1~6 item / All 6 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~6 item / All 6 items
We would like to introduce the feature "Unauthorized Connection Prevention" of SecureSeed Plus. External PCs are controlled to prevent them from connecting to the network, allowing only registered internal PCs to be used. You can choose between "Detection Mode" and "Blocking Mode." Instead of prohibiting the connection of personal PCs, it is also possible to understand the current situation in "Detection Mode." If an unregistered device connects to the internal network, it will be detected immediately, and the connection will be blocked, maintaining an appropriate network environment. 【Solutions to the following concerns】 ■ There are vendors or employees connecting personal PCs to the internal network from outside. ■ We want to conduct an inventory of internal network devices (routers, hubs, printers, etc.). *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce the feature "IC Card Authentication" of SecureSeed Plus. With two-factor authentication using an IC card and password, it is possible to accurately identify individuals using PCs, as well as to accurately grasp actual attendance times. It is also possible to forcibly perform operations such as locking, logging off, or shutting down at specified times, which can be utilized for work style reform. 【Solutions to the following concerns】 ■ Unable to know when and who is using shared PCs; unclear usage status ■ Want to enhance not only security but also convenience when logging into PCs and software ■ Want to limit PC usage time to reduce overtime without applications *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce the feature "IT Asset Management" of SecureSeed Plus. Information is managed collectively in the system. Administrators can remotely grasp information such as PC configuration details. Additionally, the help desk can resolve issues while sharing screens. You can easily refer to the latest asset list you need from the collected information. 【Solving these kinds of problems】 ■ Unable to grasp how many PC assets there are, including those at headquarters and branches, and unaware of what software is installed. ■ There is an Excel ledger, but maintenance is lagging, and it has become outdated. ■ Explaining operations to employees working at remote locations, such as in other prefectures, takes too much time when done only by phone. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce the feature "Device Restriction" of SecureSeed Plus. It allows you to specify and control available devices such as USBs, applications, and printers. For example, USBs can be managed by serial numbers, supporting information security measures. By making the actions taken public to employees, we can also expect a deterrent effect against inappropriate PC usage. 【Solutions to such concerns】 ■ Employees can easily take important internal information out using USB drives, which also carry a high risk of loss or theft. ■ There may be software running internally, such as file-sharing programs, that pose a risk of information leakage, but it is not known. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce the feature "Log Management" of SecureSeed Plus. It collects and records various operations performed on the PC as logs. By accurately understanding "when," "who," and "how" it was used, we can monitor operations unrelated to business and visualize the situation. This has the effect of deterring personal use of the PC and enhancing labor productivity. 【Solutions to the following concerns】 ■ When there is a data leak, we cannot identify the cause or take countermeasures. ■ We want to check if there are any unauthorized overtime or false overtime claims. ■ We want to understand if there are any uses of company PCs for non-business purposes or operations that could lead to data leaks. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationVisualize the terminal environment within the organization and achieve appropriate IT asset management. We support information security measures through log management and device restrictions. You can freely combine the necessary functions from five features (log management, device restrictions, IT asset management, IC card authentication, and prevention of unauthorized connections) to realize appropriate management of IT assets and information security measures that are just right for your company. You can contract for the required number of licenses for each function!
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration