1~14 item / All 14 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~14 item / All 14 items
The "ZENMU Engine" is a demeaning solution that realizes a new concept of data protection by eliminating risks through meaningless data. By transforming control and authentication data into multiple meaningless data pieces and sending them separately, it prevents tampering risks. It continuously collects a single piece of generated data from edge devices and collects larger distributed pieces when necessary. Additionally, by having each individual hold a part of the data or access distribution key, it secures a private area in the cloud. 【Product Lineup】 ■ Secret distribution at the file level ■ Secret distribution at the drive level ■ Secret distribution storage system ■ Secret distribution database *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"ZENMU Virtual Drive" is a solution that achieves security, convenience, and high productivity. It obfuscates user data on the PC using a unique secret sharing technology and stores it in a distributed manner both on the PC and in the cloud. To maximize the use of PC resources, it is unaffected by network conditions and can be used offline. Additionally, when theft or loss is detected, the user or administrator can stop access to the distributed files in the cloud, preventing information leakage from the PC. 【Features】 ■ Peace of mind in case of PC theft or loss ■ Easy and cost-effective to implement ■ Stable performance *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationVDI (Virtual Desktop Infrastructure) transfers only screen information without storing data on local PCs. As a work environment for telecommuting, this VDI, which was adopted during the COVID-19 pandemic, has begun to reveal various challenges due to subsequent changes in circumstances. In response, ZenmuTech will conduct a "VDI Market Trend Survey" in December 2023. This time, by unraveling the challenges of VDI identified in this survey, we would like to consider the form of business infrastructure required in the coming era. *For detailed content of the column, please refer to the published catalog. For more information, feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationMany companies are implementing Virtual Desktop Infrastructure (VDI) as a measure to prevent information leakage from PCs. However, with the widespread adoption of telecommuting, issues have arisen such as increased network load when access is concentrated, leading to slower response times and decreased quality of audio and video in web conferences. If the applications and systems introduced to improve business efficiency and productivity cannot be used effectively due to infrastructure problems, it could be considered counterproductive. *For more details on the column, please refer to the published catalog. Feel free to contact us for more information.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of the implementation of "ZENMU Virtual Desktop" at PSC Corporation. The company had taken measures such as disk encryption to prevent information leakage from portable PCs, but the risk of information being accessed due to theft or loss of PCs could not be reduced to zero. After the introduction of our product, they were freed from the anxiety of information leakage from portable PCs, and even when transitioning partially to a remote work system, they were able to allow employees to use PCs with peace of mind without hastily implementing special measures. 【Case Overview】 ■Challenges - A significant reduction in the risk of information leakage from portable PCs was required. - Aiming to reduce the risk of information leakage from portable PCs to as close to zero as possible. ■Effects - Mobile work and remote work can be promoted without worrying about the risk of information leakage. - Expansion and strengthening of the portfolio of endpoint security solutions for customers. *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of the implementation of "ZENMU for PC" at Mitsui-Soko Holdings Co., Ltd. The company introduced a thin client as a security measure for in-house PCs; however, due to its lack of portability, they had to print out materials for meetings each time, resulting in low convenience. Additionally, there were challenges related to performance and cost. After the introduction of our product, we received feedback that users could operate without particularly being aware of the data being distributed, and they did not feel any decrease in performance. [Case Overview] ■Challenges - Insufficient performance of the thin client - High cost burden associated with the transition to Windows 10 ■Benefits - Smooth implementation with user-friendly operation that does not burden users - Elimination of security risks due to theft or loss of laptops *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of the implementation of "ZENMU Virtual Drive" at LRM Corporation. The company had been encrypting disks as a measure against information leakage from PCs, but there was still a risk of data theft if a PC was stolen and user authentication was compromised, leaving them unable to dispel their concerns about security measures. Therefore, they sought a more robust security service and implemented our product. They gained peace of mind knowing that user data would be well protected even in the event of loss or theft of a PC. [Case Summary (Partial)] ■Challenges - Previous measures could not alleviate concerns about information leakage. - Although they considered VDI cloud services, there were drawbacks such as the considerable effort required for implementation and the inability to use it on offline PCs. *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case study of the implementation of "ZENMU for PC" at Asset Management One Co., Ltd. The company aimed to enable the use of business PCs outside the office to improve operational efficiency and reform work styles. However, a significant challenge was the awareness of information leakage risks associated with allowing the removal of PCs. After implementation, even in the event of loss or theft of a PC, information leakage could be prevented through the invalidation of authentication IDs and control of distributed fragments. This also allowed for a swift transition to a telework system during the COVID-19 pandemic. [Case Overview] ■ Challenges - To enable the removal of business PCs outside the office while significantly reducing information leakage risks. - Consideration of utilizing VDI, but the construction of the environment requires considerable effort and cost. ■ Effects - Safe and secure removal of business PCs became possible. - The transition of employees to telework due to the outbreak of COVID-19 was achieved promptly. *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "ZENMU Engine" is a meaningless solution that realizes a new concept of data protection, which is to "eliminate risks by rendering information meaningless rather than protecting it." "Use information only when necessary, and render it meaningless when not needed." This is the new era of security envisioned by ZENMU. 【Application Examples】 ■ Distributing house and car keys to wearable devices ■ Distributing and authenticating control data for various home appliances ■ Reducing communication costs in data collection from IoT devices ■ Utilizing a safe and secure public cloud *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"ZENMU for Delivery" is a data security solution that allows you to easily and safely send and receive important and large data over the internet at a low cost. It reduces the hassle and cost of transmitting and transporting confidential data. Inexpensive public clouds can be used as transmission routes for confidential data. 【Features】 ■ Transforms the data you want to send into meaningless distributed fragments ■ No need for encryption, passwords, or dedicated lines during transmission ■ Sends distributed fragments via separate routes ■ Restores the original data from the received distributed fragments ■ No installation of dedicated software is required on the receiving side *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"ZENMU for IOT" allows for safe storage and management in the cloud. It enables reductions in communication costs and storage costs. In the future, it will contribute to measures against information leakage and data tampering on the internet. 【Features】 ■ Reduction of communication costs ■ Reduction of storage costs ■ Safe storage and management in the cloud ■ In the future - Measures against information leakage and data tampering on the internet *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"ZENMU for Meister" is a solution that clearly separates system management from information management, achieving important "zoning" for information leakage prevention through an "invisible vault" that even system administrators cannot access data from. Without the access distribution key issued by the owner to users permitted to access the information, even with administrator privileges, access to the information is not possible. 【Features】 ■ Complete separation of "system management" and "information management" ■ Prevention of data tampering and information leakage due to privilege takeover ■ Protection of information even if all distributed fragments of meaningless data are leaked ■ "Decryption programs" are also managed in a distributed manner along with the "data" *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"ZENMU for PC" is a data security solution that obfuscates data using AONT-based secret sharing technology. It addresses challenges and risks such as "encryption makes key and password management difficult," "even with thin client setups, offline use is not possible," and "pre-approval systems require setup each time, leading to hassle and costs." 【Features】 ■ Obfuscates data on the PC and transforms it into separate media ■ User-friendly with simple settings ■ Supports various data types through normal file operations ■ Enables offline work by placing necessary data in a virtual drive for transport ■ Allows for the safe transport of the PC typically used, ensuring information security *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"ZENMU" is an open security infrastructure that "de-meaning" data, which differs conceptually from traditional encryption technologies. By converting and splitting data into meaningless data, it makes it unreadable with just one fragment, and it can only be restored when all distributed fragments are gathered. 【Features】 ■ Achieves robust security by storing fragments in multiple locations ■ Establishes information safety without user awareness ■ Liberation from new security costs *For more details, please download the PDF or contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration