1~3 item / All 3 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~3 item / All 3 items
This document summarizes case studies of the implementation of the information leakage prevention system "Total Security Fort." It details the background and circumstances of the implementation, as well as the effects after implementation and future prospects, covering the cases of a total of eight companies. Please use this information for your consideration of product implementation. [Featured Case Studies (Partial)] ■ NTT Data Corporation ■ Yokote City Hall, Akita Prefecture ■ Meiden System Technology Co., Ltd. ■ Veriserv Inc. ■ SII Data Service Co., Ltd. and others *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"Total Security Fort Ver. 5.6" is an information leakage prevention system that protects organizations from targeted attacks, internal misconduct, and human errors, preventing information leaks. It can retrieve and utilize organizational and user information from the AD server (Active Directory). It is also possible to create and manage custom domains and custom users that do not depend on AD. Additionally, it is equipped with features to ensure secure and smooth telework through device control and network control. [Features] ■ Flexible operation management with AD synchronization and approval requests ■ Support for diverse working styles with information leakage countermeasures and operational management ■ Prevents leakage of confidential information with SVS Security Disk ■ Protection area control that is independent of applications ■ Measures against unauthorized access to confidential servers *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "Handwriting Recognition Kernel" is a product that allows for customized operations defined for recognizing handwritten characters and touch operations using a pen or finger on electronic devices equipped with touch panels or touchpads. It supports not only the recognition of alphabets and single characters but also cursive English writing, as well as multiple character input in Japanese and Chinese in full-screen mode. It accommodates diverse environments and provides language addition support and technical assistance through customized development, being adopted by over 30 major manufacturers both domestically and internationally. 【Features】 ■ Support for the most languages - The number of supported languages is among the highest in the industry. Development for new languages is also underway. ■ Energy-efficient design - The recognition kernel's algorithm can be adjusted. ■ Modular support - Compatible with over 300 types of devices. ■ Development track record - Over 20 years of experience in recognition kernel development and system integration. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration