Security Measures Product Information
Structure of Quality Products
Quality products consist of four categories:"IT asset management/PC configuration management" based on "QND/QAW", de facto standard IT asset management tool, "License management" by KeyServer, "PDF creation" that supports making of PDF of business documents, and "Security" for the protection of corporate system from both sides of client and file access.
Quality Products Lineup
There are various products that provide effective solutions - from checking of corporate risks to taking measures against them.
IT asset management/PC configuration management
It covers various fields - checking the real situation of client PC, creating inventory book, automatic installation, and audit over weakness. It reduces man-hours for management tasks, and protects the company from risks like attack by virus.
In addition to the standard functionalities of IT asset management took QND Plus, extra functionalities such as controlling launches and checking status of usage of programs. Not only the maintenance and management of client PC configuration, but proper restriction of use of the system according to your own management policy becomes possible.
It is a tool for collecting operation log of clients, which collects eleven types of information (including "web browsing", "email sending/receiving", and "operation of files") that a user operated during his/her logon session. It facilitates early detection of illegal uses by scheduled auditing of accumulated log data, and also helps you pinpoint a cause rapidly in case of security incident.
eX Report, tool for auditing securty and analyzing logs, calculates inventory data collected by QAW/QND Plus, operation logs of clients collected by eX CLT, and results of personal information files detected by eX PDS, creates various security reports, and makes them checkable on web browsers.
Personal Information File Detecting Tool eX PDS detects "personal information files" stored in computers, collects filenames and where they are stored, and displays a list by each computer. It supports inventory taking of personal information which scatters through computers, with the use of QND/QAW.
Copying of data to external memory devices can be prohibited, without disabling use of data from external memory devices. It avoids information leaks through external memory devices.
ASP-type IT asset management service
ISM is a system that can provide services on the net, as security measures for computers in companies (such as small and medium-sized companies) that can't assign full-time system administrators. Quality is providing ISM for internet service providers.
File Access Control
It adds strict access control on electronic documents that companis or organizations possess, on file by file basis, so protects "personal information", "intellectual property", "secret information", etc. The access history is saved, and unauthorized access is impossible in case the file flowed out. Aggressive disclosure of information becomes possible after it is adequately protected.
Anyone can simply transform business documents to PDF format, with a feeling of using printer driver. PDF creation feature can be built into the business system with the control interface provided by the tool.
It grasps the status of software usage and restricts launches of unauthorized programs. Its license management feature avoids illegal software copies, and is useful for the reduction of software purchase costs.
Concurrent Office reduces man-hours for the management of software licenses drastically as well as software purchase costs, subject to its using with KeyServer that realizes strict network license management. "Concurrent use license" is provided with Concurrent Office.