Security Solutionsのメーカーや取扱い企業、製品情報、参考価格、ランキングをまとめています。
イプロスは、 製造業 BtoB における情報を集めた国内最大級の技術データベースサイトです。

Security Solutions - メーカー・企業65社の製品一覧とランキング

更新日: 集計期間:Jan 14, 2026~Feb 10, 2026
※当サイトの各ページの閲覧回数を元に算出したランキングです。

Security Solutionsのメーカー・企業ランキング

更新日: 集計期間:Jan 14, 2026~Feb 10, 2026
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. ピーエスアイ 本社 Tokyo//IT/Telecommunications
  2. INTERLINE Tokyo//IT/Telecommunications
  3. ダルトン Tokyo//Industrial Machinery
  4. 4 null/null
  5. 4 旭電通 Tokyo//Trading company/Wholesale

Security Solutionsの製品ランキング

更新日: 集計期間:Jan 14, 2026~Feb 10, 2026
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. Multi-layer tracking security solution 'nPouch' INTERLINE
  2. PRO-WATCH | Integrated Security Solution
  3. Security Switch "TiFRONT (Cloud Management Model)" ピーエスアイ 本社
  4. Security Switch "LG1000" 旭電通
  5. 4 Security solution 'SASTIK(R) III' サスライト

Security Solutionsの製品一覧

1~30 件を表示 / 全 109 件

表示件数

Acid-resistant resin chemical storage cabinet Model No. M3105S-W385LM

Made of high-density polyethylene with excellent chemical resistance. It can be washed thoroughly, allowing for hygienic use.

Made of high-density polyethylene with excellent chemical resistance. It can be washed thoroughly, allowing for clean use. Due to its very sturdy one-piece molding, the top of the cabinet can also be used as a workspace.

  • Food storage equipment and facilities
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security Switch "TiFRONT (Cloud Management Model)"

Simply connect for safety—no complicated setup required to get started! We provide a secure network even in locations without dedicated engineers, such as regional bases and retail stores!

The security switch "TiFRONT" is a cloud-managed model of security switch. This product can be easily connected by simply taking it out of the box, plugging in the power cable, and connecting the Ethernet. It can provide a secure network even in locations such as regional offices and retail stores where there are no dedicated engineers. No management server is required, and it can be used immediately once the decision to implement it is made. Additionally, it features an automatic security report generation function, real-time creation, and the ability to manage schedules (daily, weekly, monthly, hourly), allowing for efficient reporting tasks. 【Features】 ■ Easy and safe to use, no dedicated engineers required ■ Automatic port blocking to prevent loops ■ Cloud management with no need for management or labor ■ L2 switch-based network security ■ Automatically blocks only unauthorized communications *For more details, please refer to the PDF document or feel free to contact us.

  • Embedded Board Computers
  • Routers, Switches, and Hubs
  • Firewall and intrusion prevention
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solution "CheckPoint" for small and medium-sized enterprises.

Easy operation with a sophisticated settings screen! We provide security features developed for enterprises.

"INFINITY" is a security solution for small and medium-sized enterprises that achieves high reliability in security while keeping operational costs low. Since a high level of security can be realized with a single device, a cost-effective total security solution is possible. It provides security features developed for enterprises. [Features] ■ Easy to implement ■ Simple operation with a sophisticated configuration screen ■ Comprehensive security measures ■ Reports that make security "visible" ■ High level of security achieved with a single device *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security and surveillance systems
  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Moxa's OT security solutions

Targeted OT networks. How to protect the "invisible areas" of the manufacturing site.

Cyber attacks are spreading to control systems, targeting "invisible areas" such as SCADA, PLCs, and remote I/O. Moxa's OT security solutions address risks at each level, from management to field layers. Compliant with IEC 62443, they can establish robust multi-layer defenses tailored to the site. ▼ Features - Visualization software for OT networks to monitor abnormal communications and topology - Secure routers and IPS/IDS to balance communication control and attack prevention - IEC-compliant L2/L3 switches to achieve boundary defense between segments - Protection against intrusion paths to endpoint devices through remote I/O and gateways - Designed for optimal performance in OT applications, including long-term supply and harsh environment compatibility IBS Japan offers product proposals and technical support tailored to the manufacturing and infrastructure sectors. We are currently providing a "checklist" to assess your own security measures and a white paper on OT security! Please download and utilize these resources as the first step in reviewing your site's security.

  • 0903_ipors_2.jpg
  • 0903_ipors_3.jpg
  • 0903_ipors_4.jpg
  • 0903_ipors_5.jpg
  • 0903_ipors_6.jpg
  • 0903_ipors_7.jpg
  • 0903_ipors_8.jpg
  • Firewall and intrusion prevention
  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Research Facility Fireproof Chemical Storage Cabinet

Protects the life of the operator. Achieved in a space-saving design. Fireproof storage cabinet to prevent the spread of fire.

This is a fireproof chemical storage cabinet that can minimize the impact on buildings and prevent secondary disasters by preventing chain reactions and explosions during a fire. It can be installed close to the work area to save space, eliminating the need to walk a long distance to the storage cabinet. For more details, please contact us or download the catalog.

  • Office furniture
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

A handbook for protecting IoT gateways from cyber attacks.

IoT gateways that are susceptible to threats such as hacking. Introducing Advantech's integrated hardware/software security products.

The gateway is a crucial point for collecting data in all connection applications, making the security of gateways extremely important in the IoT ecosystem. Advantech provides security solutions and services that integrate hardware and software for IoT gateways to address the increasing global cyberattacks and to understand the vulnerabilities in information security for industrial applications. ◆ Data & System Security ◆ Identity & Access Control ◆ Remote Updates & Secure Boot ◆ Threat Detection & Recovery

  • スライド2.JPG
  • スライド9.JPG
  • スライド12.JPG
  • スライド13.JPG
  • Industrial PCs
  • Embedded Board Computers
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

IEC 61162-460 Cybersecurity Switch for Ships

IEC 60945, IEC 61162-460 Edition 3 compliant cybersecurity switch for ships

The 1Gbps x 24-port managed LAN switch is the world's first Layer 3 network switch compliant with the IEC61162-460 standard. The configuration includes IPv4/IPv6 multicast and prioritization of specific ports using VLAN and QoS.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Data] Telework Security Enhancement Checklist

With the shift to remote work, we would like to review! Introducing key points of employee training with explanations.

This document introduces six security challenges and countermeasures to consider when implementing remote work. It includes a checklist of security measures that security personnel should be aware of, along with explanations for each item. Additionally, it covers key points for employee security training and security measures utilizing OS protection. This book serves as a useful reference when considering the introduction of remote work, so please make use of it. [Contents (Excerpt)] ■ Chapter 1: Six Telework Security Measures to Prevent Information Leakage (Checklist) ■ Chapter 2: Improving Employee Security Literacy: Key Points for "Training" ■ Chapter 3: Preparing for the Unexpected: Border Control Measures Using OS Protection *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Company Information [JSecurity Co., Ltd.]

Providing peace of mind to all businesses with security solutions recognized by the world!

JSecurity Co., Ltd. provides solutions that contribute to Japan's IT security under the slogan "All for Japan Security." We offer a lineup of email security products, including measures against spam, virus emails, email sanitization, and prevention of email misdelivery, as well as information security products for small and medium-sized enterprises that are affordable and easy to implement and operate. Our main business focuses on the development and sales of information security products that cover a wide range from networks to endpoints. [Business Description] ■ Development and sales of information security products and services *For more details, please refer to the PDF document or feel free to contact us.*

  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Introduction to Network and Cybersecurity Learning Kit for the DX Era

This is a "Network & Security" educational learning kit. It includes workshop texts and offers thorough and attentive instruction both online and in-person (with actual transportation costs for remote locations).

You can learn the fundamentals of communication technologies such as the internet, which is the foundation of cloud/SNS and the core of DX promotion, as well as 5G mobile phones and next-generation Wi-Fi. We offer a course that teaches the basics of security through specific examples, including exercises and experiences, providing hints for your company's response. Furthermore, we will introduce the latest security technologies, such as endpoint security (EDR) and human security, to prevent information leaks from increasing ransomware incidents. - Ideal for new employee training in industrial high schools, universities, and companies! - We provide a course that teaches the basics of security through specific examples, including exercises and experiences, offering hints for your company's response. - We will also introduce security technologies such as endpoint security (EDR) to prevent information leaks. - Texts tailored to the instructor can also be edited (optional). - On-site training is available; please consult us. 【Course Overview】 ■ Overview of Information Security ■ Mechanisms of Network Communication ■ Experience Unauthorized Access ■ Network Security Measures ■ Overview of Security Technologies (such as Endpoint Security) *For more details, please feel free to contact us.

  • Business Skills Seminar
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solutions for factories

We have prepared a plan to automate the lending and storage of keys within the factory, enabling improved operational efficiency and history management.

We provide "Security Solutions for Factories." Our plans include security gates that regulate entry and exit for unauthorized individuals, allowing for management of entry and exit history and attendance tracking. We offer a lineup of security-focused products, such as "Security Gates" for managing the entry and exit of individuals, "Perimeter Security Monitoring Systems," and "Key Management Devices." Please feel free to contact us when you need assistance. 【Implementation Plans】 ■ Security gates regulate entry and exit for unauthorized individuals, enabling management of entry and exit history and attendance tracking. ■ With security monitoring systems and camera surveillance systems, detection and monitoring of suspicious individuals is possible, enhancing the efficiency of security operations. ■ By automating the lending and storage of keys within the factory, we enable improved operational efficiency and history management. *For more details, please refer to the PDF document or feel free to contact us.

  • Entrance and exit control system
  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solution

From design to post-implementation operation! We provide a comprehensive physical security system.

We would like to introduce the security solutions we offer. Focusing on systems that have succeeded in the large markets of Europe and the United States, where the history of physical security is long, we carry out integration development to meet domestic needs. We provide camera solutions, access control/integrated management systems, anti-shoplifting tags, IoT solutions, and maintenance support. Please feel free to contact us when you need assistance. 【Security Solutions (Partial)】 <Camera Solutions> ■HIKVISION ■GFDesign ■EZVIZ ■i-PRO *For more details, please refer to the related links or feel free to contact us.

  • Surveillance Camera System
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security Solutions Catalog 2020 Winter

Featuring cloud-based automated vulnerability assessment services and annual monitoring web application assessment services!

This catalog introduces the security solutions offered by our company. It features a rich lineup, including the cloud-based automatic vulnerability assessment service "SCT SECURE Cloud Scan" and "netsparker," which diagnoses web applications from cloud environments. Please use this for selecting products. [Contents (partial)] ■ SCT SECURE Cloud Scan ■ SCT SECURE Manual Web Application Assessment ■ netsparker ■ Gred Security Services ■ McAfee SECURE *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Server monitoring and network management tools
  • Other services
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Net Agent Co., Ltd. Introduction to Automotive Security Inspection Services

Automotive security inspection service to counter malicious hackers!

This service is an automotive security inspection service that supports the improvement of security levels as a product. Our proud white-hat hacker team conducts penetration tests from an attacker's perspective on vehicles to identify potential risks. If you have any questions about automotive security, please consult us. 【Features】 ■ Supports the improvement of security levels as a product ■ Conducts penetration tests from an attacker's perspective on vehicles ■ Investigates existing potential security weaknesses *For more details, please refer to the catalog or feel free to contact us.

  • Other security and surveillance systems
  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Technical Data: Automotive Security Inspection Service

We provide inspection services for communication and collaboration systems of automotive units with abundant experience and achievements!

The "Automotive Security Inspection Service" is an inspection service focused on third-party evaluations of security for in-vehicle units. To achieve safe connected cars and autonomous driving, it is essential that each in-vehicle unit is free from security issues. This document clearly explains various case studies, evaluation procedures, and schedules in different scenarios. [Contents (excerpt)] ■ Background of our capabilities ■ Case studies 1-4 ■ Evaluation procedures ■ Investigation to identify threats (examples), main investigation items ■ Schedule *For more details, please refer to the PDF document or feel free to contact us.

  • Contract Inspection
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Automotive Security Inspection / IoT Device Penetration Testing

Third-party evaluation of the security of in-vehicle units and IoT devices. Proposals for improvements. Presentation of materials with case studies.

Our company offers a service where in-house white hat hackers evaluate the security of in-vehicle units and IoT devices from the perspective of an attacker. We assess the security of systems, including low layers (such as circuit boards and firmware), external communications, cloud services, and smartphone applications. We also provide potential threat and attack scenarios, as well as discovered vulnerabilities and their improvement proposals. After submitting the report, we will hold a briefing session. 【Applicable Examples (Partial)】 ◎ Bluetooth communication units and associated systems (in-vehicle units, Bluetooth communication, smartphone applications, CAN) ◎ Devices with Wi-Fi communication capabilities and associated systems (IoT devices, Wi-Fi communication, smartphone applications) ★ We are currently offering two documents summarizing the service description, our features, and applicable examples. You can view them via "PDF Download." Please feel free to contact us with any inquiries.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security Switch "LG1000"

Prevent the spread of malware infections and provide a safe and secure internal network environment!

