About

At OMRON Software, we continue to hone our technology and take on never-ending challenges to help create a better society.

Challenge01

Cloud Computing

Challenges in the cloud domain

Cloud computing has become
a social infrastructure, and
its potential continues to expand.

OMRON Software has been supporting embedded device and system development in the OMRON Group with our reliable software technology, including sensors and controllers that are the building blocks of future of manufacturing sites, system devices such as ticket vending machines and ticket gates that realize safe and comfortable stations, and healthcare systems that contribute to people’s healthy lives.
To achieve this improved society that we are aiming for, it is necessary not only to make devices and systems more attractive, but also to create new value by connecting them. Technologies such as cloud computing and security are becoming indispensable tools to achieve this.

OMRON Software’s cloud technology is deeply involved in our daily lives.

For example, Toritoss, a multiplex service robot that helps customers improve work efficiency and reduce labor shortages, ALLwatch®+, a monitoring service that helps municipalities reduce costs and save labor, and a system that supports customers’ health management.
OMRON Software’s cloud development technology is used in a variety of services.

List of services that can be provided

  • Amazon Web Services
  • Microsoft Azure
  • Google Cloud Platform
  • IBM Cloud
  • Alibaba Cloud
Cloud migration of existing systems

Lift and Shift, Replatform

Cloud native

Use of serverless, containers, microservice architecture, etc.

Development method/technology

Agile, DevSecOps, CI/CD

Security measures

Secure architecture design, static analysis tools, vulnerability diagnosis, PSIRT system

Secure cloud services can only
be provided if they are supported
by a safe environment.

To ensure safe and secure use of our various IT services, we have established a 24-hour/365-day operation and monitoring system to protect important data.
To achieve this, we maintain and improve our service quality every day by acquiring various certifications.

Establishing a system to
ensure security

  • Acquired the P Mark, which certifies the establishment of a system to protect personal information
  • Acquired ISO27001, an international standard for information security management systems
  • Acquired ISO27017, an international standard for cloud security
  • Acquired PCI-DSS, a global security standard for the credit card industry

Human capital and systems that connect digital technology to customer value

People are the most important factor in software development and system operation.
In order to develop digital human capital that can contribute to society, OMRON Software is taking a variety of measures, including expanding training programs, encouraging employees to take certification exams, and providing technical guidance through on-the-job training (OJT). In addition, we have established the Cloud Center of Excellence (CCoE) to transform cloud technology and the experience of individual employees into organizational strength to enhance technology.

ZOOM

Building a digital human capital growth cycle to create a better society

Challenge02

Cyber Security

Challenges in the security domain

Security technology is indispensable to building a safe and secure society

Technologies such as the Internet, cloud, AI, and IoT have made our lives more convenient and affluent. However, the threat of cyber-attacks is increasing every day in a society where goods, systems, and people are interconnected.
Security technology has become necessary to protect the safety and security of society and to help make that society better.

OMRON Software’s security technologies protect factories and offices, products and services.

Protecting critical office data from cyber-attacks, keeping factories from shutting down, and ensuring that products and services can continue to be used with peace of mind.
To achieve these goals, we are refining our security technologies to counter cyber-attacks.

  • Threat analysis (Security risk analysis)
  • Secure design, secure coding, fortification
  • Vulnerability assessment techniques, fuzzing, penetration testing
  • Secure operations (log analysis tools, incident response)
  • Security process design and auditing
  • Security training and exercises

ZOOM

Training white-hat hackers as the core of security measures

White-hat hackers are engineers who prevent attacks from malicious third parties by taking security measures with an attacker’s point of view (knowledge of the attacker’s objectives, procedures, and methods and tools used).
In order to cope with cyber-attacks that continue to become more sophisticated, advanced security personnel need to understand both defensive and offensive perspectives.
We are promoting the acquisition of Certified Ethical Hacker (CEH), an international certification provided by EC-Council in the United States.

Promotion system that transforms individual skills into comprehensive capabilities

Security technologies are evolving every day, and hackers’ attack methods are becoming more sophisticated.
In order to keep up with these changes, we have created the CSIRT (Computer Security Incident Response Team) and PSIRT (Product Security Incident Response Team), and are working as a team to respond to threats and strengthen our technological capabilities.
In addition, we are working to collect the latest information through collaboration with security specialist companies and participation in industry organizations, and utilize it in our internal activities.