Breadcrumb navigation

NEC's Cyber Security

Information Security Report 2023new window

NEC’s Cybersecurity Strategy

By leveraging the collective strength of the entire Group to provide safe, secure, and comfortable social infrastructure and combat cyberattacks, which are a growing problem for the global community, NEC will help achieve an information society that is friendly to humans and the earth.

Amidst the recent advances in DX*1, there has been a drastic change in the way people work, such as an increasing number of people choosing to telework. This has led to a convergence between physical space (real-world) and cyberspace, where nearly everything is interconnected. In a world like this, the potential for security risks exists everywhere requiring proactive responses to emerging threats. To do business safely while adapting to the rapidly changing business environment, cybersecurity is crucial more than ever.

NEC has accumulated and makes use of numerous technologies that support essential social infrastructures, ranging from domestic traffic control systems, disaster prevention and firefighting systems to production management systems, water management systems, ATMs, logistic systems, and even those systems used on the ocean floor and in outer space. By leveraging these technologies, we provide total security solutions that integrate the physical space and cyberspace to the global market. Moreover, to address ever-evolving cyber risks, we put emphasis on creating secure products and maintaining security of products, as well as on protecting against attacks. Instead of retrofitting security measures, we promote the implementation of security in all the stages from design to construction and operation, including the execution framework.
Based on these achievements and know-how, NEC contributes to the realization of a safe and secure information society through cybersecurity.

  • *1
    DX: Digital Transformation

Our key activities

  • Collaboration with Relevant Organizations
  • Contribution to National Projects
  • Organizational Structure for Offering Advanced Services
  • Development of In-House Human Resources
  • Development of Security Human Resources in Japan
  • Providing Training Programs for Customers
  • Thorough Security Implementation
  • Supporting the Enhancement of Security Based on In-House Operational Expertise

What NEC Can Do to Help Customers Achieve Total Optimization

NEC has launched data-driven cybersecurity business that realizes DX in security operations through two cycles: "operational monitoring/response" and "management decisions/process reform" using operation monitoring data.
The data-driven cybersecurity business involves repeating operation monitoring in short-term cycles on a daily basis and making improvements continuously in medium-to-long term-cycle. Using these two cycles in combination, we support the implementation of total optimization while working together with the customer. From the perspective of management, this support provides values of enhanced security governance and support in appropriate investment decisions and accountability. In terms of operation monitoring and incident response, we minimize damage through rapid incident detection, identification, and recovery.
And, in the aspect of security measures, we make it possible to achieve total optimization for the customer’s existing measures as well as for measures tailored to the attacks being received.

Cutting-Edge Research and Development of Cybersecurity Technologies

NEC protects social infrastructure and organizations from the threats of cyberattacks through research and development activities for both system security and data security based on the Security by Design concept.
An example of system security research is "automated secure system design" aimed to automate the design of secure ICT systems. This research automates the processes of secure system development and security operation, which previously required a large number of person-hours, in order to support system design, development, and operation.
Examples of data security research include "privacy-preserving biometric authentication" and "privacy-preserving federated learning". "Privacy-preserving biometric authentication" contributes to the safe and secure use of facial recognition and other biometric authentication services. For example, facial recognition performs authentication while keeping the amount of biometric features encrypted. "Privacy-preserving federated learning" is research that builds an AI model without the need for organizations to disclose their data to each other. It does not gather data directly. Instead, it achieves attribute estimation across industries. By utilizing this technology, we aim to integrate AI models of diverse industries and provide an integrated AI platform that enables mutual estimation of attributes.

To learn more about NEC’s approach to cyber security, please download “Information Security Report 2023”


  • To Be “Truly Open, Truly Trusted”
  • On the Publication of “Information Security Report 2023”

NEC's Information Security Report

  • Information Security Promotion Framework
  • Information Security Governance
  • Information Security Management
  • Information Security Infrastructure
  • Information Security Personnel
  • Measures Against Cyberattacks
  • Information Security in Cooperation with Business Partners
  • Providing Secure Products, Systems, and Services

Cutting Edge of NEC’s Information Security

  • NEC’s Cybersecurity Strategy
  • Response to New DX-Rerated Security Risks
  • Examples of Cutting-Edge Research and Development of Cybersecurity Technologies
  • Third-party Evaluations and Certifications
  • NEC Group Profile

Case Studies

NEC Security Blog

Engineers from the NEC Security Engineering Center provide technical topics related to cybersecurity.