Supporting the safety and security of hybrid work in asset management companies with secret sharing technology.
We would like to introduce a case study of the implementation of "ZENMU for PC" at Asset Management One Co., Ltd. The company aimed to enable the use of business PCs outside the office to improve operational efficiency and reform work styles. However, a significant challenge was the awareness of information leakage risks associated with allowing the removal of PCs. After implementation, even in the event of loss or theft of a PC, information leakage could be prevented through the invalidation of authentication IDs and control of distributed fragments. This also allowed for a swift transition to a telework system during the COVID-19 pandemic. [Case Overview] ■ Challenges - To enable the removal of business PCs outside the office while significantly reducing information leakage risks. - Consideration of utilizing VDI, but the construction of the environment requires considerable effort and cost. ■ Effects - Safe and secure removal of business PCs became possible. - The transition of employees to telework due to the outbreak of COVID-19 was achieved promptly. *For more details, please download the PDF or feel free to contact us.
Inquire About This Product
basic information
【Selection Reasons】 ■Innovation that allows for an environment similar to "diskless PCs" to be realized with overwhelmingly fewer man-hours compared to VDI ■Safety of secret distribution technology that ensures no original data remains on the PC ■Efficiency of security operations that can immediately prevent unauthorized use of data in the event of theft or loss *For more details, please download the PDF or feel free to contact us.
Price range
Delivery Time
Applications/Examples of results
For more details, please download the PDF or feel free to contact us.
catalog(1)
Download All CatalogsCompany information
Our company offers a solution called "ZENMU," which "meaningless" data instead of using traditional encryption techniques that operate on a different concept. Traditional encryption technologies can be compromised due to advancements in decryption techniques, posing a risk of being read. Based on secret sharing technology, we can achieve "security measures that do not protect" by converting and splitting data into meaningless data.