Regulates confidential information that must remain in the company
JP1/HIBUN can restrict data exchange using various devices (peripheral devices of PC) such
as smartphones*1, removable media including USB memories, wired LAN, wireless LAN, Infrared
(IrDA), and Bluetooth. By restricting devices that can be used, information leakage due to
unauthorized data copying can be prevented.
In addition, since JP1/HIBUN features a setting that allows the use of specifically prohibited models of devices, JP1/HIBUN can be used flexibly according to the use environment of customers. Furthermore, copying data to external media*2, printing, and network use*3 can be permitted/prohibited for each department and user.
- ＊1 Smartphones are recognized as various devices that are distinguished by the operating system, manufacturer, and connection method, etc. JP1/HIBUN prevents data copying to smartphones by prohibiting the use of all these devices.
- ＊2 Removable media, external hard drives, CD/DVDs
- ＊3 Network drives and shared folders on networks
When connecting to the Internet from outside of the company, JP1/HIBUN uses Internet breakout to only allow direct access to authorized cloud services. Other communications are forcibly directed through an internal VPN server, which realizes both comfortable cloud service use and safe network use. In addition, JP1/HIBUN restricts connection destinations by limiting the connections to access points that have been authorized by administrators and not allowing access to networks that are not internal networks. Since unauthorized access points are not displayed on PCs, Internet connections using the tethering function of smartphones and mobile routers can be blocked.
If data is copied to a notebook PC and taken out of the company, as soon as the connection with an authorized network is cut off, the PC’s screen locks and the PC is disabled, thereby preventing unauthorized data removal.
In addition to the PC device connection logs and the user data removal logs that record copying to a removable media, operation logs such as the copying and movement of files as well as network connection and communication logs can be acquired. Thus, unauthorized operation and communication with the outside (of the company) can be detected and notifications sent out. Moreover, informing the employees of the log management is also effective for deterring wrongdoing.