Securing the supply chain is a headache for managers. With OWC's Secure Link, you can enhance security even with partners at different levels.
DX through database integration such as ERP can lead to a situation where a virus spreads through the supply chain, causing extensive damage if one mistake is made. By effectively using the data diode OWCD, which restricts communication in one direction, we can mitigate damage that travels through the network. The time until recovery in case of an emergency is clearly different. If we add file transfer between parties, even if the security management levels and malware countermeasures differ, we can clarify the points of responsibility and create separate networks to prevent everything from coming to a halt. OWCD physically restricts communication to one direction. It may seem very plain, but by ensuring that what needs to be stopped is indeed stopped, while allowing various uses of the internet, we can ensure that critical systems can: - Shut out unauthorized intrusions from the source - Shut out unauthorized communications on the receiving side It can be utilized for various purposes, including understanding production status using ERP, IoT, and remote monitoring data collection. There are increasing examples of SIers utilizing OWCD in their proposals to clients. Please make use of it. For inquiries, please visit our website via the link below.
Inquire About This Product
basic information
OWCD is a device that restricts communication to one direction only. Since the communication you normally use cannot pass through, it is used in combination with a computer that converts and decodes it into a form that can pass through in one direction only. This OWCD is configured to ensure reliable blocking by: - On the sending side, preventing unauthorized access by allowing communication to flow only from inside to outside. - On the receiving side, preventing unauthorized information leakage and ensuring that any viruses that might enter cannot obtain information by allowing communication to flow only from outside to inside. The effectiveness is further enhanced when used in combination with zero trust measures. OWCD can be used with no maintenance required. Even if various security holes arise, such as configuration errors in firewalls or forgetting to apply patches, it can protect the core of the core. Our company provides models from the OWCD lineup that suit your needs and assists in system construction. The communication processing software is Windows-based. We also apply whitelist antivirus tools there, ensuring safety and security. For inquiries, please visit our company website linked above.
Price information
To all business owners, which do you think is better: endless damage or the losses incurred while being prepared? Antivirus software is not free. There are also personnel costs associated with maintaining it. If you don't have anyone, it's even more important to clearly identify what needs to be protected and strengthen your defenses. We provide this from a single OWCD. The price of this system varies greatly depending on your requirements. For inquiries, please visit our company website linked above.
Price range
P5
Delivery Time
※For inquiries, please visit our company website linked above. OWCD is made to order. The delivery time for system construction can be discussed. We also accept inquiries from SIers.
Applications/Examples of results
In Europe and the United States, where ransomware is rampant, precise isolation using data diodes is recommended. In addition to the supply chain, OWCD is also utilized for: - Aggregating production information in oil, chemical, and pharmaceutical manufacturing plants - Visualizing the operational status of entire lines such as machine tools and food manufacturing, as well as collecting information for remote support services. Additionally, it is used in scenarios such as: - File management and antivirus measures in government agencies - Moving valuable data collected from experiments to personal computers - Transferring data from medical devices to medical record systems - Moving data from PCs handling important information to data file servers - Transferring data from general office networks to networks accessible from outside the company (Note: The above refers to the image of moving duplicate files created from original data at hand.) It is also utilized to prevent backflow signal leaks from backup servers due to viruses. As ransomware evolves and increases its threat by utilizing AI, cybersecurity measures are also changing. Let's prevent actual damage with a multifaceted approach. For inquiries, please visit our company website linked above.
catalog(8)
Download All CatalogsCompany information
Our company is a member of the Mitsubishi Heavy Industries Group, serving as a design technology partner for Mitsubishi Heavy Industries, where we engage in planning and mechanical design for prime movers (steam turbines/boilers, gas turbines, water turbines), pumps, and various plants, as well as instrumentation control system planning and electrical design. In order to meet the increasingly diverse and sophisticated needs of our customers, we will continue to challenge ourselves to improve our technological capabilities, streamline operations, and reduce costs based on the trust we have built with users. Through this, we are developing activities that contribute to society by providing the products and engineering capabilities we have cultivated so far to everyone. Alongside the sale of products related to IoT, manufacturing DX, and on-site monitoring/condition monitoring, we will focus on custom orders, customization, and system construction to realize your ideas. We encourage you to consider utilizing our services. https://eng.power.mhi.com