The "LG1000" detects and blocks unauthorized communication within the internal network, and in conjunction with the Saksa UTM "SS series," it also detects unauthorized access from external sources and blocks the devices. When you log into the LG Portal, a dashboard is displayed as the start screen, providing comprehensive real-time analysis information. Since the logs of this product are collected in the cloud, you can gain "peace of mind during implementation" and "speed during troubleshooting." Additionally, it notifies administrators of detected information in real-time and displays warnings on the browser screens of dangerous devices. 【Features】 ■ Blocking unauthorized communication ■ LG Portal (remote maintenance, security report generation) ■ Alert function ■ Blocking virus-infected PCs (integration with Saksa UTM) ■ Scheduling function *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security
  • filtering
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Factory Security Solutions

Cyber attacks targeting production equipment! Solutions to mitigate the risk of production line shutdowns!

At Metro Corporation, we offer a "Factory Security Solution" to mitigate the risk of production line shutdowns caused by cyber attacks targeting production equipment. We monitor communication content to block attacks, protecting the internal environment without affecting existing systems. By encrypting HDDs and USB drives, we reduce the risk of data leakage in the event of media loss. Furthermore, our antivirus software, which does not require an internet connection or signature updates, helps to lower risks. We also offer a free trial for some of our services. Please feel free to consult with us about security. 【Features】 ■ Prevents risks from zero-day attacks coming from the internet ■ Prevents leakage risks from information being taken out ■ Prevents virus infections due to inability to apply patches thoroughly *For more details, please refer to the PDF document or feel free to contact us.

  • Production Management System
  • Other operation management software
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Support services for internal PSIRT (Product Security Incident Response Team)

Strongly support the establishment and enhancement of PSIRT from planning and operation to improvement and incident response!

Our company offers one-stop support for PSIRT, including not only the planning of construction but also assistance in the preparation of PSIRT-related documents, security threat and incident analysis, support for obtaining Achilles certification, assessments, training, incident response support, and operational evaluations. Please feel free to contact us if you have any requests. *PSIRT refers to an organization that manages risks related to security vulnerabilities in products manufactured or sold by the company and responds to emergencies during security incidents. While CSIRTs have also become widespread, the difference from CSIRTs is that PSIRTs are security response organizations specifically for IoT products and IoT services provided to customers. [Examples of Services Offered] ■Support for PSIRT construction planning ■Assistance in the preparation of PSIRT-related documents, etc. *For more details, please download the PDF or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[File Transfer Service Case] Sumitomo Life Insurance Company

Achieve minimization of information risk due to misdelivery by utilizing a closed transmission function for the transfer of personal information of insurance subscribers (Crypto Delivery).

We would like to introduce a case study of the implementation of "Crypto Delivery" at Sumitomo Life Insurance Mutual Company. Until now, the company has been exchanging various business information with customer companies using FD and MO, but the process of exchanging information through electronic media has been cumbersome and improvements have been desired from the perspective of information security. Therefore, the company introduced our product starting in January 2015. In addition to reducing the costs and efforts associated with data exchange, they have implemented a system for data transfer that is more efficient and protected by robust security, utilizing features such as the "Closed Group" function, which allows file exchanges only among designated users. 【Key Points】 ■ Utilization of the "Closed Transmission Function" for the exchange of personal information ■ Minimization of the risk of information leakage due to misdelivery ■ Confirmation of advantages in both security and cost aspects *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall and intrusion prevention
  • Encryption and authentication
  • Virus software
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[High Privilege ID Management Case Study] Tokyu Card Co., Ltd.

An example of improved internal security awareness through the establishment of a workflow for task approval.

We would like to introduce the case of Tokyu Card Co., Ltd., which implemented the high-privilege (privileged ID) management solution "SecureCube Access Check." In 2015, the company began efforts to establish a more secure card usage environment in compliance with the security standards for credit card information protection, PCI DSS. They introduced our product as their ID management tool, further strengthening their security management system and enhancing security awareness. 【Case Overview】 ■ Client: Tokyu Card Co., Ltd. ■ Product Implemented: SecureCube Access Check ■ Implementation Effects - Achieved strong access control required by PCI DSS - Significantly improved security awareness across the organization *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Other information systems
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Advanced Security Solutions

We offer a range of products with clear performance advantages that reflect our accumulation as a defense and military company.

At Woods Corporation, we handle "Advanced Security Solutions" from ST Engineering, a leading defense and military company in Singapore. These products are all repurposed from established technologies in the military field for civilian use and have a wealth of operational track records. We offer a range of products that reflect the accumulated expertise of a defense and military company, equipped with clear performance advantages. 【Product Lineup】 ■ Suspicious Vessel Monitoring and Collision Hazard Warning System AgilTrackMAPS ■ GNSS Jamming Defense Device AgilLoc GNSS (GPS) ■ Fence Intrusion Alarm Monitoring System AgilFence *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security and surveillance systems
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Resin Acid-Resistant Cabinet / Chemical Storage Cabinet 'TPLA-H385/320'

High-density polyethylene resin acid-resistant cabinet and chemical storage cabinet with excellent chemical resistance.

The "TPLA-H385/H320 series" is a resin acid-resistant cabinet and chemical storage unit made from "impact-resistant polyethylene," which is difficult to crack even when struck with a hammer. It is extremely sturdy and molded as a single piece, allowing the top of the cabinet to be used as a workspace. Additionally, we also offer the resin acid-resistant cabinet and chemical storage unit "TS-W385 series" for hospitals. 【Features】 ■ Extremely sturdy one-piece molding ■ No assembly required ■ Washable due to plastic material ■ Excellent moisture-proof, corrosion-resistant, and rust-proof properties ■ Ventilation holes on the sides *For more details, please refer to the PDF materials or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security | Solutions Department

We propose a review of measures against information leaks and unauthorized access.

We propose the latest security measures, such as the implementation of security software and firewalls, strengthening passwords, applying security patches, and introducing VPNs and endpoint security solutions for remote work.

  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Data De-identification Solution "ZENMU"

Security measures that do not protect by converting and splitting data into meaningless data.

"ZENMU" is an open security infrastructure that "de-meaningizes" data, differing conceptually from conventional encryption technologies. By converting and splitting data into meaningless data, it makes it unreadable with just one fragment, and it can only be restored when all distributed fragments are gathered. [Features] ■ Achieves robust security by storing fragments in multiple locations ■ Establishes information safety without user awareness ■ Frees from new security costs *For more details, please download the PDF or contact us.

  • 企業:ZenmuTech
  • 価格:Less than 10,000 yen
  • Software (middle, driver, security, etc.)
  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solution

Are you taking measures against the rapidly increasing supply chain attacks? Internal measures are necessary to prevent the expansion of damage.

The threat of "supply chain attacks," which exploit small and medium-sized enterprises and subcontractors to target large corporate clients, is increasing. As cyberattacks continue to become more sophisticated and advanced, it is essential to implement "entry measures" to prevent intrusions, "external measures" to block communications with external attackers, and "internal measures" to prevent the expansion of damage. Security automation significantly reduces the burden on IT administrators. 【Features】 ■ Automates initial responses from threat detection to containment, preventing the spread of damage - By linking "detection" and "initial response" through security products, endpoint security measures can be implemented more reliably. ■ Flexible access control - Various actions are prepared according to the severity of security incidents and the customer's operational policies. *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security and surveillance systems
  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Network Blackbox

Detect and respond to various cybersecurity risks!

"Network Blackbox" is a product that adopts the MITRE ATT&CK framework to maximize the efficiency of operations for Japanese operators. With an advanced network solution using full packet capturing, it saves all packets and analyzes them with 100% coverage. The progression of attacks and TTPs (Tactics, Techniques, and Procedures) are visualized, making it easy to see where to respond at a glance. We are the domestic distributor for this product. 【Features】 ■ NDR Core Technology ■ Adoption of the MITRE ATT&CK Matrix ■ Utilization of AI for detection and analysis based on full packets *For more details, please download the PDF or feel free to contact us.

  • Other security and surveillance systems
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Paloato × SKYSEA Collaboration Solution

Detects multiware intrusions and suspicious communications to external sources! Quickly isolates infected devices from the network.

Introducing the "Paloato × SKYSEA Collaborative Solution." This solution detects unknown malware and known threats commonly associated with targeted attacks through Palo Alto Networks' firewall cloud threat analysis, "WildFire," in conjunction with "SKYSEA Client View" for client operation management. It enables rapid isolation of infected devices from the network. 【Features】 ■ Detects malware intrusions and suspicious communications to external sources ■ Allows control of client PCs ■ Visualizes and comprehends threat attacks ■ Detects movements of known and unknown malware *For more details, please refer to the PDF document or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solution 'SASTIK(R) III'

Reduced the implementation hurdle for thin clients to 1/10, achieving deployment for all employees!

The 『SASTIK(R) III』 Thin-Client Layer allows companies wishing to implement it to inherit their existing PC and software assets while achieving the high security of thin clients through cost reduction via PC virtualization. The high security features of thin clients remain intact, reducing costs, implementation barriers, and difficulty to one-tenth. 【Features】 ■ Cost Revolution: Reduces total costs by one digit ■ Implementation Revolution: No need to replace infrastructure, OS, or software ■ Convenience Revolution: Instant thin client by simply plugging it in *For more details, please download the PDF or feel free to contact us.

  • Encryption and authentication
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録