iPROS Manufacturing
  • Search for products by classification category

    • Electronic Components and Modules
      Electronic Components and Modules
      56049items
    • Machinery Parts
      Machinery Parts
      70950items
    • Manufacturing and processing machinery
      Manufacturing and processing machinery
      95586items
    • Scientific and Physics Equipment
      Scientific and Physics Equipment
      33077items
    • Materials
      Materials
      34937items
    • Measurement and Analysis
      Measurement and Analysis
      52813items
    • Image Processing
      Image Processing
      14579items
    • Control and Electrical Equipment
      Control and Electrical Equipment
      50370items
    • Tools, consumables, and supplies
      Tools, consumables, and supplies
      62940items
    • Design and production support
      Design and production support
      11729items
    • IT/Network
      IT/Network
      40511items
    • Office
      Office
      13186items
    • Business support services
      Business support services
      32019items
    • Seminars and Skill Development
      Seminars and Skill Development
      5707items
    • Pharmaceutical and food related
      Pharmaceutical and food related
      23642items
    • others
      59636items
  • Search for companies by industry

    • Manufacturing and processing contract
      7354
    • others
      5041
    • Industrial Machinery
      4430
    • Machine elements and parts
      3292
    • Other manufacturing
      2872
    • IT/Telecommunications
      2519
    • Trading company/Wholesale
      2454
    • Industrial Electrical Equipment
      2316
    • Building materials, supplies and fixtures
      1818
    • software
      1648
    • Electronic Components and Semiconductors
      1576
    • Resin/Plastic
      1493
    • Service Industry
      1408
    • Testing, Analysis and Measurement
      1131
    • Ferrous/Non-ferrous metals
      980
    • environment
      702
    • Chemical
      630
    • Automobiles and Transportation Equipment
      558
    • Printing Industry
      506
    • Information and Communications
      434
    • Consumer Electronics
      422
    • Energy
      321
    • Rubber products
      311
    • Food Machinery
      303
    • Optical Instruments
      282
    • robot
      275
    • fiber
      250
    • Paper and pulp
      232
    • Electricity, Gas and Water Industry
      172
    • Pharmaceuticals and Biotechnology
      166
    • Warehousing and transport related industries
      145
    • Glass and clay products
      142
    • Food and Beverage
      134
    • CAD/CAM
      122
    • retail
      110
    • Educational and Research Institutions
      107
    • Medical Devices
      101
    • Ceramics
      96
    • wood
      87
    • Transportation
      83
    • Petroleum and coal products
      61
    • Medical and Welfare
      61
    • Shipbuilding and heavy machinery
      52
    • Aviation & Aerospace
      47
    • Fisheries, Agriculture and Forestry
      39
    • self-employed
      23
    • Public interest/special/independent administrative agency
      22
    • equipment
      20
    • Mining
      17
    • Research and development equipment and devices
      17
    • Materials
      16
    • Government
      15
    • Finance, securities and insurance
      13
    • Individual
      10
    • Restaurants and accommodations
      8
    • cosmetics
      8
    • Police, Fire Department, Self-Defense Forces
      7
    • Laboratory Equipment and Consumables
      3
    • Contracted research
      3
    • Raw materials for reagents and chemicals
      2
  • Special Features
  • Ranking

    • Overall Products Ranking
    • Overall Company Ranking
Search for Products
  • Search for products by classification category

  • Electronic Components and Modules
  • Machinery Parts
  • Manufacturing and processing machinery
  • Scientific and Physics Equipment
  • Materials
  • Measurement and Analysis
  • Image Processing
  • Control and Electrical Equipment
  • Tools, consumables, and supplies
  • Design and production support
  • IT/Network
  • Office
  • Business support services
  • Seminars and Skill Development
  • Pharmaceutical and food related
  • others
Search for Companies
  • Search for companies by industry

  • Manufacturing and processing contract
  • others
  • Industrial Machinery
  • Machine elements and parts
  • Other manufacturing
  • IT/Telecommunications
  • Trading company/Wholesale
  • Industrial Electrical Equipment
  • Building materials, supplies and fixtures
  • software
  • Electronic Components and Semiconductors
  • Resin/Plastic
  • Service Industry
  • Testing, Analysis and Measurement
  • Ferrous/Non-ferrous metals
  • environment
  • Chemical
  • Automobiles and Transportation Equipment
  • Printing Industry
  • Information and Communications
  • Consumer Electronics
  • Energy
  • Rubber products
  • Food Machinery
  • Optical Instruments
  • robot
  • fiber
  • Paper and pulp
  • Electricity, Gas and Water Industry
  • Pharmaceuticals and Biotechnology
  • Warehousing and transport related industries
  • Glass and clay products
  • Food and Beverage
  • CAD/CAM
  • retail
  • Educational and Research Institutions
  • Medical Devices
  • Ceramics
  • wood
  • Transportation
  • Petroleum and coal products
  • Medical and Welfare
  • Shipbuilding and heavy machinery
  • Aviation & Aerospace
  • Fisheries, Agriculture and Forestry
  • self-employed
  • Public interest/special/independent administrative agency
  • equipment
  • Mining
  • Research and development equipment and devices
  • Materials
  • Government
  • Finance, securities and insurance
  • Individual
  • Restaurants and accommodations
  • cosmetics
  • Police, Fire Department, Self-Defense Forces
  • Laboratory Equipment and Consumables
  • Contracted research
  • Raw materials for reagents and chemicals
Special Features
Ranking
  • Overall Products Ranking
  • Overall Company Ranking
  • privacy policy
  • terms of service
  • About Us
  • Careers
  • Advertising
  1. Home
  2. IT/Telecommunications
  3. 株式会社ハイブリッチ/ビス
  4. Product/Service List
IT/Telecommunications
  • Added to bookmarks

    Bookmarks list

    Bookmark has been removed

    Bookmarks list

    You can't add any more bookmarks

    By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

    Free membership registration

株式会社ハイブリッチ/ビス

EstablishmentShowa 35 (1960)
capital3000Ten thousand
number of employees40
addressTokyo/Taito-ku/4th Floor, Ueno Suzuki Building, 3-16-3 Ueno
phone03-5826-8003
  • Special site
  • Official site
last updated:Feb 12, 2025
株式会社ハイブリッチ/ビスlogo
  • Contact this company

    Contact Us Online
  • Company information
  • Products/Services(152)
  • catalog(176)
  • news(25)

株式会社ハイブリッチ/ビス List of Products and Services

  • category

1~33 item / All 33 items

Displayed results

Filter by category

Thermography Thermography
Hardware (PCs, servers, UTM, NAS, and other devices) Hardware (PCs, servers, UTM, NAS, and other devices)
I want to improve productivity. I want to improve productivity.
Core business system Core business system
I want to aggregate and share data. I want to aggregate and share data.
Security solution Security solution
I want to restrict entry and exit. I want to restrict entry and exit.
I want to prevent information leaks. I want to prevent information leaks.
I want to set access restrictions on the PC. I want to set access restrictions on the PC.
I want to provide security training. I want to provide security training.
Energy-saving and eco solutions Energy-saving and eco solutions
Sales promotion solution Sales promotion solution
I want to protect the server data. I want to protect the server data.
I want to enhance the functionality of the website. I want to enhance the functionality of the website.
I want to strengthen sales promotion. I want to strengthen sales promotion.
I want to computerize daily operations. I want to computerize daily operations.
Human Solution Human Solution
I

I want to prevent information leaks.

The office is overflowing with confidential documents and important data. Therefore, measures are needed for internal education, physical security, and electronic file leak prevention for PCs and servers. While it is often thought that the cause of information leaks is external unauthorized access to the office or network systems, in reality, 80% of cases are due to internal actions. Our company can assist with measures ranging from physical security to computer system protections.

Security Archive System "Digital @ IC Series"

The office is full of information that needs to be protected! A system suitable for managing the removal of items!

The "Digital @ IC Series" is a system that allows you to apply security to existing storage units rather than requiring new purchases. By installing the "Digital @ IC Lock" in the storage unit along with the "Digital @ IC Unit" and "Digital @ IC Secure Key," it becomes possible to manage the borrowing of media. You can centrally manage everything from the usage history of the storage unit to the borrowing history of various media. 【Features】 ■ Can be retrofitted to existing storage units ■ Borrowing restrictions can be set ■ Easy, secure, and safe ■ Comprehensive usage history ■ Centralized management via server ■ Key with built-in IC chip that cannot be duplicated *For more details, please refer to the PDF materials or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

FeliCa-compatible access control system 'SCN Series'

Extensive achievements in financial institutions, compatible with various electric locks! Centralized management via server is possible.

The SCN series is a simple, secure, and safe access control system that allows employee ID cards to be used as keys. Each gate is managed by a single controller. Remote operation, history viewing, and user management can be performed from the management computer. It is compatible with automatic doors and can be linked with fire alarms. You can also choose the card reader. [For concerns like these] ■ Unauthorized entry by outsiders ■ Information leaks by internal personnel ■ Management of access history ■ Access restrictions by employee *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

PC Personal Authentication USB Token "SecureCore"

Easily manage passwords with USB token authentication!

By utilizing software and USB tokens, we will improve the previously complicated password management, further enhancing security and reducing management costs. This is a total password management solution for managing Windows logon and single sign-on, among other things.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

USB dongle "ROCKEY" software usage restriction license management

Independent protection tool (envelope) enables a wide range of protection methods through the provision of APIs!

"ROCKEY" is a hardware dongle-based system that protects software copyrights. It can also be used as an enabler (function restriction) for hardware devices. It supports envelope tools, APIs, driverless multilingual support, function control, and is compatible with multiple platforms. Additionally, it is used in a wide range of fields to prevent unauthorized copying, including CAD software, medical software, gaming software, asset finance software, hardware function control, and preventing unauthorized copying of gaming devices. 【Features】 ■ Equipped with advanced tamper-evident technology and anti-debugging technology ■ Effectively disables reverse engineering ■ Achieves robust security by combining API/envelope protection ■ USB type for portability and can be used without drivers ■ Supports high compatibility and numerous platforms through IEEE1284 compliance *For more details, please refer to the PDF materials or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Digital @ IC Key System

A new solution for key management! Real-time log collection on network PCs.

The "Digital @ IC Key System" is a key that contains an IC chip. The authentication status is displayed through the lighting and blinking of an LED. By using it with devices equipped with an IC key authentication device, it enables permission settings and history management. Compared to security products using IC cards or biometric authentication devices, it allows for significant cost reduction. 【Features】 ■ Unlocking permissions can be set for each cabinet ■ Usage history can be recorded, including who unlocked what and when ■ One IC key can be registered to multiple cabinets ■ Reduces the number of keys to manage ■ Significant cost reduction is possible *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Keyless valuables management box "Flora Keep Box"

Available at various facilities! Immediate response during power outages with mechanical emergency unlocking.

We would like to introduce the "Flora Keep Box" that we handle. With a sensor, voice guidance automatically starts when you approach. Thanks to high-performance memory, the ID will be remembered indefinitely until power is restored after an outage. Fingerprint authentication and RF-ID through a high-precision interface eliminate the need for a password. (Applicable only to model PB-46FRF) 【Features】 ■ Double-check system ■ Keyless operation ■ Auto message ■ Reliable memory ■ Trouble response *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Various flapper gates - Access control systems, card/biometric authentication, etc.

Accessible for wheelchair users! The door is located in the center and can move a total of 180 degrees to the left and right.

The "Flapper Gate" is an automatic opening and closing passage device that incorporates a card reader. By bringing a dedicated card close to the reader, the reader reads the card, and if it is an authorized card, passage through the gate is permitted. After presenting an authorized card, the door automatically opens, and after passing through, it automatically closes. If someone attempts to sneak in, the sensor detects it, and the gate closes to prevent unauthorized entry. 【Features】 ■ Allows continuous passage for up to 50 people per minute ■ The color of the side acrylic panels can be freely chosen during installation ■ Can be installed without disrupting the atmosphere of the office ■ Features a design that matches various office environments *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Flapper Gate: Like a ticket gate at a station! _Access Control System

Access control management with IC cards, QR codes, and biometric authentication. Flapper gates can enhance security and ensure smooth passage.

The passage permits the reduction of personnel managing access permissions, previously handled by security guards, through the use of flap gates. Access rights settings, time zone specifications, log collection, and remote operation are also possible. Various authentication methods can be implemented, including IC cards (FeliCa, MIFARE), QR codes, and biometric authentication (facial recognition, fingerprint recognition, vein recognition). It is also possible to grant access in combination with temperature checks.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

PC and peripheral equipment unwanted item pickup service

Re-challenge for resale! Contributing to cost reduction by sliding into free disposal and purchase disposal.

We would like to introduce our "PC and Peripheral Equipment Disposal Service." We offer free pickup of desktop and laptop computers, LCDs, and other peripheral devices shipped before 2005, regardless of their age. After collection, we will inspect the items and perform HDD and data erasure, followed by recycling or disposal. Our company delivers suitable solutions for our customers' development and prosperity, based on the principles of simplicity, convenience, and effectiveness from hardware, software, and human aspects. 【Purchase Conditions】 ■ Eligible Models: Desktop and laptop computers shipped after 2005 ■ Prices - Desktop: 300 yen - Laptop: 1000 yen - 15-inch LCD: 200 yen - 17-inch LCD: 300 yen *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Materials] Documents for considering the introduction of entry and exit management; various entry and exit management systems.

Introducing security through access restrictions such as cards, RFID, biometric authentication, and temperature checks!

This document includes products for managing entry and exit in various situations. We introduce the stylish multi-face recognition terminal "BS-K1T643D(W)X-T" with a built-in thermal module, as well as the main station "BS-KM9503," which can also be used for reception phones and reception management and monitoring. It provides clear explanations of applications, making it a useful reference when considering implementation. 【Featured Products (Excerpt)】 ■ Multi-face recognition terminal: MinMoe BS-K1T673T series ■ Simple card reader: INTER LOCK ■ Infrared sensor: Fastlane Door Detective CL ■ 3D face recognition system: IP-200 series ■ Access management: RFID system *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IC card solution - Access control and PC management using IC cards.

Attendance, entry and exit, security gates, etc., can all be managed with a single card for multiple purposes!

The "IC Card Solution" is a product that can be used for PC login authentication systems and machine security systems. We offer a simplified card reader for access control systems that can restrict entry and exit, as well as various security gates that can be used like ticket gates at train stations. Additionally, we have valuable item lockers, delivery lockers, and IC key terminals that allow you to view usage history on a computer. 【Lineup (Excerpt)】 ■ Security Library System ■ Web Attendance Management System: MC Office Time Management ■ Access Control System: Flapper Gate ■ PC Login Authentication Management: Alca Clavis N-SAS ■ Visitor Reception Management System: Nacchan 3 *For more details, please refer to the PDF materials or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web Application Firewall "WAPPLES"

Updates are infrequent, about three times a year! Proven technical reliability in all detection and defense!

"WAPPLES" is a web application firewall that detects and blocks website attacks. It employs a unique attack detection technology based on rule-based logic analysis engines, which does not rely on blacklists/whitelists or signature-based pattern matching, allowing it to defend against unknown attacks. By simply selecting from 26 types of detection rules, high security is ensured from the moment of implementation. 【Features】 ■ Capable of defending against unknown attacks that typical WAFs cannot handle ■ Implementation to configuration/operation takes only 3 days ■ Easy setup by simply applying templates ■ Significantly reduces the effort and cost associated with WAF operation ■ No impact on performance due to logic analysis based on rules *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Materials for considering the introduction of entry and exit management (e.g., cards, RFID, biometric authentication, etc.)

Introducing products for door access control, entry and exit restrictions for each office room, and more! Flapper gates, electric lock doors, automatic doors, key management, etc.

This document includes card readers for access control systems and more. We introduce the "SCN Series," which allows for history viewing by all doors, by individual doors, or by individuals, and the "Flapper Gate," which can restrict access routes. It contains numerous product images, making it a useful reference when considering implementation. We encourage you to take a look. 【Featured Products (Excerpt)】 ■ Card Reader: SCN-R3000 ■ Card Reader: SCN-R3501 ■ Management Application: SCN-A3001 ■ IC Key System: Digital @ IC Key System ■ IC Key System: Digital @ IC Key Terminal *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Collection of examples and catalogs for physical and information management measures for crime prevention and disaster prevention *Free distribution!

A must-see for those considering the introduction of physical and information security! You can find products that suit your company. Preventing information leaks and theft, access permissions, key management, metal detectors.

Access control systems, surveillance systems, key management systems, metal detectors, shoplifting/theft prevention measures, access rights settings, and authentication methods will be proposed according to the application, including a wide range of options such as IC cards, biometric authentication, RFID tags, and motion sensors. Additionally, we will introduce solutions for BCP measures, risk management, earthquake preparedness, and prevention of bringing in and taking out items, all aimed at preparing for disasters.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Catalog of security measures case studies for factories, offices, facilities, and stores *available for free!

A must-see for those considering the introduction of physical and information security! You can find products that suit your company. Information leakage, theft prevention, access rights management, key management.

Access control systems, surveillance systems, key management systems, shoplifting/theft prevention measures, access rights settings, and authentication methods are proposed according to their applications, utilizing a wide range of options such as IC cards, biometric authentication, RFID tags, and motion sensors. Additionally, we will introduce solutions for BCP measures, risk management, and earthquake preparedness to prepare for disasters.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web authentication system "SecureVisit" membership-based web system

We will add token authentication to the existing system, achieving significant security enhancement.

The product we handle, "SecureVisit," is a reverse proxy server with USB token authentication functionality. It allows for easy addition of USB token authentication to existing web systems. Users can connect their USB tokens in advance, and the login procedure remains unchanged from the conventional method. Additionally, since it does not use electronic certificates on the client side, there is no need to worry about the initial costs of electronic certificates, renewal costs, or the costs associated with work during renewal. 【Features】 ■ Continuously transfers data between the backend web server and the client while checking the connection of the token. ■ No need to modify existing systems. ■ Does not change the user's operational methods. ■ Does not impose additional operational costs on the information systems department. *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Easy installation and affordable access control system 'Smart Rim Lock'

Can be used in conjunction with user passwords! Comes with a free management application.

The "Smart Rim Lock" is an easy and affordable access management system compatible with IC cards, PIN codes, and smartphones. It allows for the import of access logs via USB and the setting of access permissions for multiple doors. The lock can be used in conjunction with existing locks and has a locking mechanism even without a lock. Additionally, there is an "INTER LOCK" that can utilize existing locks. 【Features】 ■ Compatible with FeliCa, Mifare cards, and mobile wallets ■ Only one PIN code can be set if using a PIN code only ■ Auto-lock feature with time settings ■ Installation requires minimal work (hole processing) ■ AC adapter available as an option ■ Compatible with indoor remote control system (InterLock R only) *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A booklet that clearly explains information management and security measures.

Divided into physical security and information security.

In physical security, there are monitoring devices, shoplifting prevention, and intrusion prevention, among others. In information security, there are measures against information leakage and management of PCs and servers, among others.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

PC login authentication management one-time password token 'C100'

Compatible with various applications! Portable design that's easy to carry.

The "C100" is a one-time password token that does not require connection to a PC, so there is no need to install drivers or applications. By pressing the button on the token, a one-time disposable password is displayed, and there is no need to remember it. It can be integrated with various applications and features a portable design that is easy to carry. Additionally, we also offer the "C200," which is suitable for time-based use, and the multifunctional, high-performance "C400." 【Features】 ■ No need to connect to a PC, so no driver or application installation is required ■ A one-time disposable password is displayed, and there is no need to remember it ■ High security ■ Low price ■ Easy to implement *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Compact Portable Metal Detector Set 'PD140N' _ Introduced at Airports and Customs

Strong resistance to external interference! A robust and ergonomically sophisticated design!

The "PD140N" is a portable metal detector that utilizes high reliability and ergonomics to achieve new detection capabilities and signal output functions for operators. The control panel, equipped with a switch and alarm lamp, is made of thick silicone. It offers a high level of protection, allowing for use both indoors and outdoors. Additionally, its technical features comply with the NIJ (National Institute of Justice, USA) standards 0602.02 and the new NIJ standard 0602.03 (draft). 【Features】 ■ Compact, robust, and ergonomically refined design ■ Capable of detecting both ferromagnetic and non-ferromagnetic metals ■ Fully digital design: stable performance with no need for calibration ■ Long continuous operating time ■ Advanced programming capabilities ■ Usable indoors and outdoors *For more details, please refer to the PDF materials or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

UHF Band RFID Outgoing Management System

Depending on the application, we also offer suggestions for the types of IC tags (metal-compatible, water-resistant, self-sounding, etc.)!

The "UHF Band RFID Outgoing Management System" is a product that enables tool management in factories, as well as management of items taken outside and lending management. It allows for bulk reading of tools and items with IC tags affixed inside boxes or bags such as plastic toolboxes, metal toolboxes, and fabric buckets. Additionally, there is the "Tool Guardian(R)" suitable for large and medium-scale tool management in a fixed or gate type, and a new "Tool Guardian(R)" in a handheld type suitable for medium and small-scale tool management. 【For these concerns】 ■ Not knowing where the items you want to use are located ■ Spending too much time on verification and processing when taking out items ■ Spending too much time checking the condition upon return of items ■ Wanting to manage outgoing items centrally and visualize them ■ Not being able to quickly identify when items are lost or missing *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Learning Management System "Speed LMS"

We provide services on a cloud server, allowing for flexible operations!

"Speed LMS" is a system that excels in customization of design and functionality, in addition to the basic features of a Learning Management System (LMS). We have a track record of over 50 companies and 100,000 users to date. It is an e-learning system developed entirely from scratch. We can develop the design and functionality of the e-learning system according to your requests. [Features] ■ Numerous achievements in providing to customer servers ■ Designing necessary functions based on customer requirements ■ Adopting a semi-customization approach by using existing systems as a foundation to keep development costs down *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Windows logon, single sign-on, SecureCore

You can also purchase additional features later! You can use the necessary features when you need them.

"SecureCore" is a PC security solution that enables Windows login, PC locking, single sign-on, file/folder encryption, and more with a single USB token. You can purchase only the necessary features from the available options, allowing for low-cost implementation. Additionally, in the event of a lost USB token, an administrator can issue a one-time password to the user, temporarily allowing them to log into the PC. 【Features】 ■ High security achieved through USB token ■ High-level security realized through two-factor authentication (physical authentication + knowledge authentication) with USB token, featuring a simple design that makes implementation and operation easy ■ Easy operation by simply inserting the USB token into the USB port *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Database encryption package "D'Amo"

Tightly guard your information assets! It is possible to manage the company's database in an integrated manner from a security perspective.

"D'Amo" is a security solution that allows for the encryption of database data at the column level without modifying application programs, and implements access control and auditing. It operates with complete independence from application programs. Additionally, changes to security policies are applied in real-time, enabling a swift response to security environments. It supports automatic backup and recovery functions for all policy information. 【Features】 - Compatible with Oracle and SQL Server - Can be operational in as little as 3 days, within a week - Detailed logging for identifying database connections - Real-time application of connection policy changes - Automatic backup and recovery functions for policy information *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

PC, HDD disposal, destruction, and data erasure service

Purchase and disposal of unused PCs, servers, and HDDs, HDD destruction, and data deletion services. On-site collection and local data destruction are also available.

Purchase and disposal of unused PCs, servers, and HDDs, HDD destruction, and data erasure services. On-site collection and local data destruction are also available. We also collect other items such as home appliances and metal products. *Please contact the listed contact information in the catalog for inquiries.*

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Backup system construction maintenance and inspection service _ Hybrid Rich

Solve high-risk backups, backup restoration, and inspection management by utilizing information system outsourcing services! From building backup systems to maintenance.

【Information System Outsourcing Service】 Hybrid's backup maintenance protects your important business data. ● Scheduled backups are executed, and verification of normal backup data acquisition and restoration of the acquired backup data are performed. ● A confirmation report is created and submitted upon completion of the backup. ● We prevent troubles such as backups not being taken when they should have been, or the inability to restore data in case of emergencies. ● Additionally, if any errors occur during the backup execution, we will promptly respond to resolve the issue through remote or on-site support. ● If the data capacity of your backup device reaches its limit or if degradation of the device is observed over time, we also handle capacity expansion or selection of new devices.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information system outsourcing service: We will support your company's system personnel.

By utilizing information system outsourcing services, even without a dedicated system administrator, or by reducing the workload of the responsible personnel, we can ensure smooth daily operations while also mitigating risks.

We will take on the responsibilities of the information systems department through our information system outsourcing services. Maintaining and training IT professionals requires a significant amount of time and cost. "Leave those tasks to us!" - Kitting services - User support outsourcing for maintenance subscriptions - Backup system construction and inspection services - Disposal of industrial waste, purchase and collection of used goods - Destruction of HDDs, data erasure, etc.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

PC kitting, cloning, and PC/monitor purchase service

By utilizing information system outsourcing services, even without a dedicated system administrator, or by alleviating the workload of the responsible personnel, daily operations can be conducted smoothly while also reducing risks.

We undertake all tasks related to information systems through our information system outsourcing service. Maintaining and educating IT professionals requires a tremendous amount of time and cost. "Leave those tasks to us!" - Kitting services - User support for maintenance subscriptions - Backup system construction and inspection services - Disposal of industrial waste, purchase and collection of second-hand goods - Destruction of HDDs, data erasure, etc. ■ PC Cloning Work We offer bulk PC setup services tailored to your operations. We provide detailed configuration services, including various settings and installation of specified applications. ■ PC Help Desk, Custody, and Delivery Management Services At our kitting center, we take custody of your PCs and provide telephone help desk support, as well as management of alternative device delivery on specified dates and locations. ■ PC Collection Services We also handle the collection of unwanted PCs that you have used. We will also take care of HDD data erasure. Please feel free to contact us regarding peripheral devices as well. ■ For more details, please download our catalog or contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

PC security measures, log monitoring, application device control_Eye247

Asset information management, security inspection/monitoring, terminal control and monitoring! Prevent information leakage.

"Eye247 Work Smart" is client operation management software that adheres to information security policies and protects employees. By utilizing daily PC operation logs, it enables visibility into business operations and facilitates work style reform. 【Features】 ■ Rich in functionality ■ Low cost ■ Power management for client PCs and printers to reduce energy consumption ■ Bulk installation to reduce management workload ■ Bulk inventory of USB devices to reduce labor costs *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Industrial waste and unwanted item collection service

Purchase and disposal of unused home appliances, computers, and peripherals, HDD destruction, and data deletion services. On-site collection and local data destruction are also available.

