September 30, 2002
Nippon Telegraph and Telephone East Corporation
Trend Micro Incorporated


Launch of FLET'S Safety - A security service
for the broadband era


Nippon Telegraph and Telephone East Corporation (hereafter referred to as NTT East,Headquarters: Shinjuku, Tokyo. President: Mr. Satoshi Miura) has joined forces with Trend Micro Incorporated (hereafter referred to as Trend Micro, Headquarters: Shibuya, Tokyo, Chairman & CEO: Mr. Steve Chang) to provide a security service to meet the increasing security demands of household broadband connection users. The result, FLET'S Safety, will provide virus detection and removal and countermeasures for unauthorized access to customers who use the high-speed Internet access services, FLET'S ADSL and B-FLET'S at home, from October 1, 2002. This service will be launched in the Tokyo area and progressive service area expansion is planned.
Both companies will continue to collaborate to provide the rapidly expanding broadband market with a secure broadband environment for customers.


1. Background
Today, serious problems are caused by computer viruses that infect computers via the Internet and unauthorized computer access, and thus there is an increasing need for security measures to respond to these crises promptly, as Internet connection times become longer.
Further, in this age of ubiquitous networking*1 that has arisen from broadband and continuous connections, the Internet will become an even more essential means of communication in our daily lives. Therefore, there will be even more demand for security measures that can be easily executed by anyone at the gateways of their home networks*2, to allow them to enjoy the Internet in a safe and pleasant manner.
NTT East utilizes the security technology of Trend Micro, a company that boasts the largest share* of the world market for gateway antivirus software, and will launch the FLET'S Safety service to enable customers using FLET'S ADSL and B-FLET'S at home to efficiently combat viruses and unauthorized access.

* According to the IDC "Antivirus Software 2002: A segmentation of the Market" survey.


2. Service Overview
(1) Overview
This service will maintain and manage antivirus functions and unauthorized access prevention functions on FLET'S Safety compatible devices installed in FLET'S ADSL and B-FLET'S customers' homes via a safety service-dedicated device installed in the regional IP network.

(1)Overview

(2) Service Features
The FLET'S Safety service offers the following features.

1. Offers the latest antivirus functions and functions for preventing unauthorized access.
As the devices dedicated to FLET'S Safety service and the devices compatible with FLET'S Safety automatically update the pattern files, it is not necessary for the antivirus software to perform the update. Consequently, pattern files remain up-to-date even when the computers are not used.
2. Easy payment and no procedures necessary for updating pattern files
Unlike antivirus and similar software, no procedures are necessary for updates, and payment is very easy as the charges are included in FLET'S ADSL and B-FLET'S bills.


3. Supported Services
This service can be used on the following services.
FLET'S ADSL and B-FLET'S*
A FLET'S Safety compatible device* is required when using FLET'S Safety.
   
* WebCaster GateLock X200 is a device that is compatible with FLET'S Safety, and it will be available from NTT East onTuesday, October 1, 2002. (as of September 30, 2002)
* The throughput for the initial service-compatible device, WebCaster GateLock X200, is approximately 10 Mbps. Therefore, if it is connected to the services with a maximum communication speed of more than 10 Mbps such as B-FLET'S, the services may not be used at a satisfactory communication speed.

Reference : Features of FLET'S Safety-compatible devices
Prevents unauthorized access and provides antivirus countermeasures.
As the countermeasures are implemented for each connection line, multiple computers and email accounts are supported.
Because the functions are provided by a dedicated device, there is no need to install additional computer software. Unlike antivirus software that needs to be in continuous operation on a computer, this service does not operate on a computer and there is no burden on the system to store the software.


4. Subscription unit
One subscription per subscriber line is permitted for this service.


5. Charges
(1) Monthly Charge Connection to 1 PC 300 yen
(per subscription line) Connection to 2 to 5 PCs 500 yen
(2) Registration Fee (per contract) 300 yen


6. Service Area
Tokyo area* (Progressive expansion of the service area is planned.)
* Excluding some parts of Machida-shi and Inagi-shi.
Details of the service areas and the schedules for expansion, when decided, will be announced on the NTT East official website.


7. Planned Application and Service Commencement Date
Tues. October 1, 2002


8. Role of Each Company
NTT East
Provision of the FLET'S Safety Service
Provision of support services to FLET'S Safety subscribers
Trend Micro
Provision of the latest security program modules and technical support
Notification of virus information and provision of such information to NTT East


9. Application and Inquiries from Customers
Telephone: 116
(Business hours: 9:00 a.m. to 5:00 p.m. throughout the year, except the New Year's holidays)
* The inquiries form of the NTT East Official FLET'S Website can be used for inquiries as well.

[Inquiries Form]
  http://www.ntt-east.co.jp/flets/safety/
[Official FLET'S Website]
  http://www.ntt-east.co.jp/flets/

In addition, the following information will be available on the above website.
Service overview
Service areas
Precautions for using the service


[Terminology]
*1 Ubiquitous Networking
"Ubiquitous" comes from Latin, and means "anywhere, omnipresent." In this news release, a ubiquitous network is an environment where computers and information devices, such as home appliances and game devices, are connected to the networks and can access the Internet.


*2 Home Networks
Indicates information networks at home. Specifically, it means that multiple computers and information devices are connected to share Internet lines and data.


*3 Cracker (Hacker)
While "hacker" is often used to refer to computer criminals, the term originally referred to people who have a strong interest in computers and engage in various experiments using computers and try different kinds of processing to investigate the limit of computers. The term "cracker" refers to people who enter other computers and networks without authorization using computer and network technologies, and defeat the system to eavesdrop on confidential information.


[news release top]