1~4 item / All 4 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~4 item / All 4 items
We would like to introduce a case of "in-house IT support" conducted at a comprehensive leasing company. The company developed an Access rental system and approval system in-house, and while the development staff were responsible for operation and maintenance, there were concerns about the future management of the system as the person in charge would be retiring at the end of March 2024. Therefore, we divided the support into an investigation phase (2 months) and a maintenance phase (from April 2023). Based on the investigation results, we are creating and updating necessary documents for operation and maintenance. [Case Overview (Partial)] ■ Request: Break away from a system operation and maintenance structure that relies on specific individuals ■ Support Content (Investigation Phase) - Impact investigation in case the current person in charge is absent - Understanding the volume of work that needs to be handed over - Creating necessary documents for operation and maintenance individually for each system *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case of "in-house IT support" conducted at a semiconductor trading company. The company had a single IT personnel in charge, yet the scope of operations continued to expand. Additionally, a project for the reconstruction of the core system was underway within the company, and the management strongly demanded a transformation from a one-person IT department to an organization. In response, we conducted an inventory of existing systems and IT operations. We aimed to strengthen business continuity through the "visualization" and "documentation" of tasks that had become overly dependent on individuals. [Requests] ■ Document the types, configurations, and integration status of systems to clarify the overall picture ■ Prevent the personalization of operations and improve business continuity ■ Address concerns about personnel shortages for the core system reconstruction project *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"ION" is an IT support service that provides solutions to streamline your management operations and reduce costs by solving various projects for user-oriented companies with experienced members. Our IT consultants, project managers, and leaders are seasoned professionals who have worked on projects across several user-oriented companies, collaboratively addressing various challenges. By entrusting us with tasks on a unit basis, you can reduce your management workload. 【Strengths】 ■ Experienced personnel ■ Team proposals ■ Long-term track record ■ Cost optimization *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe provide vulnerability assessment services to prevent the risks of cyber attacks and information leaks in advance and to strengthen security. Even if you have little expertise in vulnerabilities, we will support you from scratch in promoting vulnerability management so that you can ultimately operate independently and continuously. We will achieve a manageable risk-based vulnerability management approach. Please feel free to contact us if you have any requests. [Support Examples] ■ Learning how to use tools ■ Providing operation manuals in Japanese ■ Considering response policies for identified vulnerabilities *For more details, please download the PDF or contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration