91~102 item / All 102 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us OnlineBefore making an inquiry
Download PDF91~102 item / All 102 items
The "Global Secure Data Transfer Service" enables the fast and secure transfer of important and large volumes of data between companies. It is secure because the original information cannot be restored from each distributed fragment alone. By employing quadruple-layered top-class security technology, it is also effective as a countermeasure against risks such as email misdelivery and media loss. 【Recommended Use Cases】 ◆ I want to facilitate information sharing with overseas branches, affiliated companies, and overseas development contractors. ◆ I want to send data that exceeds email capacity limits. ◆ The line quality with overseas branches is poor, leading to data transmission failures. ◆ I want to streamline the sending of paper or CDs by sending data instead. *For more details, please contact us or download the PDF to view.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "Global Secure Data Transfer Service" is a transfer service that makes it easy to exchange data with overseas parties. Among information leakage incidents, 64% are related to issues with data sending and sharing. Therefore, a secure data transfer solution is necessary. Our product safely delivers confidential information over the internet and protects important data from information leaks such as "misdelivery," "unauthorized access," "loss, theft, and delays." 【Features】 ■ Security - Original data cannot be identified due to multiple routes and multiple cloud storage - Even if meaningless partial data is obtained, it is impossible to analyze - Quadruple authentication security ■ Data Transfer - Improved transfer efficiency through multiple transfers - Designation of multiple routes as relay points - Adjustment functions through tuning - Resume function for interruption and resumption *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationCan you send that confidential information with peace of mind? Hacking and decryption technologies are evolving every day. Therefore, transferring data using common methods comes with risks. The 'Global Secure Data Transfer Service' is a service that transforms and splits important corporate data into meaningless states using high-security secret sharing technology for transfer. Since each distributed piece cannot restore the original information, it is safe. For those responsible for information security, we recommend this service for transmitting CAD data, design data, and other information for sharing with overseas bases or affiliated companies. [Features] ■ Safe transfer with four security technologies: (1) Obfuscation, (2) Fragmentation, (3) HTTPS communication, (4) Distribution ■ In case of errors, only the erroneous pieces are automatically retried, and adjustments to the number of retries are possible. Transfer can be paused and resumed. ■ Simple GUI operation ■ Command line available for automation of transfers in conjunction with business systems. (*) As of February 2019, according to our research. For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationDo you have any of these troubles? - Internet connections overseas often fail during data transfer, and you can't conduct business until the retry is complete... - File transfers involve cumbersome tasks like encryption, decompression, and communicating passwords... The 'Global Secure Data Transfer Service' is a service that transforms and splits important corporate data into meaningless states using high-security secret distribution technology for transfer. Since each distributed piece cannot restore the original information, it is safe. We recommend this service for customers transmitting CAD data, design data, and sharing information with overseas bases or affiliated companies, as well as for those using email/cloud/physical transport for information sharing. [Features] ■ Safe transfer with four security technologies (1) Meaninglessness, (2) Piece division, (3) HTTPS communication, (4) Distribution ■ In case of an error, only the piece that encountered the error is automatically retried, and adjustments to the number of retries are possible. Transfer can be paused and resumed. ■ Easy GUI operation ■ A command line is also available to automate transfers in conjunction with business systems. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration【Background】 There is confidential information such as estimates and contracts in transactions with business partners. I wanted to transfer it securely, but I couldn't request the installation of a program due to each company's policies. Therefore, I was sending confidential information via email. 【Challenges】 (1) It is difficult to request business partners to install a dedicated program. (2) Sending confidential information via email raises concerns about information leakage due to misdelivery. (3) Cloud sharing services that only use an ID and password pose a risk of confidential information being downloaded if the ID and password are leaked. (4) There is a risk of logging in after the contract ends with just an ID and password. Reasons for not being able to request installation from business partners: - Different policies regarding IT (I think, and confirming is cumbersome). - Unable to explain or implement detailed procedures. - There may be restrictions on the business partner's PC that prevent installation. 【Solution to the Challenges】 (1) It can be used simply by launching an exe file. (2) For temporary business partners, security can be enhanced with a one-time password in addition to the ID and password. 【Effects】 (1) There are no misdeliveries in data transmission with business partners, making it secure.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationItem information can be viewed and understood "anytime" and "anywhere"! Point 1: The accuracy and convenience of item lending/returning will improve. Point 2: Various types of items will be centrally managed. Point 3: The location of items can be tracked, and deadlines will be notified via email.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration**Background** Company C, which provides monitoring services for customer network devices, was collecting device logs via USB. This required time and effort to transport the USB. **Challenges** (1) Transporting logs takes time Large logs required on-site visits to save them to USB memory for transport. It took time to send them to the support department. (2) There is a risk of losing the USB. **Benefits** (1) Anyone can easily send logs to support. (2) Transport time has been reduced, leading to quicker initial responses. (3) No risk of losing USB memory! **Usage Situation** Transfer Volume: March 2019: 808 cases per month, totaling 0.99GB/month, maximum transfer volume 260MB per instance.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration【Background】 We outsourced the development of a business program to a software development company in Myanmar. During design reviews, we frequently sent data. Additionally, due to the large size of the deliverables, we burned them onto DVDs for delivery. 【Challenges】 (1) Sending review materials took time. The narrow bandwidth caused delays in transfer and resulted in errors. (2) There was a risk of misdelivery via email. (3) Sending deliverables on DVDs took time, and there was a risk of information leakage in case of loss. 【Solutions to Challenges】 (1) We were able to send materials in the order they were completed. (2) By simply selecting registered users, there were no input errors like those that occur with email. 【Effects】 (1) Immediate sending reduced time and shortened the overall development period. (2) Prevention of misdelivery. (3) Reduction in the labor required for DVD creation and transportation volume. 【Usage Status】 Transfer frequency and volume: March 2019: 70 times/month, totaling 6.7GB/month, with a maximum total volume of 473MB per transfer.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration**Background** Company A, which has factories in Southeast Asia, frequently exchanged CAD data for the design and manufacturing of automotive parts between Japan and Southeast Asia. (1) Target Data: 3D CAD design data Some files are 500MB in size. (2) Slow Connection The overseas connection speed is slow at 2Mbps. Transferring 500MB of data sometimes took over 2 hours. **Challenges** - Transfer failures occurred frequently, and each time, the need to resend was wasteful, causing business delays. - The slow connection speed took time, requiring data to be sent before leaving work and checked the next morning. **Solution to Challenges** This service breaks down CAD data into smaller pieces, making it less likely to fail on a slow connection. Additionally, if an error occurs, it automatically resends data by piece. **Effects** (1) Transfer errors were reduced, eliminating unnecessary resend tasks. (2) Eliminated the need to transfer data before leaving work, allowing transfers to occur when necessary during business hours, thus reducing the waiting time for transfers until the next day.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationOur "Global Secure Data Transfer Service" maintains high security while allowing for storage and sharing. Data is converted and split into meaningless states using high-security secret sharing technology for transfer. Each distributed piece cannot restore the original information on its own. It is a secure storage service that cannot be accessed with just an ID/password. You can store design documents and product information and download them when needed. It can be utilized for information sharing with other company locations, related companies, and distributors. 【Features】 ■ Safe transfer with four security technologies (1) Obfuscation, (2) Fragmentation, (3) HTTPS communication, (4) Distribution ■ Strong even in environments with poor line quality, such as overseas In case of an error, only the piece that encountered the error will be automatically retried, and adjustments to the number of retries are possible. Transfer can be paused and resumed. ■ One-time password functionality is available for temporary users. (*1) As of March 2019, based on our research. * For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "Global Secure Data Transfer Service" is a service that safely and reliably transfers important corporate data. Data is converted and divided into meaningless states using high-security secret sharing technology for transfer. Each distributed piece cannot restore the original information on its own. This service is recommended for customers transmitting CAD data, design data, and other information for sharing with overseas locations or affiliated companies, as well as for those using email/cloud/physical transport for information sharing. 【Features】 ■ Safe transfer with four security technologies (1) Obfuscation, (2) Fragmentation, (3) HTTPS communication, (4) Distribution ■ Strong in environments with poor line quality, such as overseas In case of errors, only the erroneous pieces are automatically retried, and adjustments to the number of retries are possible. Transfer can be paused and resumed. ■ Easy GUI operation ■ A command line is also available to automate transfers in conjunction with business systems. (*1) As of February 2019, based on our research * For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationHitachi Systems Engineering Services Co., Ltd. develops business systems across a wide range of fields, builds infrastructure utilizing network and security technologies, and manages large-scale operations such as data centers, as well as the operation of customers' IT systems. We provide various operational services and cloud services starting from system construction. As a member of the Hitachi Systems Group, which covers all areas of the IT lifecycle and offers one-stop services, we support our customers' businesses with IT while providing our own solution services. 【Business Activities】 ■ System Construction ■ System Operation, Monitoring, and Maintenance ■ Sales and Development of Information-Related Equipment and Software *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration