46~54 item / All 54 items
Displayed results
Filter by category
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
Contact this company
Inquiry Form46~54 item / All 54 items
Filter by category

"PerfecTwin" perfectly resolves the qualitative and quantitative limitations of each incomplete test through 100% real transaction-based testing, strongly supporting the transition to the new system with its "Current/New Comparison Test Automation Solution." It conducts sufficient quality and quantity of tests to detect potential errors and defects before going live, making the determination of production readiness more reliable. Please feel free to contact us when needed. 【Features】 ■ Automation of comparison testing between current and new systems ■ Provision of quantitative verification metrics for production readiness criteria ■ Automation of performance verification for the new system ■ 0% error rate after implementation *For more details, please refer to the related links or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
Our company is currently distributing and selling a variety of IT products (software and hardware). At the "Solution Department Store," we offer: - A diverse range of products (over 100 types in the future). - A lineup of high-quality products with proven technology and performance. - A selection of products with good cost performance. As mentioned above, we will propose optimal corporate solutions! We look forward to your visit to the website below for more details.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
Case Presentation! Screen Capture Prevents Information Leakage! Security System Implementation Case We solve issues such as information leakage through screen capture! 【Ideal for the following customers!】 ◎ Restrictions on the removal of confidential information from factories and office buildings are insufficient... ◎ There is an increasing number of issues related to information leakage in society, but we don't know how to address them... 【Contents Included】 ◆ Service Overview ◆ Implementation Results and Case Studies (Domestic and International) ◆ List of Products and Optional Products... etc. 【For more details, please download the catalog or feel free to contact us】
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
"InnoMark" is an information leakage prevention solution that enhances individual security awareness by displaying a watermark on the monitor screen that identifies the individual and the PC, contributing to the reduction of information leakage risks. The content, position, and method of displaying the watermark can be easily configured. Additionally, administrators can easily operate it from the manager screen. 【Features and Functions】 ■ Tracking function for information leakage sources ■ Screen capture prevention function for monitor screens ■ Support for Remote Desktop (Windows Remote Desktop) ■ Watermark display and non-display function based on network bandwidth ■ Simple installation procedures and reasonable installation costs *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
"V3 Security for Business" is a cloud-based endpoint security solution for corporations that employs six new detection technologies on a multi-dimensional analysis platform, enabling rapid detection of unknown new strains and variants of malware. Using evaluation information from the ASD server, it detects high-risk files during manual scans, and if it discovers files on the user PC that do not exist on the ASD server, it transfers those files to the ASD cloud. 【Features】 ■ High cost performance ■ An essential tool for the telework era ■ Verified high performance ■ Top-class achievements in endpoint security in South Korea *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
"OZ e-Form" is an electronic form development solution that allows for the easy creation of various corporate documents such as application forms, estimates, orders, invoices, and contracts, which were previously used in various existing paper formats. It integrates with corporate data, enabling viewing, printing, and form creation anytime and anywhere in web/mobile environments. 【Features】 ■ Integrated electronic form development solution ■ Easy electronic form development ■ Mobile viewer ■ Input available using multiple devices *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
InnoMark" is an information leakage prevention solution that enhances individual security awareness by displaying a watermark on the monitor screen that identifies the individual and the PC, contributing to the reduction of information leakage risks. The content, position, and method of displaying the watermark can be easily configured. Additionally, administrators can easily operate from the manager screen. 【Features and Functions】 ■ Tracking function for information leakage sources ■ Screen capture prevention function for monitor screens ■ Support for Remote Desktop (Windows Remote Desktop) ■ Watermark display and hide function based on network bandwidth ■ Simple installation procedures and reasonable installation costs *For more details, please download the PDF or feel free to contact us. *For the one-month free trial version, please mention "I saw it on Ipros.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
"Argos DFAS" is a specialized auditing solution for digital forensics that automates digital forensic investigation methods, collects traces of personal information leaks, and provides precise analytical results. It audits violations of internal security policies, and its fast keyword search function applies digital forensic technology to manage the history of searched keywords and tag management, allowing for quick determination of violations. [Main Features] ■ Quick Scan ■ User Scan ■ Personal Information Scan ■ Policy Management ■ Review, etc. *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
"IPKeeper" is a network IP management solution that detects and blocks unauthorized access to internal networks. It efficiently realizes automatic collection and management of IP resources, prevention of unauthorized use of IPs, protection of important device IPs, restrictions on the use of unauthorized network devices, limitations on network usage time, control of communication between network devices, and measures against unauthorized access. It collects network resources (IP addresses, MAC addresses, host names, network participation status, network usage time, etc.) in real-time, and management ledgers can be easily created from the console monitor screen. 【Features and Characteristics】 ■ Automatic collection of network resources ■ Automatic detection of unauthorized access / automatic blocking of unauthorized access ■ Measures against unauthorized access ■ Access control function (allow/block) between groups ■ Management nodes support large-scale networks with over 10,000 devices *For more details, please refer to the related links or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration