incident Response and Recovery<\/li><li class=\"line\">Security Platform Management<\/li><li class=\"line\">Managed Detection and Response<\/li><li class=\"line\">Security Operation Center as a Service<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb74355 elementor-widget elementor-widget-text-editor\" data-id=\"fb74355\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Reasons to go with us<\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f332027 e-grid e-con-boxed e-con e-child\" data-id=\"f332027\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-54648bf e-con-full e-flex e-con e-child\" data-id=\"54648bf\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a05e17 elementor-widget elementor-widget-text-editor\" data-id=\"1a05e17\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 id=\"reason-title\" class=\"name name--margin\"><img decoding=\"async\" class=\"aligncenter wp-image-1842\" src=\"https:\/\/tekino-japan.com\/wp-content\/uploads\/2025\/01\/24-hours-service_18494128.png\" alt=\"\" width=\"80\" height=\"80\" \/><\/h3><h3 class=\"name name--margin\">24\/7 Threat Monitoring &amp; Rapid Response<\/h3><p class=\"description\">Ensure uninterrupted security with our 24\/7 proactive monitoring and threat detection. Leveraging automation and data analytics, we swiftly mitigate vulnerabilities, minimizing disruptions so you can focus on business growth.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d40ac2 e-con-full e-flex e-con e-child\" data-id=\"5d40ac2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd889bf elementor-widget elementor-widget-text-editor\" data-id=\"bd889bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 id=\"reason-title\" class=\"name name--margin\"><img decoding=\"async\" class=\"aligncenter wp-image-1847\" src=\"https:\/\/tekino-japan.com\/wp-content\/uploads\/2025\/01\/lightbulb_1991530.png\" alt=\"\" width=\"80\" height=\"80\" \/><\/h3><h3 class=\"name name--margin\">Comprehensive &amp; Tailored Security Solutions<\/h3><p class=\"description\">Our end-to-end cybersecurity services, from threat prevention to incident response, are customized to meet your industry\u2019s specific needs. We adapt to the evolving threat landscape, ensuring robust protection and business continuity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c390a64 e-con-full e-flex e-con e-child\" data-id=\"c390a64\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c524e17 elementor-widget elementor-widget-text-editor\" data-id=\"c524e17\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1851 aligncenter\" src=\"https:\/\/tekino-japan.com\/wp-content\/uploads\/2025\/01\/talent-management_11647117.png\" alt=\"\" width=\"80\" height=\"80\" \/><\/h3><h3 class=\"name name--margin\">Expertise &amp; Cost-Effective Protection<\/h3><div class=\"flex-shrink-0 flex flex-col relative items-end\"><div class=\"pt-0\"><div class=\"gizmo-bot-avatar flex h-8 w-8 items-center justify-center overflow-hidden rounded-full\"><div class=\"relative p-1 rounded-sm flex items-center justify-center bg-token-main-surface-primary text-token-text-primary h-8 w-8\">Backed by industry-leading security professionals, we deliver high-value, cost-effective cybersecurity solutions without compromising on quality, safeguarding your digital assets efficiently.<\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u5b89\u5168\u306b\u904e\u3054\u3059 \u30c7\u30b8\u30bf\u30eb\u306e\u9032\u5316\u3068\u3068\u3082\u306b\u3001\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u3082\u5897\u52a0\u3057\u7d9a\u3051\u3066\u3044\u307e\u3059\u3002\u7af6\u4e89\u306e\u6fc0\u3057\u3044\u73fe\u4ee3 [&hellip;]<\/p>","protected":false},"author":2,"featured_media":0,"parent":37,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1757","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/tekino-japan.com\/en\/wp-json\/wp\/v2\/pages\/1757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tekino-japan.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tekino-japan.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tekino-japan.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tekino-japan.com\/en\/wp-json\/wp\/v2\/comments?post=1757"}],"version-history":[{"count":118,"href":"https:\/\/tekino-japan.com\/en\/wp-json\/wp\/v2\/pages\/1757\/revisions"}],"predecessor-version":[{"id":3748,"href":"https:\/\/tekino-japan.com\/en\/wp-json\/wp\/v2\/pages\/1757\/revisions\/3748"}],"up":[{"embeddable":true,"href":"https:\/\/tekino-japan.com\/en\/wp-json\/wp\/v2\/pages\/37"}],"wp:attachment":[{"href":"https:\/\/tekino-japan.com\/en\/wp-json\/wp\/v2\/media?parent=1757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}