About
At OMRON Software, we continue to hone our technology and take on never-ending challenges to help create a better society.
Challenge01
Challenges in the cloud domain
OMRON Software has been supporting embedded device and system development in the OMRON Group with our reliable software technology, including sensors and controllers that are the building blocks of future of manufacturing sites, system devices such as ticket vending machines and ticket gates that realize safe and comfortable stations, and healthcare systems that contribute to people’s healthy lives.
To achieve this improved society that we are aiming for, it is necessary not only to make devices and systems more attractive, but also to create new value by connecting them. Technologies such as cloud computing and security are becoming indispensable tools to achieve this.
For example, Toritoss, a multiplex service robot that helps customers improve work efficiency and reduce labor shortages, ALLwatch®+, a monitoring service that helps municipalities reduce costs and save labor, and a system that supports customers’ health management.
OMRON Software’s cloud development technology is used in a variety of services.
Lift and Shift, Replatform
Use of serverless, containers, microservice architecture, etc.
Agile, DevSecOps, CI/CD
Secure architecture design, static analysis tools, vulnerability diagnosis, PSIRT system
To ensure safe and secure use of our various IT services, we have established a 24-hour/365-day operation and monitoring system to protect important data.
To achieve this, we maintain and improve our service quality every day by acquiring various certifications.
People are the most important factor in software development and system operation.
In order to develop digital human capital that can contribute to society, OMRON Software is taking a variety of measures, including expanding training programs, encouraging employees to take certification exams, and providing technical guidance through on-the-job training (OJT). In addition, we have established the Cloud Center of Excellence (CCoE) to transform cloud technology and the experience of individual employees into organizational strength to enhance technology.
ZOOM
Challenge02
Challenges in the security domain
Technologies such as the Internet, cloud, AI, and IoT have made our lives more convenient and affluent. However, the threat of cyber-attacks is increasing every day in a society where goods, systems, and people are interconnected.
Security technology has become necessary to protect the safety and security of society and to help make that society better.
Protecting critical office data from cyber-attacks, keeping factories from shutting down, and ensuring that products and services can continue to be used with peace of mind.
To achieve these goals, we are refining our security technologies to counter cyber-attacks.
ZOOM
White-hat hackers are engineers who prevent attacks from malicious third parties by taking security measures with an attacker’s point of view (knowledge of the attacker’s objectives, procedures, and methods and tools used).
In order to cope with cyber-attacks that continue to become more sophisticated, advanced security personnel need to understand both defensive and offensive perspectives.
We are promoting the acquisition of Certified Ethical Hacker (CEH), an international certification provided by EC-Council in the United States.
Security technologies are evolving every day, and hackers’ attack methods are becoming more sophisticated.
In order to keep up with these changes, we have created the CSIRT (Computer Security Incident Response Team) and PSIRT (Product Security Incident Response Team), and are working as a team to respond to threats and strengthen our technological capabilities.
In addition, we are working to collect the latest information through collaboration with security specialist companies and participation in industry organizations, and utilize it in our internal activities.