1~6 item / All 6 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~6 item / All 6 items
We would like to introduce the feature "Unauthorized Connection Prevention" of SecureSeed Plus. External PCs are controlled to prevent them from connecting to the network, allowing only registered internal PCs to be used. You can choose between "Detection Mode" and "Blocking Mode." Instead of prohibiting the connection of personal PCs, it is also possible to understand the current situation in "Detection Mode." If an unregistered device connects to the internal network, it is immediately detected, and the connection is blocked, ensuring the network environment is properly maintained. 【Solutions to the following concerns】 ■ There are vendors or employees connecting personal PCs to the internal network from outside. ■ We want to conduct an inventory of internal network devices (routers, hubs, printers, etc.). *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce the feature "IC Card Authentication" of SecureSeed Plus. With two-factor authentication using an IC card and password, it is possible to accurately identify individuals using PCs, as well as to accurately grasp actual working hours. It is also possible to forcibly perform lock, log off, and shutdown operations at specified times, which can be utilized for work style reform. 【Solving these concerns】 ■ Unable to determine when and who is using shared PCs ■ Want to enhance not only security but also convenience when logging into PCs and software ■ Want to limit PC usage time to reduce unapproved overtime *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce the feature "IT Asset Management" of SecureSeed Plus. Information is managed collectively within the system. Administrators can remotely grasp information such as the configuration details of PCs. Additionally, the help desk can resolve issues while sharing screens. From the collected information, you can easily refer to the latest asset list you need. 【Solutions to the following concerns】 ■ Unable to grasp how many PC assets there are, including those at headquarters and branches, and unaware of what software is installed. ■ There is an Excel ledger, but maintenance is lagging, leading to obsolescence. ■ Providing operational instructions to employees working at remote locations, such as in other prefectures, takes too long when done only by phone. *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce the feature "Device Restrictions" of SecureSeed Plus. It allows you to specify and control available devices such as USBs, applications, and printers. For example, USBs can be managed by serial numbers, supporting information security measures. By making the actions taken public to employees, it is also expected to deter inappropriate PC usage. 【Solutions to these concerns】 ■ Employees can easily take important internal information out using USB drives, which also carry a high risk of loss or theft. ■ There may be software like file-sharing programs running within the company that pose a risk of information leakage, but it is unclear. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce the feature "Log Management" of SecureSeed Plus. It collects and records various operations performed on the PC as logs. By accurately understanding "when," "who," and "how" it was used, we can monitor operations unrelated to business and visualize the situation. This has the effect of deterring personal use of the PC and enhancing labor productivity. 【Solutions to the following concerns】 ■ When there is a data leak, we do not know the cause and cannot take measures. ■ We want to check if there are any unauthorized overtime or false overtime claims. ■ We want to understand whether the company PC is being used for non-business purposes or if there are operations that could lead to data leaks. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationVisualize the terminal environment within the organization and achieve appropriate IT asset management. We support information security measures through log management and device restrictions. You can freely combine the necessary functions from five features (log management, device restrictions, IT asset management, IC card authentication, and prevention of unauthorized connections) to realize proper management of IT assets and information security measures that are just right for your company. You can contract for the required number of licenses for each function!
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration