Supporting the safety and security of hybrid work in asset management companies with secret sharing technology.
We would like to introduce a case study on the implementation of "ZENMU for PC" at Asset Management One Co., Ltd. The company aimed to enable the use of business PCs outside the office to improve operational efficiency and reform work styles. However, a significant challenge was the awareness of information leakage risks associated with allowing the removal of PCs. After implementation, even in the event of loss or theft of a PC, information leakage could be prevented through the invalidation of authentication IDs and control of distributed fragments. This also allowed for a swift transition to a telework system during the outbreak of COVID-19. [Case Overview] ■Challenges - To enable the removal of business PCs outside the office while significantly reducing the risk of information leakage. - Consideration of utilizing VDI, but the environment setup requires considerable effort and cost. ■Effects - Safe and secure removal of business PCs became possible. - A swift transition to telework for employees was achieved in response to the COVID-19 outbreak. *For more details, please download the PDF or feel free to contact us.
Inquire About This Product
basic information
【Selection Reasons】 ■Innovation that allows for an environment similar to "diskless PCs" to be achieved with overwhelmingly fewer man-hours compared to VDI ■Safety of secret distribution technology that ensures original data does not remain on the PC ■Efficiency of security operations that can immediately prevent unauthorized use of data in the event of theft or loss *For more details, please download the PDF or feel free to contact us.
Price range
Delivery Time
Applications/Examples of results
For more details, please download the PDF or feel free to contact us.
catalog(1)
Download All CatalogsCompany information
Our company offers a solution called "ZENMU," which "decontextualizes" data in a way that is conceptually different from traditional encryption technologies. Traditional encryption methods can be compromised due to advancements in decryption techniques, posing a risk of being read. Based on secret sharing technology, we can achieve "security measures that do not protect" by converting and splitting data into meaningless data.