KEYENCE’s Approach to Product Security

At our company, we regard "product security" as one of the most important priorities for products that are increasingly networked and software-driven, and we are working to improve it so that customers can use our products with confidence. Led by a company-wide specialist organization, we establish development guidelines with a strong security focus, build and periodically review our framework, and work across the group to deliver products that are safe, trustworthy, and secure.

1. Continuous Information Gathering and Internal Coordination

We continuously collect information about threats and vulnerabilities related to our products and share that information with relevant departments. We reflect these insights in internal activities and strive to improve our product security measures.

2. Security-Conscious Product Development

During the development phase, we identify the assets and functions that must be protected and assess possible attack scenarios. Based on those assessments, we design and implement appropriate security measures as the situation requires.

3. Post-Release Response and Customer Collaboration

If a vulnerability is discovered, we promptly assess its impact and consider and implement corrective measures such as updates. We also take steps to prevent recurrence when necessary and work closely with customers throughout the process.

4. Providing Information for Safe Operation

We make efforts to provide comprehensive information so that customers can operate our products safely and with peace of mind.

5. Alignment with Regulations and Standards

We monitor laws, regulations, and guidelines in each region (for example, developments related to the European Cyber Resilience Act) and endeavor to ensure appropriate alignment for the products to which they apply. While referring to commonly used frameworks in industrial sectors, we aim to enhance the practical effectiveness of our product security.