1~4 item / All 4 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~4 item / All 4 items
We would like to introduce a case of "in-house system support" conducted at a comprehensive leasing company. The company developed a rental system and approval system using Access in-house, and while the development staff were responsible for operation and maintenance, there were concerns about the future management of the system as the person in charge was set to retire at the end of March 2024. Therefore, in preparation for the handover of maintenance, we divided the response into an investigation phase (2 months) and a maintenance phase (from April 2023). Based on the investigation results, we are creating and updating necessary documents for operation and maintenance. [Case Overview (Partial)] ■ Request: Break away from a system operation and maintenance structure that relies on specific individuals ■ Support Content (Investigation Phase) - Impact investigation in case the current person in charge is unavailable - Understanding the volume of work that needs to be handed over - Creating individual documents necessary for operation and maintenance for each system *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a case of "in-house IT support" conducted at a semiconductor trading company. The company had a single IT personnel in charge, yet the scope of operations continued to expand. Additionally, a core system reconstruction project was underway within the company, and the management strongly demanded a transformation from a one-person IT department to an organized structure. In response, we conducted an inventory of existing systems and IT operations. We aimed to strengthen business continuity through the "visualization" and "documentation" of tasks that had become overly reliant on individuals. [Requests] ■ Document the types, configurations, and integration status of systems to clarify the overall picture ■ Prevent the personalization of operations and improve business continuity ■ Address concerns about personnel shortages in preparation for the core system reconstruction project *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"Ion" is an IT support service that provides solutions to streamline your management operations and reduce costs by solving various projects for user-oriented companies together with experienced members. Our IT consultants, project managers, and leaders are seasoned professionals who have worked on projects across several user-oriented companies and have experience in collaboratively addressing various challenges. By entrusting us with tasks on a unit basis, you can reduce your management operations. 【Strengths】 ■ Experienced personnel ■ Team proposals ■ Long-term track record ■ Cost optimization *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe provide vulnerability assessment services to proactively prevent the risks of cyber attacks and information leaks, and to strengthen security. Even if you have little expertise in vulnerabilities, we will support you from the ground up in promoting vulnerability management so that you can ultimately operate independently and continuously. We will achieve a manageable, risk-based approach to vulnerability management. Please feel free to contact us if you have any requests. [Support Examples] ■ Learning how to use tools ■ Providing Japanese operation manuals ■ Discussing response policies for identified vulnerabilities *For more details, please download the PDF or contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration