Special Features: Meeting Our CSR Commitments Providing Customers with Sophisticated and Secure Information Security
Providing Information Security Responding to Advanced IT
Today the use of information technology (IT) is indispensable for any company. On the other hand, advanced IT and the increasing popularization of the Internet have created a series of new threats such as computer viruses and cyberterrorism. The OKI Group, as a leader in the information society, has been long committed to information security, and offered its customers various security products and services.
The advent and popularization of smartphones, cloud computing and social media are greatly changing business activities. However, many companies are leery of adopting them for fear of complex processes for proper management and security risks such as information leakage.
Understanding these circumstances, OKI launched EXaaS Mobile Desk, a cloud computing services for smartphones in January 2012. This service allows employees to view in-house corporate data on a cloud server using smartphones from locations outside the company in an easy and prompt way. It also enables the easy development and introduction of applications that allow us to use smartphones as terminals without changing our existing business systems. In order to avoid security risks, data to be viewed is not actually located on smartphones. The service also features a "VPN(*1) connection function" for secure authenticated/encrypted communications and a "terminal control function" to ensure the prevention of unauthorized use and the protection of lost terminals.
-
*1:VPN
A virtual network built on a public line network such as the Internet.
ExaaS Mobile Desk Service

The OKI Group's Efforts for Information Security
In addition to providing customers with information security services, the OKI Group has made various efforts to enhance its own information security.
We have implemented our security measures from three perspectives shown in the following diagram since the enactment of the OKI Group Security Policy in fiscal 2002. Furthermore, each business unit of the group has designed its measures to promote information security under the supervision of the Information Security Committee established in fiscal 2007. The secretariat of the committee conducts on-site monitoring to check how such measures are being implemented. We have also obtained the ISMS(*2) certification.
The measures implemented in fiscal 2011, in order to respond to increasingly sophisticated recent cyber attacks, included the blocking of paths for information leaked from virus-infected PCs or servers, in addition to the existing security patches and antivirus software. We also introduced a tool to prevent wrong transmissions. This was due to a survey by an outside organization showing that 20% of information leakage is caused by erroneous operations of e-mail and other applications.
We constantly provide education programs reflecting the latest trends of information security. We also conduct an information security general checkup of all employees including temporary staff every October. In fiscal 2011, we reexamined the items to be checked, emphasized the importance of protecting information from customers and trade secrets, and thus promoted security awareness. We will continue to improve our information security system as a leader of information society.
-
*2:ISMS
Information Security Management System
Information Security System Based on Three Perspectives

