1~3 item / All 3 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~3 item / All 3 items
This document summarizes case studies of the implementation of the information leakage prevention system "Total Security Fort." It provides detailed information on the background and circumstances of the implementation, as well as the effects after implementation and future prospects, covering case studies from a total of eight companies. Please use this information for your consideration of product implementation. 【Featured Case Studies (Partial)】 ■ NTT Data Corporation ■ Yokote City Hall, Akita Prefecture ■ Meiden System Technology Co., Ltd. ■ Veriserv Inc. ■ SII Data Service Co., Ltd. and others *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"Total Security Fort Ver. 5.6" is an information leakage prevention system that protects organizations from targeted attacks, internal misconduct, and human errors, preventing information leaks. It can retrieve and utilize organizational and user information from the AD server (Active Directory). It is also possible to create and manage custom domains and custom users that do not depend on AD. Additionally, it includes features to ensure secure and smooth telework through device control and network control. [Features] - Flexible operational management with AD synchronization and approval requests - Support for diverse working styles with information leakage countermeasures and operational management - Prevents leakage of confidential information with SVS Security Disk - Control of protected areas regardless of the application - Measures against unauthorized access to confidential servers *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "Handwriting Recognition Kernel" is a product that allows for customized operations defining the recognition of handwritten characters and touch operations using a pen or finger on electronic devices equipped with touch panels or touchpads. It supports not only the recognition of alphabets and single characters but also cursive English writing, as well as multiple character input in Japanese and Chinese in full-screen mode. It adapts to various environments and provides language addition support and technical assistance through customized development, being adopted by more than 30 major manufacturers both domestically and internationally. 【Features】 ■ Support for the most languages - The number of supported languages is among the highest in the industry. Development for new languages is also underway. ■ Energy-efficient design - The recognition kernel's algorithm can be adjusted. ■ Modular support - Compatible with over 300 types of devices. ■ Development track record - Over 20 years of experience in recognition kernel development and system integration. *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration