Securing the supply chain is a headache for managers. With OWC-D file secure link, you can enhance security even with partners at different levels.
DX through database integration such as ERP can lead to a situation where a virus spreads within the supply chain, causing extensive damage if one mistake is made. By effectively using the one-way communication data diode (OWCD), we can mitigate the damage that spreads through the network. The time for recovery in case of an incident is clearly different. If we add file transfers between parties, even if the security management levels and malware countermeasures differ, we can clarify the points of responsibility and create separate networks, preventing everything from coming to a halt. OWCD physically restricts communication to one direction. It may seem very plain, but by ensuring that we stop what needs to be stopped, while allowing various uses of the internet, we can ensure that critical systems: - Block unauthorized intrusions at the source - Block unauthorized communications on the receiving side It can be used for various applications, including monitoring production status with ERP, IoT, and remote data collection. There are increasing examples of SIers utilizing OWCD in their proposals to clients. Please make use of it. For inquiries, please visit our website through the related link below.
Inquire About This Product
basic information
OWCD is a device that restricts communication to one direction only. Since the communication you normally use cannot pass through, it is used in combination with a computer that converts and decodes the communication to allow passage in one direction only. This OWCD is configured to ensure reliable blocking by: - On the sending side, it allows communication to flow only from inside to outside to prevent unauthorized access. - On the receiving side, it allows communication to flow only from outside to inside to prevent unauthorized information leakage and to protect against any viruses that might enter and obtain information. The effectiveness is further enhanced when used in combination with zero trust measures. The OWCD can be used with no maintenance required. Even if various security holes arise, such as configuration errors in firewalls or forgetting to apply patches, it can protect the core of the core. Our company provides models from the OWCD lineup that suit your needs and assists in system construction. The communication processing software is Windows-based. We also apply whitelist antivirus tools there, ensuring safety and security. For inquiries, please visit our company website through the related link above.
Price information
Until now, about 90% of security investments have been allocated to defense, focusing on preventing malicious attackers from breaching systems. However, it is becoming increasingly difficult to prevent intrusions from ransomware and other threats. The key to success lies not only in how to prevent intrusions but also in how quickly one can recover. One might say that a company like 'is saved not by firewalls but by FAX' reflects a failure in resilience. If we are to invest, we would like to implement more effective defenses through resilience in security as well. For inquiries, please visit our company website linked above.
Price range
P5
Delivery Time
※For inquiries, please visit our company website linked above. OWCD is made to order. The delivery time for system construction can be discussed. We also accept inquiries from SIers.
Applications/Examples of results
In Western countries where ransomware is rampant, precise isolation using data diodes is recommended. OWCD is utilized in areas such as: - Aggregating production information in oil, chemical, and pharmaceutical manufacturing plants - Visualizing the operational status of entire lines such as machine tools and food manufacturing, as well as collecting information for remote support services. Additionally, it is used in: - File management and antivirus measures in government agencies - Moving valuable data collected from experiments to personal computers - Transferring data from medical devices to medical record systems - Moving data from PCs handling important information to data file servers - Transferring data from general office networks to networks accessible from outside the company (Note: The above refers to the image of moving replicated files created from original data at hand.) It is also utilized to prevent backflow signal leaks from backup servers due to viruses. As ransomware advances using AI and the threat increases, cybersecurity and cyber resilience measures are also evolving. Let’s prevent actual damage with a comprehensive approach. For inquiries, please visit our company website linked above.
catalog(8)
Download All CatalogsCompany information
Our company is a member of the Mitsubishi Heavy Industries Group, serving as a design technology partner for Mitsubishi Heavy Industries, where we engage in planning and mechanical design for prime movers (steam turbines/boilers, gas turbines, water turbines), pumps, and various plants, as well as instrumentation control system planning and electrical design. In order to meet the increasingly diverse and sophisticated needs of our customers, we will continue to challenge ourselves to improve our technological capabilities, streamline operations, and reduce costs based on the trust we have built with users. Through this, we are developing activities that contribute to society by providing the products and engineering capabilities we have cultivated so far to everyone. Alongside the sale of products related to IoT, manufacturing DX, and on-site monitoring/condition monitoring, we will focus on custom orders, customization, and system construction to realize your ideas. We encourage you to consider utilizing our services. https://eng.power.mhi.com










