1~9 item / All 9 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~9 item / All 9 items
Could you be infected with malware? Is there a breach? Please contact us first. Our cybersecurity response team will assist you. (For corporations) Over 80 security certifications Top 10% of Cyber Security 500 Research experience Secure IoT design Multi-platform support Training and certification 'Free consultation' Please contact us - Emergency response phone: 03-5575-1593
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "BlackBerry Spark UES Suite" is a set of security controls designed with specific purposes in mind, providing a zero-trust framework and enabling a user experience that minimizes necessary tasks (zero-touch). In addition to security controls that extend from traditional endpoints to mobile and IoT devices, it provides the foundation for a zero-trust security architecture. 【Features】 ■ Bridges the gap between zero-trust and zero-touch ■ Achieves a user experience that minimizes necessary tasks ■ Provides the foundation for a zero-trust security architecture ■ Promotes the speed and agility of security teams ■ Offers excellent visibility across diverse IT infrastructures *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "BlackBerry Spark UEM Suite" is a product that enhances productivity while ensuring and managing the security of all endpoints. Users can access the necessary applications whenever they need them. Additionally, the IT department can provide high-class security without compromising productivity. We offer a variety of products designed to meet your needs. 【Features】 ■ Supports various devices ■ Users can access the necessary applications whenever they need them ■ IT departments can provide high-class security without compromising productivity ■ Supports enterprise-level content security with CCP ■ Advanced productivity apps and built-in features *For more details, please refer to the PDF document or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"BlackBerry Protect" is a product that provides additional security controls to prevent security breaches and defend against various attacks, including script-based, fileless, memory, and external device-based attacks. It achieves this without requiring user or administrator intervention, cloud connectivity, signatures, heuristics, or sandboxes. 【Features】 ■ True zero-day defense ■ Enforcement of device usage policies ■ Malware leveraging AI (artificial intelligence) ■ Detection and defense against memory exploits ■ Application control for fixed-function devices *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe product is an MTD solution that extends the AI-based security of "BlackBerry Protect" to mobile devices. It monitors attacks from mobile malware at the device and application level, expanding protection without the need for additional manpower. Additionally, it identifies security vulnerabilities and the potential for malicious activity by monitoring OS updates, system parameters, device configurations, and system libraries at the application level. 【Features】 ■ Monitors attacks from mobile malware ■ Expands protection without the need for additional manpower ■ Simple end-user registration and activation via QR code ■ Intuitive device health status ■ Simple device security assessment *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"BlackBerry Optics" is an EDR solution that extends the threat defense provided by BlackBerry Protect by identifying and preventing a wide range of security incidents using AI. It can be installed on endpoints in minutes, without the need for hardware or network infrastructure upgrades. Additionally, by storing and analyzing data locally on the endpoint, it eliminates the need for regular updates and enables detection and response without delays. 【Features】 ■ Reduces dwell time ■ Mitigates potential impacts caused by security breaches ■ Maintains a consistent level of security ■ Significantly reduces the time and cost of recovery from attacks ■ Provides threat detection modules and automated action capabilities through machine learning *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"BlackBerry Desktop" is a product that enables users to securely access email, company websites, servers, content, and files on Windows 10 and macOS devices that are not managed by the user personally or by the company. It can simplify the organization's BYOC program and improve productivity not only for traditional employees but also for non-traditional employees. Additionally, it helps your company save costs related to hardware, software, provisioning, and help desk services. 【Features】 ■ Maximizes productivity ■ Reduces costs ■ Securely operate from any device at any time ■ Use the same functionalities as computers owned or managed by the company ■ Users can freely collaborate using business-specific features *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"Cylance OPTICS" is an EDR feature module added to CylancePROTECT, which enables the monitoring of events on endpoints, as well as the visualization, analysis, investigation, and response to threats. By utilizing an AI-driven prevention-first security solution, it is possible to reduce noise generated across multiple security layers. It enhances security by leveraging existing resources. 【Features】 ■ Event information collection through a decentralized model ■ Identification of intrusion pathways through root cause analysis ■ Hunting for hidden threats ■ Minimization of damage through threat containment ■ Dynamic threat detection and response based on endpoint behavior *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationCylancePROTECT® is an endpoint security solution that utilizes artificial intelligence and machine learning technologies to detect malware before it executes. It blocks various types of malware and threats, including system-based attacks, memory-based attacks, and scripting, with a high detection rate of over 99%. Additionally, unlike behavior detection products, it is characterized by a low rate of false positives. ★ We are offering a trial demo for those considering implementation. Please experience the differences from other products in our demo! 【Features】 ■ 1-2% CPU usage ■ Memory consumption of 40-60MB ■ Capable of detection offline without internet connection ■ No need for daily signature updates ■ Compatible with Windows, Mac, OS, and Linux, etc. * For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration