iPROS Urban Planning
  • Search for products by classification category

    • Building Materials
      Building Materials
      35541items
    • Facilities
      Facilities
      56657items
    • Lighting and Interior
      Lighting and Interior
      17273items
    • Common materials
      Common materials
      37004items
    • Civil Engineering Materials
      Civil Engineering Materials
      9533items
    • Construction, work and methods
      Construction, work and methods
      27655items
    • Surveys, Measurements, and Services
      Surveys, Measurements, and Services
      30352items
    • IT/Software
      IT/Software
      31783items
    • others
      others
      84503items
    • Store and facility supplies
      Store and facility supplies
      4358items
    • Office and commercial supplies
      Office and commercial supplies
      11462items
    • Hospital and welfare facility supplies
      Hospital and welfare facility supplies
      952items
    • Logistics Equipment
      Logistics Equipment
      7378items
    • Energy and Resources
      Energy and Resources
      11606items
  • Search for companies by industry

    • Information and Communications
      7197
    • others
      6979
    • Building materials, supplies and fixtures manufacturers
      6683
    • Service Industry
      4607
    • Trading company/Wholesale
      2996
    • Other construction industries
      2456
    • Electrical equipment construction business
      642
    • Interior Design
      528
    • Facility Design Office
      492
    • Construction Consultant
      464
    • Architectural design office
      361
    • retail
      345
    • Warehousing and transport related industries
      321
    • Electricity, Gas and Water Industry
      290
    • General contractors and subcontractors
      288
    • Interior construction business
      274
    • Medical and Welfare
      272
    • Educational and Research Institutions
      258
    • Building Management
      253
    • Renovation and home construction industry
      224
    • Water supply and drainage construction business
      204
    • Housing manufacturers and construction companies
      187
    • Transportation
      160
    • Real Estate Developers
      155
    • Fisheries, Agriculture and Forestry
      124
    • Structural Design Office
      66
    • Finance, securities and insurance
      35
    • Restaurants and accommodations
      29
    • self-employed
      29
    • Mining
      26
    • Public interest/special/independent administrative agency
      18
    • Police, Fire Department, Self-Defense Forces
      18
    • Store and building owners
      9
    • Property Owner
      8
    • Government
      8
    • Individual
      8
  • Special Features
  • Ranking

    • Overall Products Ranking
    • Overall Company Ranking
Search for Products
  • Search for products by classification category

  • Building Materials
  • Facilities
  • Lighting and Interior
  • Common materials
  • Civil Engineering Materials
  • Construction, work and methods
  • Surveys, Measurements, and Services
  • IT/Software
  • others
  • Store and facility supplies
  • Office and commercial supplies
  • Hospital and welfare facility supplies
  • Logistics Equipment
  • Energy and Resources
Search for Companies
  • Search for companies by industry

  • Information and Communications
  • others
  • Building materials, supplies and fixtures manufacturers
  • Service Industry
  • Trading company/Wholesale
  • Other construction industries
  • Electrical equipment construction business
  • Interior Design
  • Facility Design Office
  • Construction Consultant
  • Architectural design office
  • retail
  • Warehousing and transport related industries
  • Electricity, Gas and Water Industry
  • General contractors and subcontractors
  • Interior construction business
  • Medical and Welfare
  • Educational and Research Institutions
  • Building Management
  • Renovation and home construction industry
  • Water supply and drainage construction business
  • Housing manufacturers and construction companies
  • Transportation
  • Real Estate Developers
  • Fisheries, Agriculture and Forestry
  • Structural Design Office
  • Finance, securities and insurance
  • Restaurants and accommodations
  • self-employed
  • Mining
  • Public interest/special/independent administrative agency
  • Police, Fire Department, Self-Defense Forces
  • Store and building owners
  • Property Owner
  • Government
  • Individual
Special Features
Ranking
  • Overall Products Ranking
  • Overall Company Ranking
  • privacy policy
  • terms of service
  • About Us
  • Careers
  • Advertising
  1. Home
  2. Information and Communications
  3. カスタムテクノロジー 本社
  4. Product/Service List
Information and Communications
  • Added to bookmarks

    Bookmarks list

    Bookmark has been removed

    Bookmarks list

    You can't add any more bookmarks

    By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

    Free membership registration

カスタムテクノロジー 本社

EstablishmentJuly 14, 2010
capital3800Ten thousand
addressTokyo/Shibuya-ku/3-1-30 Jingumae, H1O Aoyama, Room 408
phone03-5210-2991
  • Official site
last updated:Jan 06, 2023
カスタムテクノロジーlogo
  • Contact this company

    Contact Us Online
  • Company information
  • Products/Services(31)
  • catalog(11)
  • news(0)

カスタムテクノロジー List of Products and Services

  • category

1~31 item / All 31 items

Displayed results

class="retina-image"

『SyncTrust Identity Manager』

Automate ID management through integration with the personnel system, achieving significant streamlining. Let's remove manual ID management tasks from the to-do list.

The ID integration management solution "SyncTrust Identity Manager" can automatically link user information such as ID, password, name, and employee number with AD and cloud services in conjunction with the HR system. This eliminates the need for manual management, allowing for easy and error-free ID management associated with personnel changes and organizational restructuring. 【Features】 ■ Prevents forgetting to delete accounts ■ Compatible with Active Directory ■ Standard workflow functionality included ■ Capable of saving history of ID creation, changes, and deletions ■ Purely domestic software developed in-house It can solve issues such as "I want to implement cloud services, but registering IDs for all employees is a hassle" and "There have been instances of forgetting to delete licenses for former employees, resulting in unnecessary costs." *For more details about the product, please download the materials. Feel free to contact us with any inquiries.

  • Personnel Information System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Sync Trust(R) Identity Manager

Strict management is possible with workflow features. Why not automate ID management to streamline your operations?

"Sync Trust Identity Manager" is a packaged solution that integrates with HR systems to automatically synchronize user information such as ID, password, name, and employee number with Active Directory and cloud services. By eliminating manual ID management tasks, it prevents human errors and significantly reduces operational workload. Additionally, Microsoft 365 licenses can be automatically registered and deleted, eliminating the risk of forgetting to revoke licenses for departing employees, thus avoiding unnecessary licensing costs and preventing unauthorized access by former employees. 【Features】 ■ Centralization and automation enable improved operational efficiency ■ Flexibly responds to personnel changes and organizational restructuring ■ Easy to implement and operate at a reasonable cost ■ Standard workflow functionality included ■ Can connect with additional systems through connector functionality ■ Reliable, fully domestically developed product *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

SyncTrust ID Card Manager(IDCM)

Streamlining the complex management of ID cards, such as access rights. Reducing the risk of unauthorized entry due to security laxity.

The "SyncTrust ID Card Manager (IDCM)" is an ID card management tool that allows for centralized management by linking personnel information (account information) with access permissions held by the card, as well as statuses such as loss or temporary suspension. It enables the streamlining of account information input and permission setting tasks, making it suitable for workplaces with a large number of employees or those with frequent location changes and transfers. It can also be integrated with the ID unified management solution "SyncTrust Identity Manager." Issuing and invalidating guest cards can be easily managed from the control panel, contributing to the reduction of security hole risks caused by the complexity of input and setting changes. 【To resolve the following issues and risks】 ■ Access is granted to places that should not be accessible. ■ ID cards for employees who have changed departments due to personnel transfers cannot be used immediately. ■ There are no countermeasures in place if an ID card is forgotten. ■ ID card information for former employees remains unchanged. *For more details, please refer to the materials available for download in PDF format. Feel free to contact us with any inquiries.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

SyncTrust ID Card Manager [Data Available]

Account information integration, support for temporary cards, integration of ID and permission information! Solving the challenges of ID card management.

This document introduces the "SyncTrust ID Card Manager," which addresses the challenges of ID card management. By centrally managing access rights that change during events such as organizational restructuring and personnel transfers alongside account information, efficient operations are achieved. It can be used as an option for "SyncTrust IM" or as a standalone IDCM. We invite you to read it. 【Contents (excerpt)】 ■Challenges in ID card management ■What is SyncTrust ID Card Manager (IDCM)? ■Features of SyncTrust ID Card Manager ■Examples of the image after implementing SyncTrust IM and IDCM ■Types of cards and card attributes *For more details, please refer to the PDF document or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Log compare for AccessMatrix UCM

Are you spending a lot of man-hours on log reconciliation work? Introduction to privileged ID management solutions.

If you introduce the privileged ID management product "AccessMatrix UCM" (hereinafter referred to as UCM), you can implement the application/approval of privileged ID passwords through a web-based workflow, and all of those records will be saved as logs. However, there is no function to reconcile those logs with the logs of operations performed using privileged IDs. "Log compare for AccessMatrix UCM" is a privileged ID operation management solution that allows you to understand the usage status of privileged IDs and identify privileged IDs not managed by UCM by reconciling the logs of UCM with the logs of the systems managed by UCM. 【Main Features】 ■ Detection of unauthorized logins - Use of privileged IDs not managed by UCM ■ Detection of logins outside the designated period - Usage history of privileged IDs that deviated from the application period of UCM ■ Confirmation of logins within the designated period - Usage history during the application period by privileged IDs managed by UCM *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

SyncTrust(R)Working Time Manager

Achieve accurate understanding and visualization of attendance status by visualizing and comparing data!

The "SyncTrust(R) Working Time Manager" is a work style reform application that combines entry and exit data from ID cards of an access control system with data from attendance management systems and time cards, enabling the visualization and comparison of these data to accurately grasp and visualize actual attendance conditions. Additionally, by integrating this system with existing access control systems and linking data, it can be utilized as a data tool that contributes to attendance information, shifting its role from merely a physical security gate. 【System Configuration Diagram】 ■ Extract the first and last entry and exit times (arrival/departure) of the day from the logs of the access control system. ■ The calendar function displays only the access logs for specified holidays. ■ The extracted and displayed data can be output as a CSV file. ■ The extracted and displayed data can be sent via email. *For more details, please download the PDF or feel free to contact us.

  • Attendance management system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Privilege ID Management Solution AccessMatrix UCM

There are numerous implementation results, mainly in financial institutions! It significantly enhances security and convenience.

"AccessMatrix UCM" is a privileged ID management solution that enables the application and approval of privileged ID passwords through a web-based workflow. All application and approval histories are stored as logs and provided as audit reports. By centrally managing the passwords of privileged IDs across a wide variety of systems, it significantly enhances security and convenience. 【Features】 ■ Zero impact on servers ■ Equipped with automatic password change functionality ■ Equipped with automatic login functionality ■ Allows for a small start to keep costs down ■ Enables detailed permission granting *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

ID Integrated Management Platform Solution AccessMatrix USO

Securely centralize increasingly complex ID information! The convenience of each login is also improved through single sign-on.

"AccessMatrix USO" is an ID integration management platform solution that enables login to multiple systems with a single authentication. It supports client-server applications and host-emulation applications that traditional SSO (Single Sign-On) products could not accommodate. There is no need to modify existing applications, and no coding is required at all. 【Features】 ■ Enables SSO for various applications ■ Supports smart devices ■ Can conceal passwords ■ Can be implemented without affecting existing applications ■ Provides audit reports *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Wi-Fi Security Sensor "AIRTMS"

Can be implemented as an independent system! Eliminating threats lurking in Wi-Fi to create a clean Wi-Fi environment.

Abroad, the concept of Wi-Fi security measures that completely prohibits the use of any Wi-Fi other than that authorized by the company has already become widespread. 'AIRTMS' is a solution that realizes such international standards of Wi-Fi security. The sensor itself determines unauthorized Wi-Fi usage and swiftly blocks unauthorized connections at high speed. It can be implemented as an independent system separate from the existing network. 【Features】 ■ Instantly (0-4 seconds) shuts out unauthorized Wi-Fi usage ■ Blocks wireless LAN connections that are not under management, such as tethering or portable Wi-Fi routers ■ Prevents security incidents such as malware infections and information leaks ■ Achieves international standards of Wi-Fi security *For more details, please refer to the PDF document or feel free to contact us.

  • Security Sensor Systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Data] Wi-Fi Security Sensor 'AIRTMS'

We publish utilization steps and screen images! We protect companies from threats lurking in Wi-Fi environments.

Wi-Fi is convenient, but it is difficult to manage due to factors such as "the signals are invisible," "they cannot be identified by appearance," and "it is hard to understand who is doing what." This document introduces the Wi-Fi security sensor 'AIRTMS' that protects companies from threats lurking in Wi-Fi environments. It includes information on the security risks of Wi-Fi in daily life, the ideal state in the Reiwa era, steps for utilization, and screen images. We encourage you to read it. [Contents (excerpt)] ■ Wi-Fi is convenient, but... ■ An era where we have no choice but to use Wi-Fi ■ Security risks of Wi-Fi lurking in daily life ■ Things to be aware of in corporate Wi-Fi security management ■ Unauthorized APs can be easily constructed *For more details, please refer to the PDF document or feel free to contact us.

  • Security Sensor Systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information Security] File Management and Encryption Solutions

Encrypt various data on a file-by-file basis, regardless of file format or storage location!

Our company provides security solutions to create a safer business environment. "Traditional security measures such as disk encryption and device control are insufficient." "A lot of traditional file encryption products have limitations on supported file formats and usability." Are you facing such issues? With 'DataClasys', you can encrypt various data on a file-by-file basis, regardless of file format or storage location. Once a file is encrypted, it maintains its original state, minimizing damage in the event of leakage or data breaches. [Background/Challenges] - The sophistication and cunning of security threats, including targeted attacks - Diversification of devices and services used - Diversification of data (file) storage locations, including on-premises and cloud - Traditional security measures such as disk encryption and device control are insufficient - Inadequate risk measures in case of data leakage or breaches - Many limitations on supported file formats and usability in traditional file encryption products *For more details, please refer to the related link page or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information Security] Personal Information Detection and Management Solution

Quickly search internal data to identify the location of data containing personal information! Execute necessary actions such as deletion!

Are you having trouble with things like 'the whereabouts of data (files) containing personal information is uncertain' or 'it's unclear whether the data handling rules are being properly implemented'? Our company provides security solutions to create a safer business environment. With 'P-Pointer File Security', you can quickly search for internal data and identify the location of files containing personal information. It executes necessary processes such as data movement and deletion based on handling rules. [Background/Challenges] ■ The whereabouts of data (files) containing personal information is uncertain. ■ It's unclear whether the handling rules for data containing personal information are being properly implemented. *For more details, please refer to the related link page or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information Security] Wi-Fi Security Sensor

Constantly monitor and visualize Wi-Fi usage! It can be implemented without changing the existing network.

Are you struggling with issues such as 'difficulties in grasping usage situations like unauthorized access points' and 'insufficient measures to prevent attacks and unauthorized access via Wi-Fi'? Our company offers security solutions to create a safer business environment. With 'AIRTMS', you can continuously monitor and visualize Wi-Fi usage. It can detect and block communications from unauthorized access points and unapproved devices. [Background/Challenges] - The use of Wi-Fi (wireless LAN) has increased alongside the expansion of mobile device usage. - Difficulties in grasping usage situations like unauthorized access points. - Insufficient measures to prevent attacks and unauthorized access via Wi-Fi. - The burden of reconstructing existing networks for security measures. *For more details, please refer to the related link page or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information Security] One-Time Password Authentication System

Strengthen identity verification with one-time passwords, multi-factor authentication, and multi-step authentication! Reduce the risk of unauthorized access!

Our company provides security solutions to create a safer business environment. Are you struggling with the increasing burden of managing IDs and passwords as the number of devices used by a single user diversifies, leading to security issues such as password reuse and inadequate updates? With "WisePoint Shibboleth," you can enhance user authentication through one-time passwords, multi-factor authentication, and multi-step authentication, reducing the risk of unauthorized access due to user impersonation. [Background/Challenges] - Diversification of devices used by a single user - Increase in applications and services used - Growing burden of managing IDs and passwords - Decreased security due to password reuse and inadequate updates *For more details, please refer to the related link page or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[ID Integration Management] Privileged ID Management Solution

Unify the workflow for application/approval and password issuance! Creating audit reports is easy, and automation is also possible.

Our company provides solutions suitable for customers who feel that "manual responses have their limits." Are you experiencing issues such as "the application/approval flow is complicated and varies by department or system" or "insufficient audit responses for usage verification and reconciliation"? With 'AccessMatrix UCM', we unify the application/approval and password issuance workflows. It reduces the burden of ID management tasks, such as automatic password updates, makes it easy to create audit reports, and allows for automation. [Background/Challenges] - Management of privileged IDs/passwords is done manually (by hand). - The application/approval flow is complicated and varies by department or system. - The increase in target systems has also increased the burden of ID management. - Insufficient audit responses for usage verification and reconciliation. *For more details, please refer to the related link page or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

ID Integration Management Single Sign-On Solution

No changes are needed for existing systems and applications! High security with numerous proven results, starting with financial institutions!

Are you struggling with issues such as using an old system that cannot manage ID integration and the decline in security due to password reuse?" "Our company provides solutions suitable for our customers, focusing on 'improving operational efficiency,' 'reducing human errors,' and 'strengthening audit compliance.' With 'AccessMatrix USO,' we enhance user convenience through single sign-on (SSO). It offers high security with numerous proven results, especially in financial institutions. [Background/Challenges] ■ Many business systems in use (applications, servers) ■ Using an old system that cannot manage ID integration (client/server systems, custom-developed applications, consoles, etc.) ■ User burden due to different IDs/passwords ■ Decline in security due to password reuse *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

ID Integration Management Work Style Reform Support Application

Import logs and automatically aggregate! Easily display statistical graphs and distribute regular reports.

Our company provides solutions tailored to our customers, such as "improving operational efficiency," "reducing human errors," and "strengthening audit responses." "Accurate understanding and visualization of attendance data is necessary as part of work style reform." "Are you experiencing an increase in the workload for aggregation, analysis, and report creation?" With 'SyncTrust Working Time Manager,' you can automatically aggregate logs from attendance management/access control systems. It easily displays statistical graphs and distributes regular reports. [Challenges] ■ Accurate understanding and visualization of attendance data is necessary as part of work style reform. ■ Insufficient linkage between attendance management/access control and user (employee) information. ■ Increased workload for aggregation, analysis, and report creation. *For more details, please refer to the PDF document or feel free to contact us.

  • Attendance management system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[ID Integration Management] Privileged ID Management Operation Log Reconciliation Solution

Further enhance AccessMatrix UCM to support auditing tasks! Display reconciliation results simply.

"I want to conduct an audit of privileged ID usage history, but I am looking for something simple." "I want to confirm whether the work done with privileged IDs is being carried out as per the application." Do you have anything like that? Our company provides solutions suitable for customers who feel that "manual responses have their limits." With 'Log compare,' you can match the application data of the privileged ID management solution AccessMatrix UCM with the login data of the target management server and display the matching results simply. [Challenges] ■ I want to conduct an audit of privileged ID usage history, but I am looking for something simple. ■ I want to confirm whether the work done with privileged IDs is being carried out as per the application. *For more details, please refer to the related link page or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

ID Integration Management: ID Card Management Solution

Bulk operations to assign permissions to multiple ID cards! You can also set detailed permissions individually.

Our company provides solutions tailored to our customers, such as "improving operational efficiency," "reducing human errors," and "strengthening audit responses." Do you have any needs like "I want to handle tasks such as forgetting ID cards, issuing visitor cards, and reissuing them accurately and easily" or "I want to reduce the workload of updating card information"? With 'SyncTrust ID Card Manager', you can manage permissions for multiple ID cards in bulk. You can also set detailed permissions individually. [Challenges] ■ I want to reduce the workload of updating card information ■ I want to handle tasks such as forgetting ID cards, issuing visitor cards, and reissuing them accurately and easily ■ I want to link HR data with ID card management *For more details, please refer to the PDF document or feel free to contact us.

  • Entrance and exit control system
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[ID Integration Management] Shared Address Book

Easily display results with keyword and department searches! A web-based shared address book is immediately available!

Is it difficult to quickly find the necessary user information among a large number of user profiles? Are you facing issues such as not having a clear shared address book that corresponds to your organizational hierarchy? Our company provides solutions suitable for customers who feel that 'manual handling has its limits.' With 'SyncTrust Contact,' you can immediately use a web-based shared address book that clearly displays results through keyword and department searches. You can also display user (employee) photo data. [Challenges] ■ It is difficult to quickly find the necessary user information among a large number of user profiles. ■ There is no clear shared address book that corresponds to the organizational hierarchy. ■ There is no shared address book that responds in real-time to personnel changes or organizational restructuring. *For more details, please refer to the related link page or feel free to contact us.

  • Other Software
  • Electronic document system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

ID Integration Management ID Integration Management Solution

Speed up audit responses by saving account change history! Reduce operational burdens and human errors!

Our company provides solutions suitable for customers who feel that "manual responses have their limits." Are you struggling with issues such as "having many group companies, affiliated companies, and subsidiaries," "frequent organizational changes and personnel transfers," or "complex settings, management, and operations for each system"? With 'SyncTrust Identity Manager,' you can flexibly integrate with various systems and cloud services, including Active Directory and groupware. By automating ID management and application, you can reduce operational burdens and human errors. [Background and Challenges] ■ Many business systems in use (applications, servers) ■ Large number of users ■ Huge volume of user support tasks such as password resets ■ Inconsistent operational rules and management systems ■ Difficulty in understanding the status of user information updates and deletions *For more details, please refer to the PDF document or feel free to contact us.

  • Entrance and exit control system
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[SyncTrustIM Case Study] Improvement of Account Management for Multiple Group Companies

Reduced the time spent thinking of addresses following cumbersome rules! A case of workload reduction.

"SyncTrust IM" is an ID and account management solution that automates and streamlines business operations. Company F in the service industry has many group companies and a large number of users to manage, making account management tasks busy, but they faced the problem of not being able to secure enough personnel for the task. Therefore, they implemented our product. It has become possible to manage with fewer personnel, and by appointing administrators for each group company, they have been able to reduce the workload. [Case Overview] ■ Implemented Product: SyncTrust Identity Manager ■ Number of Users: Approximately 1,900 ■ Integrated Systems ・Active Directory (Windows Server 2008) ・G Suite ・Core System *For more details, please refer to the PDF document or feel free to contact us.

  • Entrance and exit control system
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[SyncTrust IM Case Study] Integration with Common Authentication Infrastructure

By consolidating the rules for personnel information into one, we significantly reduce the effort required for information organization!

"SyncTrust IM" is an ID and account management solution that automates and streamlines business operations. Company E in the manufacturing industry faced issues due to varying HR systems and management methods across its group companies, resulting in a lack of consolidated HR information and an increased workload for organization and management. To address this, the company implemented our product. By standardizing the rules for HR information, they significantly reduced the workload for information organization. With the company and organization master in place, they were able to automate account operations tailored to their organization. [Case Overview] ■ Product Implemented: SyncTrust Identity Manager ■ Number of Users: Approximately 15,000 ■ Integrated Systems - Active Directory (Windows Server 2008) - Oracle Directory Server - PowerGres Database - Cloud System Integration Tools - Single Sign-On System *For more details, please refer to the PDF document or feel free to contact us.

  • Entrance and exit control system
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[SyncTrust IM Case Study] Improvement of Account Management

Significantly reduce the procedure for obtaining account information! Queries can be made using search by username, department name, and more!

"SyncTrust IM" is an ID and account management solution that automates and streamlines business operations. The Independent Administrative Institution D Organization faced a problem where account information was not centrally managed, making it difficult to properly manage who could log into which system. To address this issue, our product was implemented. The account management system retains the account information of users registered in each application, allowing for inquiries of account information through searches by username, department name, and more. [Case Overview] ■ Product Implemented: SyncTrust Identity Manager ■ Number of Users: Approximately 600 ■ Integrated Systems - Active Directory (Windows Server 2008R2) - Mail Server (Postfix+Dovecot) - IC Card Management Server (SecureDive) - General Affairs System - Groupware (WebAS Key’s Portal) *For more details, please refer to the PDF document or feel free to contact us.

  • Entrance and exit control system
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[SyncTrust IM Case Study] Delegation of Account Management Authority

Flexible account management is possible with standard features! Managing groups will also become easy.

"SyncTrust IM" is an ID and account management solution that automates and streamlines operations. In the central government organization C, the management of staff was entrusted to certain users within each organization, and the management of accounts for information systems could not be centralized. Therefore, this product was introduced. By delegating account management authority to users performing operations and providing an easy-to-understand web interface, centralized management of accounts has become possible. [Case Overview] - Product Introduced: SyncTrust Identity Manager - Number of Users: Approximately 74,000 - Linked Systems: - Active Directory (Windows Server 2008 R2) - Microsoft Exchange Server 2013 - FileZen *For more details, please refer to the PDF document or feel free to contact us.

  • Entrance and exit control system
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[SyncTrust IM Case Study] Integration with One-Time Password Authentication

Secure access is now possible! A case where account management and serial number registration can be centralized.

"SyncTrust IM" is an ID and account management solution that automates and streamlines business operations. Company B in the service industry expressed a desire to securely access internal content from outside the company and to integrate employee identification (cards) to prevent loss and other issues. As a result, our product was implemented. With the one-time password solution from IP Cube, secure access has been achieved. [Case Overview] ■ Implemented Product: SyncTrust Identity Manager ■ Number of Users: Approximately 1,000 ■ Integrated Systems - Active Directory (Windows Server 2012R2) - Microsoft Exchange Server 2013 - RADIUS Server (Enterpras) - One-Time Password (AuthWay) - SSL-VPN (Appliance) *For more details, please refer to the PDF document or feel free to contact us.

  • Entrance and exit control system
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[SyncTrust IM Case] Automatic Integration with HR System

Easily find users and improve operational efficiency! Can be linked in real-time.

"SyncTrust IM" is an ID integration management solution that automates ID and account management to streamline operations. Company A in the service industry faced challenges due to the large number of systems they managed and frequent personnel changes, which made account creation for each system cumbersome and problematic. With the introduction of our product, it has become automatically linked to the information in the HR system, resulting in almost no maintenance work related to account management. [Case Overview] ■ Product Introduced: SyncTrust Identity Manager ■ Number of Users: Approximately 15,000 ■ Linked Systems - CP Messaging Server (our handled mail server) - CP Directory Server (our handled LDAP server) - Active Directory (Windows Server 2012R2) - Oracle Database 11g *For more details, please refer to the PDF document or feel free to contact us.

  • Entrance and exit control system
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[SyncTrust IDCM Case Study] Manufacturing Industry Company G

Significant reduction in the management tasks of system IDs and ID cards! We have kept personnel costs lower than the old system.

"SyncTrust IDCM" enables efficient operations by centrally managing access rights that change during events such as organizational restructuring and personnel transfers alongside account information. Company G in the manufacturing industry was manually entering personnel information into their ID card management system, resulting in a significant increase in labor hours. As a solution, they implemented our product. By drastically reducing the management tasks for system IDs and ID cards, they were able to replace the old system while keeping personnel costs lower. [Case Overview] ■ Product Implemented: SyncTrust ID Card Manager ■ Challenges and Issues Before Implementation - The labor hours for the ID card management system were very high. - Due to the complexity of the registration process to Active Directory (AD), they considered a system that could reduce workload and enable ID integration with the ID card management system. - The ID card management system was outdated, and maintenance costs were high, prompting consideration for replacement. *For more details, please refer to the PDF document or feel free to contact us.*

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Log comparison case] Service industry Company H

It is now possible to provide matching data as proof for the audit work that has been a challenge!

"Log compare" is a solution that simply matches server login information with privileged ID application information. Company H in the service industry manages dozens of Windows Servers and had been conducting maintenance using privileged ID management, but they were unable to check whether the work was being carried out according to the application information. Therefore, they implemented our product. By matching the logs of Windows Servers with the application logs from AccessMatrix UCM, they were able to display and verify the matching results in a simple and easy-to-understand manner. [Case Overview] ■ Implemented Product: Log compare ■ Effects After Implementation - Matched application logs and displayed and verified the matching results in a simple and easy-to-understand manner. - It became possible to provide matching data as proof for the auditing tasks that had been a challenge. *For more details, please refer to the related link page or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[AGC Case Study] Interview Materials on the Optimization of Privileged ID Management

[Data Presentation in Progress] Unified privilege ID management, integrated with Active Directory! The workload related to applications and permission changes has been reduced.

AGC Inc., a leading glass manufacturer representing the world, operates globally in over 30 countries and regions. The company has introduced 'AccessMatrix UCM' to streamline the management of privileged IDs assigned to its own and business partner information system personnel, while ensuring robust security. With this implementation, when personnel change due to transfers, there is no longer a need to assign multiple privileged IDs to each individual as before, thereby reducing the workload related to applications and permission changes. 【Case Study】 ■Challenges - Multiple privileged IDs were assigned per individual/system. - Responding to audits (such as submitting evidence and inventory) was inefficient. - Operational staff were constantly assigned privileged ID permissions. ■Implemented Product - AccessMatrix UCM *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Product Introduction Case] Centralizing ID management for the increasing number of internal systems.

Achieve enhanced security and improved operational efficiency! SSO is now possible for all systems, including AS400.

We would like to introduce a case study on the implementation of a product that centralized the management of IDs for the continuously increasing internal systems. At Mitsui Trust Loan & Finance Co., Ltd., the management of IDs and passwords became a significant burden due to the increase in internal systems. To improve efficiency, they transitioned from their traditional single sign-on system to 'AccessMatrix USO'. As passwords are no longer exposed and users no longer need to manage multiple passwords, security has been enhanced. [Case Study] ■Challenges - The management of IDs and passwords became a significant burden due to the increase in internal systems. ■Implemented Product - AccessMatrix USO *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
Prev 1 Next
  • イプロスがリアル展示会を主催します! AI/DX 営業・マーケティング展 出展社募集中 リード数・商談数が止まらない!新しいリアル展示会を提供 会期 2026年3月24日(火)~25日(水) 会場 東京ビッグサイト東4ホール 出展概要資料を進呈!
    • Contact this company

      Contact Us Online

    Products

    • Search for Products

    Company

    • Search for Companies

    Special Features

    • Special Features

    Ranking

    • Overall Products Ranking
    • Overall Company Ranking

    support

    • site map
    IPROS
    • privacy policy Regarding external transmission of information
    • terms of service
    • About Us
    • Careers
    • Advertising
    COPYRIGHT © 2001-2025 IPROS CORPORATION ALL RIGHTS RESERVED.
    Please note that the English text on this page is automatically translated and may contain inaccuracies.