Adopted for measures against information leakage in mobile work! An important piece supporting the security business.
We would like to introduce a case study of the implementation of "ZENMU Virtual Desktop" at PSC Corporation. The company had taken measures such as disk encryption to prevent information leakage from portable PCs, but the risk of information being accessed due to theft or loss of PCs could not be reduced to zero. After the introduction of our product, they were freed from the anxiety of information leakage from portable PCs, and even when transitioning partially to a remote work system, they were able to allow employees to use PCs with peace of mind without hastily implementing special measures. 【Case Overview】 ■Challenges - A significant reduction in the risk of information leakage from portable PCs was required. - Aiming to reduce the risk of information leakage from portable PCs to as close to zero as possible. ■Effects - Mobile work and remote work can be promoted without worrying about the risk of information leakage. - Expansion and strengthening of the portfolio of endpoint security solutions for customers. *For more details, please download the PDF or feel free to contact us.
Inquire About This Product
basic information
【Selection Reasons】 ■Innovation in creating a state where there are no original data files on the PC's local disk ■Lower running costs and higher security strength compared to DaaS and others *For more details, please download the PDF or feel free to contact us.
Price range
Delivery Time
Applications/Examples of results
For more details, please download the PDF or feel free to contact us.
catalog(1)
Download All CatalogsCompany information
Our company offers a solution called "ZENMU," which "meaningless" data instead of using traditional encryption techniques that operate on a different concept. Traditional encryption technologies can be compromised due to advancements in decryption techniques, posing a risk of being read. Based on secret sharing technology, we can achieve "security measures that do not protect" by converting and splitting data into meaningless data.