List of IT/Network products
- classification:IT/Network
991~1035 item / All 43702 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
For building material manufacturers. Reduce the need for split sending and resending of email attachments! Centralized management of distribution for construction manuals and test reports.
- Document and Data Management
Reduce the hassle of sending ZIP attachments and separate emails! Control document sharing with outsourcing partners and clients through URL sharing.
- Document and Data Management
For automobile parts manufacturers. Reducing reliance on password-protected ZIP emails! A case study on reducing the risk of version differences and misdelivery through URL sharing.
- Document and Data Management
For chemical manufacturers. Reviewing the complicated procedures for sending SDS and quality certificates! Introducing a case where submission and storage have been centralized.
- Document and Data Management
Reduce rework and waiting time through the standardization of reviews/approvals! Introducing ready-to-use role assignments and rules.
- Process Control System
Cloud Storage VS MAM/DAM! Separating storage and operation makes it easier to organize search, sharing, and version management.
- Other production management systems
For industrial machinery manufacturers. A case where an environment was established to quickly retrieve necessary materials, achieving speed in on-site response and safe information sharing.
- Storage Backup
For the printing and packaging industry. Organize design data, proof PDFs, and video/image materials with tags to accelerate internal and external proofing and approval processes.
- Storage Backup
For aircraft parts manufacturers. Strengthening traceability of manufacturing records, inspection results, and drawings. A case study of achieving long-term storage and access control in the cloud.
- Storage Backup
For resin parts manufacturers. Management of mold drawings, molding conditions, inspection results, and defect reports linked by part number/lot. An example of improved customer response speed.
- Storage Backup
For shipbuilding and heavy machinery manufacturers. A case where drawings, inspection records, and photos of large projects were centrally managed with tags, achieving shared control among multiple co...
- Storage Backup
Organize inspection images, measurement logs, and specifications by project/model number tags. Safely share with overseas bases and partner companies.
- Storage Backup
Set management of manuals, drawings, photos/videos for each delivered equipment. Introduced as a foundation to enhance the responsiveness of the maintenance department.
- Storage Backup
User manuals, cleaning procedures, and parts lists are made available exclusively for on-site/customers. Achieving "thoroughness of the latest version" and accumulating educational content.
- Storage Backup
Strengthen traceability of manufacturing records, inspection results, and drawings. Achieve long-term storage and access control in the cloud (phased transition).
- Storage Backup
Organize design data, proofing PDFs, and video/image materials with tags to accelerate internal and external proofing and approval.
- Storage Backup
Tag management of test reports, measurement data, and photos by project/test conditions. Achieving secure delivery sharing with customers.
- Storage Backup
Tag management of large case blueprints, inspection records, and photos by project/block/process. Control the sharing of materials among multiple companies and strengthen BCP (Business Continuity Plan...
- Storage Backup
Centralized management of equipment ledgers, inspection records, construction photos, and drawings by equipment ID. Establishing a system that allows access to necessary information remotely even duri...
- Storage Backup
Tag management of NC data, drawings, and processing conditions by project/model/material. Establish a system to prevent the use of "incorrect versions" on-site.
- Storage Backup
Detection of C2 server communication through a blacklist and automatic blocking! A case where explanations during client audits became easier.
- Other security
- Firewall and intrusion prevention
Preventing the risk of information leakage and exploitation after infection with export measures! Simplifying operations with notifications and monthly reports.
- Other security
- Firewall and intrusion prevention
Detect and automatically block C2 communications! Visualize the situation even for companies with multiple locations through notification emails and monthly reports.
- Other security
- Firewall and intrusion prevention
Prevent the expansion of damage that leads to factory shutdowns! Operations with notifications and monthly reports even in environments with thin information systems.
- Other security
- Firewall and intrusion prevention
Monitor and block C2 communications at the exit! Operations include automatic blocking, notifications, and monthly reports, allowing for management by a small team.
- Other security
- Firewall and intrusion prevention
Prevent information leaks and business interruption risks! Utilize notifications and monthly reports for audit and reporting responses.
- Other security
- Firewall and intrusion prevention
Automatically block C2 communications in logistics sites where operations cannot be halted! Accelerate initial response with notifications and understand operational status through monthly reports.
- Other security
- Firewall and intrusion prevention
A case where measures that can be "explained" were established not only for our own company but also as a position handling customer information!
- Other security
- Firewall and intrusion prevention
Prevent the leakage of confidential information! With notifications and monthly reports, it's easier to maintain operations even in environments with thin IT resources.
- Other security
- Firewall and intrusion prevention
Added exit strategies for industries with strict supply chain demands! Mitigating risks of platformization and information leakage.
- Other security
- Firewall and intrusion prevention
Reduce the hassle of sending ZIP attachments and separate emails! Control document sharing with external partners and clients through URL sharing.
- Document and Data Management
Control the scope of supplier data submission! A case that resolved concerns about misdelivery and version discrepancies.
- Document and Data Management
Mitigating OneDrive storage pressure! A case of establishing a long-term storage infrastructure that only releases completed projects.
- Document and Data Management
Suppressing the increase in Google Drive storage capacity! A case study of building a storage infrastructure that can be searched by model number/lot.
- Document and Data Management
Suppressing duplicate storage between branches! A case where completed projects were separated to long-term storage and capacity was reviewed.
- Document and Data Management
Establishment of a long-term storage foundation for irremovable quality records! A case of developing a separate storage facility from the BCP perspective.
- Document and Data Management
Separated completed case documents for long-term storage! A case that shortened document searches on-site and expedited initial responses.
- Document and Data Management
Separating design documents and old versions from synchronized storage! Introducing a case that shortened the initial steps for audit preparation.
- Document and Data Management
Separation of completed project videos and materials for long-term storage! A case that made it easier to search for past materials across projects.
- Document and Data Management
Even though it's called easy implementation, there are points to check! Explaining the confirmation points before implementation.
- Other security
Protecting information with an 'exit wall' even after being breached! An explanation of the introduction process of DDHBOX.
- Other security
In an era where it is difficult to completely prevent intrusions, let's organize the idea of "preventing the expansion of damage after an intrusion."
- Other security
What is necessary is not the relaxation of restrictions, but the separation of roles! Designing material operations by distinguishing between internal storage and external sharing.
- Other security
Operational design to "prevent incidents," including rights, usage periods, and audit logs! The first step for safe content operation.
- Internal Control and Operational Management