1~12 item / All 12 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~12 item / All 12 items
"Rocket.Chat" is an on-premises (closed network) chat and video conferencing tool. It has high security and enhances features that can be immediately utilized, such as video conferencing, task management, global search, file management, and calendar integration. Additionally, it automatically translates real-time messages between users and can be used anywhere via web, desktop, mobile apps, live chat clients, and SDKs. [Features] ■ High security ■ Flexible customization ■ Live chat ■ Real-time translation ■ Accessible from various devices *For more details, please refer to the related links or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce our "VBOS Countermeasure Solution," which visualizes signs of firmware vulnerabilities and tampering. It is possible to detect whether there has been any tampering or changes to the firmware (Integrity). Additionally, if there are vulnerabilities that need to be addressed, you can check the details of the vulnerabilities and apply patches. 【Features】 <Visualization> ■ Visualizes vulnerabilities (Risk) present in the firmware ■ Allows centralized management on a single dashboard ■ Visualizes vulnerabilities present in the firmware ■ Can present an overview of vulnerabilities, attack cases, and remediation methods *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe offer the "SCT SECURE OSINT Service." Utilizing OSINT (Open Source Intelligence) techniques such as Google Hacking, shodan searches, deep web and dark web investigations, and research on anonymous bulletin boards and social media. We provide risk information relevant to our clients in easy-to-understand reports, even for those with no prior experience. 【Detection Items】 ■ Investigation of phishing and smishing sites ■ Investigation of anonymous bulletin boards and social media ■ Information leakage investigation using Google Hacking ■ Information leakage investigation using shodan ■ Deep web and dark web investigation *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis document introduces the "OSINT/SCT SECURE OSINT Service." It includes an overview of our company, as well as sections on [What is OSINT?], [What is the SCT SECURE OSINT Service?], and [Campaign Information]. Additionally, it also describes [Features of the SCT SECURE OSINT Service], so please take a moment to read it. 【Contents】 ■ What is OSINT? ■ What can be done with OSINT? ■ What is the SCT SECURE OSINT Service? ■ Campaign Information *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe offer the "SCT SECURE OSINT Service." Using OSINT (Open Source Intelligence) methods, we provide risk information related to our clients, including "investigations into credential leaks using email addresses as keys," "notifications of phishing site information," and "the status of unintended disclosure of confidential documents." We will provide individual estimates based on the combinations of the investigation targets. Please feel free to contact us when you need our services. 【Contents】 ■ Investigation into credential leaks using email addresses as keys ■ Notifications of phishing site information ■ Status of unintended disclosure of confidential documents ■ Investigation into brand card information leaks on the dark web, etc. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"SCT SECURE Cloud Scan" is a cloud-based security service that regularly diagnoses whether there are vulnerabilities that could serve as footholds for cyber attacks, based on new security information. With this product, sites diagnosed as having no vulnerabilities and secure websites are issued a safety certification mark. Additionally, we offer a manual diagnostic service called "SCT SECURE Manual Web Application Diagnosis" to complement the cloud-based automated vulnerability diagnosis. 【Features of SCT SECURE Cloud Scan】 ■ Promote security strength with a date-stamped safety certification mark ■ Diagnosis based on always up-to-date vulnerability information ■ Diagnostic tool with PCI DSS ASV qualification ■ User-friendly management console and support for various report outputs *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"SECUDRIVE File Server" is a security software that protects Windows file servers with powerful DLP (Data Loss Prevention) features and can isolate confidential data within the file server from ransomware. It only requires installing the software on the file server or client PCs currently in use, so there is no need for new capital investment. You can utilize standard Windows features such as user permissions, folder sharing, file management, and Active Directory as they are. 【Features】 ■ Data leakage prevention ■ Ransomware blocking ■ Integration with standard Windows features ■ File operation log management ■ Support for cloud server environments (EC2, Azure) ■ Easy to implement and operate without additional servers *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"SCT SECURE SWAT" is a monitoring-type annual diagnostic service for web applications that thoroughly diagnoses using the characteristics of both automated and manual diagnostics. It balances the comprehensiveness of automated diagnostics with the flexibility of manual diagnostics. Frequent modifications and updates are automatically detected and diagnosed. Additionally, we offer a vulnerability diagnostic service for smartphone applications called "SCT SECURE Mobile App Diagnostic Service." 【Features of SCT SECURE SWAT】 ■ Thorough diagnosis of web applications utilizing the characteristics of both automated and manual diagnostics ■ Balances the comprehensiveness of automated diagnostics with the flexibility of manual diagnostics ■ Automatically detects and diagnoses frequent modifications and updates ■ Well-suited for continuous vulnerability monitoring of critical web applications ■ Diagnostic results can be checked in real-time from a dedicated portal *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"Secudrive Drive Eraser" is a USB-based data erasure solution that can completely and safely erase not only the HDD (hard disk drive) within a PC but also external HDDs easily. By connecting a USB memory stick to the PC that needs data erasure, you can completely erase the data within the PC. There is no need to physically destroy the PC or HDD, allowing for secure HDD erasure and preventing potential information leaks. 【Features】 ■ Easy deletion operations due to the USB type erasure solution ■ Can delete multiple PCs simultaneously ■ Capable of erasing HDD data in Windows, as well as Mac (MacOS) and Linux environments ■ Adopts over 20 internationally recognized data erasure methods ■ Can be executed with just the EXE program, without the need to change BIOS or UEFI settings *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis catalog introduces the security solutions offered by our company. It features a rich lineup, including the cloud-based automatic vulnerability assessment service "SCT SECURE Cloud Scan" and "netsparker," which diagnoses web applications from cloud environments. Please use this for selecting products. [Contents (partial)] ■ SCT SECURE Cloud Scan ■ SCT SECURE Manual Web Application Assessment ■ netsparker ■ Gred Security Services ■ McAfee SECURE *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"ARGOS DFAS" is a device that can analyze whether personal or confidential information is being improperly held simply by connecting it to a PC via USB. It helps prevent information leaks and internal misconduct before they occur. One unit can inspect any number of PCs. It is also possible to investigate the disks of PCs that have stopped booting. 【Features】 ■ No installation required ■ Can investigate any number of PCs ■ Regular surprise inspections ■ Detects My Number and credit card numbers ■ Can investigate the disks of PCs that have stopped booting *For more details, please request materials or view the PDF data from the download.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationSCT SECURE Internal Scan is a network vulnerability assessment appliance. It scans the network to identify security holes and provides information for countermeasures. Regular scans detect vulnerabilities and changes in the network, offering information to prevent security incidents before they occur. 【Features】 - Automatic detection of target devices for comprehensive assessment - Easy and straightforward operation - User-friendly portal interface - Automatic updates of the vulnerability database - PCI DSS compliance For more details, please contact us or download the catalog.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration