IT asset management and information leak prevention in the cloud. It's easy to start managing work hours and laptops taken home for telework.
Visualize the terminal environment within the organization and achieve appropriate IT asset management. We support information security measures through log management and device restrictions. You can freely combine the necessary functions from five features (log management, device restrictions, IT asset management, IC card authentication, and prevention of unauthorized connections) to realize appropriate management of IT assets and information security measures that are just right for your company. You can contract for the required number of licenses for each function!
Inquire About This Product
basic information
【Log Management】Records all PC usage history 24/7, allowing verification of who used it and how. 【Device Restrictions】Specifies allowable devices such as USBs and printers to support your company's security. 【IT Asset Management】Administrators can remotely manage configuration information of PCs in a centralized system. 【IC Card Authentication】Utilizes IC cards for two-factor authentication to accurately identify PC users and track actual attendance times. 【Unauthorized Connection Prevention】Controls network connections of brought-in PCs and manages logs of those PCs.
Price information
【Cloud Monthly Fees】 IT Asset Management: 250 yen / ID Log Management: 350 yen / ID Control: 300 yen / ID IC Card Authentication: 600 yen / ID Unauthorized Connection Prevention: 6,000 yen / Segment *Please contact us regarding on-premises options.
Delivery Time
P2
※In the case of the cloud
Applications/Examples of results
- Reduce the risk of information leakage and decrease the burden and waste for administrators. - Telework. Understanding the usage of PCs during remote work. - Clearly identify the devices that need to be managed and monitor their connection status. - Provide remote support without leaving one's desk, such as through an internal help desk.
Detailed information
-
Customizable with only the desired features! Recommended for beginners as IT asset management can start small! 【Log Management】Records all PC usage history 24/7, allowing you to check who used it and how. 【Device Restrictions】Specifies usable devices such as USBs and printers to support your company's security. 【IT Asset Management】Administrators can remotely manage configuration information of PCs in a centralized system. 【IC Card Authentication】Utilizes IC cards for two-factor authentication to accurately identify PC users and track actual attendance times. 【Unauthorized Connection Prevention】Controls network connections of brought-in PCs and manages logs of those PCs.
Company information
Since our establishment in 1969, thanks to all of you, our company has grown to become a leading information and communication service provider in the local area. We sincerely thank the local community for their long-standing support. Our company focuses on building core systems for various operations, developing our own packages, and outsourcing services across a wide range of fields, including local governments, various organizations, agriculture, livestock and fisheries, private enterprises, and healthcare and welfare. We strive to provide detailed, one-stop services from planning, design, manufacturing, operation, maintenance, utilizing our own data center, to security measures in response to our customers' needs.