Prevent information leaks due to internal misconduct! Eliminate unauthorized use of privileges and rights to take out information to "nothing."
"ZENMU for Meister" is a solution that clearly separates system management from information management, achieving important "zoning" for information leak prevention through an "invisible vault" that even system administrators cannot access data from. Without the access distribution key issued by the owner to users permitted to access the information, even with administrator privileges, it is impossible to access the information. 【Features】 ■ Complete separation of "system management" and "information management" ■ Prevention of data tampering and information leaks due to privilege takeover ■ Protection of information even if all distributed fragments of meaningless data are leaked ■ "Decryption programs" are also managed in a distributed manner along with the "data" *For more details, please refer to the PDF document or feel free to contact us.
Inquire About This Product
basic information
【Access Procedure to Information】 ■ Insert the USB containing the access distribution key ↓ ■ Confirm access to Folder A ↓ ■ Information on the data storage location for Folder A ↓ ■ Information on the access distribution key ↓ ■ By matching the access distribution key on the server with the user's distribution key, the parameters for data distribution and decryption are decrypted, and the program is activated ↓ ■ Original data is decrypted from distributed data 1 and 2 onto Folder A *For more details, please refer to the PDF document or feel free to contact us.
Price range
Delivery Time
Applications/Examples of results
Usage: Fields that handle data requiring high confidentiality - Research and development departments in various industries - MR departments in the pharmaceutical industry - Medical settings such as hospitals and clinics - Legal-related companies such as law firms - Manufacturing and construction industries (design data, construction data) - Images from surveillance cameras *For more details, please refer to the PDF document or feel free to contact us.*
catalog(1)
Download All CatalogsCompany information
Our company offers a solution called "ZENMU," which "decontextualizes" data in a way that is conceptually different from traditional encryption technologies. Traditional encryption methods can be compromised due to advancements in decryption techniques, posing a risk of being read. Based on secret sharing technology, we can achieve "security measures that do not protect" by converting and splitting data into meaningless data.