[ISM CloudOne] Releases 'Client Operation Log Option Plus (Standalone Version)' Specialized in Log Collection
Quality Software has released a standalone operation log collection add-on for ISM CloudOne to help companies quickly comply with METI's upcoming supply chain security evaluation system.
📋 Article Processing Timeline
- 📰 Published: April 9, 2026 at 18:30
- 🔍 Collected: April 9, 2026 at 10:00
- 🤖 AI Analyzed: April 20, 2026 at 12:33 (266h 33m after Collected)
Quality Software Inc. (Headquarters: Shirahama-cho, Wakayama Prefecture, CEO: Seiji Ura, hereinafter Quality Software), which provides IT asset management and security countermeasure solutions for PCs and smart devices, announces the release of "Client Operation Log Option Plus (Standalone Version)" specialized in operation log collection and visualization for its cloud-based IT asset management "ISM CloudOne".
This service swiftly supports the construction of a log management system, which is highly regarded as a condition for transactions, while utilizing existing environments, in anticipation of the "Security Countermeasure Evaluation System for Supply Chain Strengthening" scheduled to be implemented by the Ministry of Economy, Trade and Industry (METI) at the end of fiscal 2026.
## Background: Visualization of Security Levels Required Across the Entire Supply Chain
Currently, the threat of cyberattacks is spreading across entire supply chains, including mid-tier and small-to-medium enterprises, and companies are strongly required to objectively demonstrate their security measures. Under these circumstances, METI plans to start operating the "Security Countermeasure Evaluation System for Supply Chain Strengthening" from the end of FY2026.
In this system, it is expected that a company's countermeasure status will be visualized with ratings such as "stars (★)", and it is highly likely that these evaluation results will become conditions for continuing transactions or winning new bids. In the evaluation items, acquiring and preserving "operation logs" to investigate causes and identify damage scopes during incidents is an indispensable element to earn a high rating (★) and prove reliability.
On the other hand, there is a definite need in the market to "only add a log collection function pinpointly, although device management (IT asset management) is already implemented with other companies' tools" or "start small with audit trail management first." In response to these corporate needs, Quality Software has launched the "Client Operation Log Option Plus (Standalone Version)", which allows companies to efficiently implement only the necessary functions.
## Main Features of "Client Operation Log Option Plus (Standalone Version)"
Supporting preparation for the "Security Countermeasure Evaluation System for Supply Chain Strengthening"
In this system, "operation log management" to investigate causes and identify damage scopes when an incident occurs is an essential requirement to acquire a high evaluation (★). This option strongly supports the construction of a log collection system in line with the system's guidelines and contributes to proving a high security standard that could become a future transaction condition.
Reliable Audit Trail Management During Incidents
In the unlikely event of suspected virus infection or internal fraud, operation logs serve as an indispensable audit trail that objectively proves "when, who, and what was done." It provides broad support from deterring fraud in the office to confirming safety in remote work environments.
This service swiftly supports the construction of a log management system, which is highly regarded as a condition for transactions, while utilizing existing environments, in anticipation of the "Security Countermeasure Evaluation System for Supply Chain Strengthening" scheduled to be implemented by the Ministry of Economy, Trade and Industry (METI) at the end of fiscal 2026.
## Background: Visualization of Security Levels Required Across the Entire Supply Chain
Currently, the threat of cyberattacks is spreading across entire supply chains, including mid-tier and small-to-medium enterprises, and companies are strongly required to objectively demonstrate their security measures. Under these circumstances, METI plans to start operating the "Security Countermeasure Evaluation System for Supply Chain Strengthening" from the end of FY2026.
In this system, it is expected that a company's countermeasure status will be visualized with ratings such as "stars (★)", and it is highly likely that these evaluation results will become conditions for continuing transactions or winning new bids. In the evaluation items, acquiring and preserving "operation logs" to investigate causes and identify damage scopes during incidents is an indispensable element to earn a high rating (★) and prove reliability.
On the other hand, there is a definite need in the market to "only add a log collection function pinpointly, although device management (IT asset management) is already implemented with other companies' tools" or "start small with audit trail management first." In response to these corporate needs, Quality Software has launched the "Client Operation Log Option Plus (Standalone Version)", which allows companies to efficiently implement only the necessary functions.
## Main Features of "Client Operation Log Option Plus (Standalone Version)"
Supporting preparation for the "Security Countermeasure Evaluation System for Supply Chain Strengthening"
In this system, "operation log management" to investigate causes and identify damage scopes when an incident occurs is an essential requirement to acquire a high evaluation (★). This option strongly supports the construction of a log collection system in line with the system's guidelines and contributes to proving a high security standard that could become a future transaction condition.
Reliable Audit Trail Management During Incidents
In the unlikely event of suspected virus infection or internal fraud, operation logs serve as an indispensable audit trail that objectively proves "when, who, and what was done." It provides broad support from deterring fraud in the office to confirming safety in remote work environments.