Get the report: How to Achieve CIO-CEO Alignment in the Era of AI

close
close
Your Network of Tomorrow
Your Network of Tomorrow
Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.
Experience Netskope
Get Hands-on With the Netskope Platform
Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
A Leader in SSE. Now a Leader in Single-Vendor SASE.
Netskope is recognized as a Leader Furthest in Vision for both SSE and SASE Platforms
2X a Leader in the Gartner® Magic Quadrant for SASE Platforms
One unified platform built for your journey
Securing Generative AI for Dummies
Securing Generative AI for Dummies
Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
Modern data loss prevention (DLP) for Dummies eBook
Modern Data Loss Prevention (DLP) for Dummies
Get tips and tricks for transitioning to a cloud-delivered DLP.
Modern SD-WAN for SASE Dummies Book
Modern SD-WAN for SASE Dummies
Stop playing catch up with your networking architecture
Understanding where the risk lies
Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
Netskope Technical Support
Netskope Technical Support
Our qualified support engineers are located worldwide and have diverse backgrounds in cloud security, networking, virtualization, content delivery, and software development, ensuring timely and quality technical assistance
Netskope video
Netskope Training
Netskope training will help you become a cloud security expert. We are here to help you secure your digital transformation journey and make the most of your cloud, web, and private applications.

Itochu Techno-Solutions Corporation (“CTC”) is a leading system integrator that continues to promote workstyle reform by strengthening zero trust security to create an environment where anyone can work safely from anywhere. As part of this initiative, the company adopted the cloud-based security platform Netskope as its cloud proxy. After about four years of operation, Netskope has delivered improved user convenience, enhanced security, and maximized performance.

It has greatly contributed to enabling employees to freely choose when and where they work.

Services icon
Industry
System Integrator
globe icon
Region
Japan
Employees
Employees
12,222
Date Founded icon
Year founded
1979

Managing Everything from Planning to Operations for Internal Systems Used by 9 Domestic Group Companies and 21,000 Users

Founded in 1972, CTC operates under the corporate identity “Challenging Tomorrow’s Changes.” The company provides a wide range of services as a system integrator, from system sales and construction to maintenance, operation, contract-based system/software development, information processing services, scientific and engineering information services, and cloud services.

 

To meet diverse customer needs, CTC operates through five specialized business groups tailored to specific industries and regions: Enterprise Business Group, Retail & Services Business Group, Information & Communications Business Group, Regional & Social Infrastructure Business Group, and Financial Business Group. These are supported by three overarching organizations: the Digital Services Business Group, which promotes DX and creates new services and businesses; the CRO Group, which drives company-wide marketing strategies and initiatives to expand CTC revenue; and the Technology Strategy Group, which advises top management on technical and strategic issues.

ctc-02-challenge-520x293

Within the Digital Services Business Group, the Cybersecurity Business Planning and Promotion Department leads CTC’s cybersecurity business. One of its initiatives is the Cybersecurity Laboratory (CSL), which leverages CTC’s global network to access advanced technologies early and provide fair, technically verified solutions tailored to customers’ challenges.

 

Today, the CTC Group consists of nine domestic companies, and including contractors and dispatched staff, approximately 21,000 users access the internal systems. The IT Infrastructure Systems Department of the Information Systems Division is responsible for everything from planning to operation and management of these internal systems. Takamichi Sugawara, General Manager of IT Infrastructure Systems Department, explains, “In the IT Infrastructure Systems Department, we support 21,000 users while outsourcing system operations, maintenance, and hardware support to group companies. As a multi-vendor company, we actively utilize products handled by each business group and participate in internal initiatives that demonstrate their effectiveness.”

Netskope provides high visibility, monitoring user activities and notifying managers when data is downloaded or uploaded using personal accounts.

Takamitsu Koreeda, Information Systems Headquarters, IT Infrastructure Systems Department, Network Systems Section
ITOCHU Techno-Solutions Corporation
ctc-takamitsu-koreeda-228

Transitioning to Zero Trust Security through workstyle reform by adopting the cloud-based security platform Netskope

From 2018 to 2023, under its third mid-term IT plan, CTC positioned zero trust security enhancement as a key focus area. The company promoted workstyle reform, supported hybrid work, and reviewed internal operations to drive DX, thereby building an environment where anyone could work safely and comfortably from anywhere. However, as the use of cloud services expanded, certain challenges emerged with PCs. Satoko Masuda, Manager of the Network Systems Section, IT Infrastructure Systems Department, explains “There were too many different PC types, and thin-client performance was an issue. Since the internal infrastructure for using cloud services was not yet fully developed, applying to use such services was cumbersome, and security measures were left up to individual departments.” To address these challenges, CTC decided to introduce secure PCs based on a zero trust model, ensuring both high usability and strong security.

ctc-03-solution-520x293

Before 2018, CTC’s offices nationwide accessed systems hosted in data centers. To use cloud services, traffic had to first route through the data center via a dedicated line and then pass through an on-premises web proxy. This led to heavy internet-bound traffic, bandwidth congestion, and increased costs. To resolve this, CTC introduced SD-WAN broadband lines, connecting both to the data center and to cloud services via a cloud proxy.

 

Initially, the company deployed a strict content-control cloud proxy to block unauthorized communication. However, this approach posed challenges for achieving a flexible and safe hybrid work environment. Takamitsu Koreeda, from the Network Systems Section, recalls “Content-based security control required heavy operational effort and didn’t provide enough user convenience. We searched for a zero trust cloud proxy that could maximize security, usability, and performance—and arrived at the cloud-based security platform Netskope. Netskope provides high visibility, monitoring user activities and notifying managers when data is downloaded or uploaded using personal accounts. We realized this approach could balance security, convenience, and performance.”

When we started exploring zero trust-based environments around 2019–2020, Netskope was the only solution capable of addressing our challenges. Testing results met our expectations, so we decided to implement it

Takamicihi Sugawara, General Manager, Information Systems Headquarters, IT Infrastructure Systems Department
ITOCHU Techno-Solutions Corporation
ctc-takamicihi-sugawara-228

Enhancing agent visibility on PCs to monitor communication and user activity, while enabling secure access for thin clients and external devices via Netskope.

Sugawara continues, “When we started exploring zero trust-based environments around 2019–2020, Netskope was the only solution capable of addressing our challenges. Testing results met our expectations, so we decided to implement it.”

 

In CTC’s network, Netskope agents are installed on secure PCs. When users connect to websites or cloud services, the agent automatically activates and visualizes communication content. About 70% of the 21,000 accounts currently use secure PCs, while others use thin-client terminals or non-removable PCs due to operational constraints. These connect through various methods such as Explicit or IPsec/GRE, but all traffic passes through Netskope, where private IPs are identified to ensure safe internet access. Sugawara explains “As a system integrator, CTC uses many types of devices in collaboration with customers and partners. Although connection methods vary, all communications are routed through Netskope to maintain security.”

ctc-04-results-01-520x293

Before Netskope, access control relied on filtering. Employees who wanted to access blocked sites had to request approval through their department head, who then forwarded the request to the IT Infrastructure Systems Department. Around 1,000 such requests were filed annually, and since it was difficult for IT to judge each case, most were simply approved. Department heads, however, struggled to monitor logs afterward, rendering filtering and whitelisting largely ineffective.

This is possible because Netskope provides deep visibility into activities. We’ve been able to detect and address security issues using this approach, achieving significant results.

Satoko Masuda, Manager, Network Systems Section, IT Infrastructure Systems Department
ITOCHU Techno-Solutions Corporation
ctc-satoko-masuda-228

Risky activities on PCs trigger pop-up warnings, as CTC aims to further enhance safety and usability through the adoption of Netskope

By contrast, Netskope visualizes communication and issues pop-up warnings to users when risky activity is detected. If the user still attempts to proceed, an alert is sent to their supervisor. Netskope, centered on visibility and monitoring, has been in operation for about four years and has firmly taken root within the organization, along with the concept of zero trust security.

 

For example, as part of shadow IT detection, if suspicious activity suggests that a user is uploading files to a personal cloud account, their supervisor confirms whether it is legitimate. Masuda explains “This is possible because Netskope provides deep visibility into activities. We’ve been able to detect and address security issues using this approach, achieving significant results.”

ctc-05-results-02-520x293

Netskope also allows pop-ups to be customized in Japanese, including images. CTC uses this feature to display pop-ups prompting employees to complete e-learning courses or to notify them when large file deletions occur in the cloud, or when files are moved from approved corporate cloud services to personal ones.

 

After four years of operation, Netskope now serves as a central hub for cloud services and internet access—an indispensable part of daily operations. Building on this foundation, CTC plans to further leverage Netskope to advance Activity-Based Working (ABW), enabling employees to freely choose when and where they work, while continuing its mission to become one of Japan’s leading security system integrators.

Connect with Netskope

Accelerate your cloud, data, AI, and network security program with Netskope