Securing the supply chain is a headache for managers. With OWCDFile SecureLink, you can strengthen security even with partners at different levels.
DX through database integration such as ERP can lead to a situation where a virus propagates within the supply chain, causing extensive damage if one mistake is made. By effectively utilizing the data diode OWCD, which restricts communication in one direction, we can achieve micro-segmentation and mitigate damage that spreads through the network. If we add file transfers between parties, even if the security management levels and malware countermeasures differ, we can clarify the points of responsibility and create separate networks, preventing everything from coming to a halt. OWCD physically enforces one-way communication restrictions. It may seem very simple, but by ensuring that what needs to be stopped is indeed stopped, while allowing the internet to be used in various ways, we can ensure that critical systems: - Block unauthorized intrusions at the source - Block unauthorized transmissions at the receiving end It can be used for various applications, including understanding production status using ERP, IoT, and remote monitoring data collection. There are increasing examples of SIers utilizing OWCD in their proposals to clients. Please make use of it. For inquiries, please visit our website through the link below.
Inquire About This Product
basic information
The OWCD is a device that physically restricts communication in one direction. Since the usual communication you use cannot even pass through that one direction, it is used in combination with a computer that converts and decodes it into a communicable format. By placing this OWCD - at the source to prevent unauthorized access in a one-way direction from inside to outside, - and at the receiving side to prevent unauthorized information leakage or ransomware reconnaissance viruses from sending out extracted information in a one-way direction from outside to inside, we achieve reliable blocking. It actually works well with zero trust measures, and the effectiveness increases when used in combination. If you are concerned about malware being mixed into files, it can work alongside a virus scanning mechanism. It can also collaborate with address checks to ensure communication with the correct parties. The OWCD itself has no settings, so there will be no various security holes arising from configuration errors or forgotten patches in firewalls and other systems. It can protect the core of the core. The communication processing software is Windows-based. It is safe and secure with the application of whitelist antivirus tools. For inquiries, please visit our company website through the related link above.
Price information
Until now, about 90% of security investments have been allocated to defense, focusing on preventing malicious attackers from breaching systems. However, it has become difficult to prevent intrusions from ransomware and other threats. The key to success is not only how to prevent intrusions but also how quickly one can recover. The statement 'saved not by firewalls but by FAX' from a certain company can only be described as a 'failure in resilience.' If we are going to invest, we want to ensure that security also includes effective defense through resilience. For inquiries, please visit our company website linked above.
Price range
P5
Delivery Time
※For inquiries, please visit our company website linked above. OWCD is made to order. The delivery time for system construction can be discussed. We also accept inquiries from SIers.
Applications/Examples of results
In Western countries where ransomware is rampant, precise blocking using data diodes is recommended. OWCD is utilized in areas such as: - Aggregating production information in oil, chemical, and pharmaceutical manufacturing plants - Visualizing the operational status of entire lines in machine tools and food manufacturing, as well as collecting information for remote support services. Additionally, it is used in scenarios such as: - File management and antivirus measures in government agencies - Transferring valuable data collected from experiments to personal computers - Moving data from medical devices to medical record systems - Transferring data from PCs handling important information to data file servers - Moving data from general office networks to networks accessible from outside the company (Note: The above refers to the image of moving replicated files created from original data at hand.) It is also utilized to prevent backflow signal leakage from backup servers due to viruses. As ransomware evolves and poses an increasing threat by utilizing AI, cybersecurity and cyber resilience measures are also changing. Let’s prevent actual damage with a multifaceted approach. For inquiries, please visit our company website linked above.
catalog(8)
Download All CatalogsCompany information
Our company is a member of the Mitsubishi Heavy Industries Group, serving as a design technology partner for Mitsubishi Heavy Industries, where we engage in planning and mechanical design for prime movers (steam turbines/boilers, gas turbines, water turbines), pumps, and various plants, as well as instrumentation control system planning and electrical design. In order to meet the increasingly diverse and sophisticated needs of our customers, we will continue to challenge ourselves to improve our technological capabilities, streamline operations, and reduce costs based on the trust we have built with users. Through this, we are developing activities that contribute to society by providing the products and engineering capabilities we have cultivated so far to everyone. Alongside the sale of products related to IoT, manufacturing DX, and on-site monitoring/condition monitoring, we will focus on custom orders, customization, and system construction to realize your ideas. We encourage you to consider utilizing our services. https://eng.power.mhi.com













