Cloud-based IT asset management and information leak prevention. It's easy to start managing work hours and laptops taken home for telework.
Visualize the terminal environment within the organization and achieve appropriate IT asset management. We support information security measures through log management and device restrictions. You can freely combine the necessary functions from five features (log management, device restrictions, IT asset management, IC card authentication, and prevention of unauthorized connections) to realize proper management of IT assets and information security measures that are just right for your company. You can contract for the required number of licenses for each function!
Inquire About This Product
basic information
【Log Management】Records all PC usage history 24/7, allowing verification of who used it and how. 【Device Restrictions】Specifies usable devices such as USBs and printers to support your company's security. 【IT Asset Management】Administrators can remotely manage configuration information of PCs in a centralized system. 【IC Card Authentication】Utilizes IC cards for two-factor authentication to accurately identify PC users and track actual attendance times. 【Unauthorized Connection Prevention】Controls network connections of brought-in PCs and manages logs of those PCs.
Price information
【Cloud Monthly Fees】 IT Asset Management: 250 yen / ID Log Management: 350 yen / ID Control: 300 yen / ID IC Card Authentication: 600 yen / ID Unauthorized Connection Prevention: 6,000 yen / segment *Please contact us regarding on-premises options.
Delivery Time
P2
※In the case of the cloud
Applications/Examples of results
- Reduce the risk of information leakage and decrease the burden and waste for administrators. - Telework. Understanding the usage of PCs during remote work. - Clearly identify the devices that need to be managed and monitor their connection status. - Provide remote support without leaving one's desk, such as through an internal help desk.
Detailed information
-
Customizable with only the desired features! Recommended for beginners as IT asset management can be started on a small scale! 【Log Management】Records all PC usage history 24/7, allowing you to check who used it and how. 【Device Restrictions】Specifies usable devices such as USBs and printers to support your company's security. 【IT Asset Management】Administrators can remotely manage configuration information of PCs in a centralized system. 【IC Card Authentication】Uses IC cards for two-factor authentication to accurately identify PC users and track actual attendance times. 【Unauthorized Connection Prevention】Controls network connections of brought-in PCs and manages logs of those PCs.
Company information
Since our establishment in 1969, thanks to all of you, our company has grown to become a leading information and communication service provider in the local area. We sincerely thank the local community for their unwavering support over the years. Our company focuses on building core systems for various businesses, including municipalities, agricultural and livestock industries, fisheries, private enterprises, and healthcare and welfare sectors. We strive to provide detailed, one-stop services that cover everything from planning, design, manufacturing, operation, and maintenance to utilizing our own data center and addressing security needs, all in response to our customers' requests.