Sign In  |  Register  |  About Mill Valley  |  Contact Us

Mill Valley, CA
September 01, 2020 1:29pm
7-Day Forecast | Traffic
  • Search Hotels in Mill Valley

  • CHECK-IN:
  • CHECK-OUT:
  • ROOMS:

Blockchain technology application, Jasmy Secure PC efficient and convenient remote work solution

Remote work is a huge emerging market. Many companies around the world are designing hybrid remote work models. According to a model analysis by the McKinsey Global Institute, about 20%-25% of workers in developed economies can work from home for 3-5 days per week, such a huge market is vacant, because many remote office application scenarios such as online meetings, instant messaging, document collaboration, remote operation and maintenance are generally completed on social platforms, The reasons resulting in this situation are multi-dimensional. Among them, the information and data security awareness of many small and medium-sized enterprises, the capital restrictions of enterprises, and the worrying efficiency and security of traditional Internet office platforms are the reasons why enterprises have not formulated professional remote office plans.

The “Jasmy Secure PC” released by Jasmy combines the advantages of independent systems and cloud services, and chooses solutions of blockchain technology and distributed storage technology with lower cost and higher security factor, which can effectively reduce the use of small and medium-sized enterprises as well as the threshold for a professional remote office system, Jasmy Secure PC can record the operation log of the PC and manage and protect it through the blockchain “dash cam function” and data area, unless certain conditions (date and time, with pre-registered network connections, etc.) are cleared otherwise inaccessible, a secure remote office environment is achieved through “ghost drives”. Just install the driver on the PC to use it, and the usage method is very convenient.

In the above-mentioned remote work security guide scoring scale, the combination of independent system and cloud service advantages “Jasmy Secure PC” has a high security factor level. The advantages of independent systems, such as “degree of influence when communication is centralized”, “system usage cost” and “system usage workload” were rated as S. The advantages of cloud services, such as “repeatability of office operations”, “convenience of security controls” can be rated as B.

The two main barriers affecting the introduction of telecommuting systems by SMEs are the cost and human resources. Purchasing a professional remote office PC and maintaining the network environment requires huge financial support and professional technicians. Even after the introduction of the system, “how to manage the computers used by employees at home” is still a big problem. Of course, there are relatively low-cost cloud service products, but the price-performance ratio is also relatively low, and it is difficult to meet the needs except for special services. However, when using Jasmy Secure PC, the user only needs to install the driver on the existing PC. The Agent application version is 440 yen per month (tax included), and the Manager application version using the SaaS type management service is 2640 yen per account (tax included), so the budget burden will be small. With Jasmy Secure PC, customers can check the application status of PC operating system update by themselves on the Agent screen. By using the Manager, you can centrally understand the operating status of the employees to be managed and the PCs used.

When the traditional remote office independent system is introduced, employees will need a new PC to use at home and also need to be equipped with a safe, efficient and stable network environment. At this time, terminal cost and network environment are a big problem. Jasmy Secure PC uses a “ghost drive” mechanism to create a secure remote work environment for employees’ personal PCs and home-shared PCs, which is one of its strengths. A dedicated “ghost drive” storage area is created when the Agent is installed, which can be set to allow access only under certain network conditions or at specified times. Conditions can be set using the Jasmy Secure PC’s unique “Commands” feature, which can be sent over the network from a manager’s admin screen, or offline by sending a QR code to an employee’s smartphone or other device, then the PC can be read. Jasmy Secure PC utilizes resources on the PC side, so the Internet line does not become a bottleneck and users can maximize the performance of their PC. In companies with VPN lines for telecommuting, pressure on the VPN band is an issue, but telecommuting with Jasmy Secure PC is supported by “connecting only when files are stored on internal file servers”.

Understanding the working state and various intensities of employees when working remotely can be a challenge. With Jasmy Secure PC, managers can check the working status of each user in detail. By using the log information recorded by a function called “Driving Recorder”, which can objectively feedback employees’ working hours, work efficiency, etc., managers can intuitively see areas that are hidden by remote work, such as how much work subordinates do, whether they have proper rest periods, and whether overtime hours are within acceptable limits, which will help to check and track the work status of employees. From an employee’s perspective, the fact that all operational status is logged may be off-putting because they may feel like they are being watched all the time or someone is viewing the logs without their permission. Regarding this issue, the manager needs the authorization of the employee and needs to view the log with the employee’s knowledge. Of course, the manager’s personal computer also keeps a history of operations in the same way, and these logs are recorded on the blockchain, preventing tampering and other fraudulent acts. These functions can provide a mutual sense of security.

The introduction of a remote working model also requires consideration of information leakage when a personal computer is lost or stolen. While there are various countermeasures, it is a confusing question to what extent these policies should be implemented. How to take measures with as little cost and management effort as possible is another challenge. Jasmy proposes such a solution by using a system in which data is encrypted and “invisible” unless it is connected to a registered private network. Jasmy Secure PC’s Ghost drive encrypts data and the ghost drive itself becomes invisible unless it is connected to a network whose network name (SSID) has been registered in advance. Network names that are allowed to use ghost drives can be registered by agents and administrators. If both are registered, priority is given to the setting made by the administrator, so that fraud is less likely to occur. If the PC is lost or stolen, thanks to these measures, the data in the ghost drive cannot be accessed, reducing the risk of information leakage. Agents can also be locked remotely from the manager as long as they are connected to the internet. Jasmy Secure PC provides all the necessary functions without the need to install specialized information leakage prevention tools.

It can be said that Jasmy Secure PC is a “umbrella” that came into being in response to the above-mentioned remote online office problems. At present, this product is a set of distributed network and storage systems launched by Jasmy for the business field to assist data management. A solution that utilizes edge computing characterized by decentralized processing to manage IoT connections, personal devices equipped with JASMY Secure PC, or business computers, It can bring “iron wall”-like protection to financial services such as individuals, enterprises, and even banks.

About Jasmy:

Jasmy is a Japanese company that develops and provides data security and sharing services in the Internet of Things era. JasmyCoin is the first local cryptocurrency approved to be listed on a Japanese digital currency exchange, and the first legal and compliant digital currency in Japan. At present, more than 50 trading platforms such as Coinbase, BITPoint, Binance, Huobi etc., have been launched. And it have reached cooperation agreements with more than 20 companies such as Nexstgo, Aplix, Japanius, Witz, MetaVisa, etc. Its self-developed JasmyPersonalDataLocker system has been put into commercial use. Jasmy’s move has promoted the commercialization of Japan’s blockchain technology, which is of epoch-making significance for the prosperity and development of Japan’s cryptocurrency market, and is known as the “Bitcoin” of the new era of Japan’s encryption industry.

To gain more information——

Official website: http://www.Jasmy.co.jp

Twitter: https://twitter.com/Jasmy_league

Telegram: https://t.me/OfficialJasmyUniverse

Facebook: https://www.facebook.com/Jasmyleague/

Medium: https://medium.com/Jasmy-league

GitHub: https://github.com/JasmyCoin/JasmyCoin

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms and Conditions.
 
 
Copyright © 2010-2020 MillValley.com & California Media Partners, LLC. All rights reserved.