LAC Co., Ltd.

Taking full advantage of cutting-edge technology to make way for the future.

Report An Emergency Incident
Close

24-Hour Consultation, No Reservations Necessary

Emergency Inquiries: Cyber Emergency Center ®

Emergency Response Service to quickly support our customers during security-related emergency cases.
If you are in an emergency situation, please contact us now [Cyber Emergency Center]

For inquiries by email

email of Cyber Emergency Center ®

24-Hour Consultation, No Reservations Necessary

Emergency Inquiries: Cyber Emergency Center ®

If you are in an emergency situation, please contact us now [Cyber Emergency Center]

Services and Products

As pioneers, we build the future with trust and confidence beyond data protection

Japan Security Operation Center (JSOC®)

Since the year 2000, our Network Security Monitoring Service, operated by top Cyber Security Specialists has been offering 24/7 real-time analysis. With our Correlation Analysis system [LAC Falcon], LAC reports only the most critical attacks by eliminating false positives and unsuccessful attacks.

CloudFalcon

The CloudFalcon system gathers, aggregates, and analyzes logs from a wide range of security monitoring devices. By providing our customers with flexible cloud platform-based services in addition to a web portal-based interactive communication tool, we offer solid support for security monitoring and security operations.

Security Assessment Service

LAC offers total penetration testing services for a wide range of environments from Web Applications, Network (including Wi-Fi), and Servers to Smart Devices to detect vulnerabilities in your IT network system and protect you from cyberattacks.

Cyber Emergency Center

We support Business Continuity 24 hours a day, 365 days a year by providing emergency response services to our customers against any Security-related incidents using our deep forensic knowledge and network security expertise.

Cymulate

As a countermeasure against cyber-attacks, companies have introduced many security measures such as EDR, IDS / IPS, WAF, SASE, and DLP.However, no matter how much time and money spent to implement such measures, there is still the risk that they may not function effectively and may fail to detect threats.Breach and Attack Simulation (BAS) Cymulate runs attack simulations that automate the latest attack techniques and evaluates detection status in a short amount of time.