Purchase and disposal of unused home appliances, metal products, PCs, servers, peripherals, and HDDs, as well as HDD destruction and data erasure services. On-site collection and local data destruction are also available. *Please contact the listed contact information in the catalog.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Server and PC backup system construction, maintenance, and inspection services.

Solve high-risk backups, backup restoration, and inspection management by utilizing information system outsourcing services! From building backup systems to maintenance.

【Information System Outsourcing Service】 Hybrid Rich's backup maintenance protects your important business data. ● Scheduled backups are executed, and confirmation of normal backup data acquisition and restoration of the acquired backup data are performed. ● A confirmation report is created and submitted upon completion of the backup. ● Troubles such as backups not being taken when they should have been, or inability to restore data in case of emergencies, are prevented in advance. ● Additionally, if any errors occur during the backup execution, we will promptly respond to resolve the issue through remote or on-site support. ● If the data capacity of your backup device reaches its limit or if degradation of the device is observed over time, we will also assist in adding capacity or selecting new devices. <Basic Information> ● Recommended Backup: "Bridge for Backup 3-2-1" ● Features of Hybrid Rich's backup maintenance ● Example prices for backup maintenance services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

PC migration service to Windows 11

With the end of maintenance support for Windows 10, we will assist you in the early transition to Windows 11.

【Information System Outsourcing Services】 Maintaining and educating IT professionals involves a tremendous amount of labor and cost. "Leave those tasks to us!" Typical services of the Information System Outsourcing Services ■ Kitting - Migration from Windows 10 to 11, application settings, server configurations, etc. - Achievements of 20,000 units annually! - We also handle the configuration of large quantities of devices! - We provide a consistent service from receipt of equipment to kitting and shipping! ■ Maintenance User Support - Maintenance and support services for various business software and systems purchased from us, including Q&A. - Acting on behalf of maintenance contracts with various manufacturers and handling send-back requests. ■ Backup Inspection Service <Bridge for Backup 3-2-1> We practice the ideal "3-2-1 rule" to protect your valuable data. ■ Industrial Waste / Second-hand Goods Purchase and Collection - Disposal of industrial waste - Purchase and collection of second-hand goods ■ HDD Destruction and Data Erasure - Destruction of HDDs and data erasure ⇒ Certificates will also be issued.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

RFID Solutions: Outgoing/Loan Management, Inventory Management, Performance Collection

Automation with RFID and IC tags improves productivity through automatic recognition. It supports management of item withdrawal/loan, inventory management, performance collection, and process management.

● We can also suggest types of IC tags based on their usage (metal-compatible, water-resistant, self-sounding, etc.)! ● Depending on the application, we will propose reading methods such as handheld reading, automatic reading with antenna installation, and bulk reading. ★ RFID Solution Applications - Management of items being taken out: asset management and tool management - Lending management, rental item management: return management - Inventory management: location management, quantity management - Factory process management, work performance collection: automatic work performance collection through automatic reading of IC tags - Cleaning and rental management of uniforms, etc.: using linen tags for bulk reading, etc. - Access control management system 【For these concerns】 ■ I don't know where the items I want to use are. ■ When taking out items, the confirmation process takes too much time. ■ When returning items, checking their condition takes too much time. ■ I want to manage the items being taken out centrally and visualize it. ■ I cannot quickly find out if items are lost or missing. ■ I want to read multiple items at once instead of one by one with a handheld device. ■ I need tags suitable for environments like metal or cleaning. *For more details, please refer to the catalog or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
Prev 1 Next
  • 大型品の切削や低コストな複合加工に。ロボットシステムの資料進呈

    大型品の切削や低コストな複合加工に。ロボットシステムの資料進呈

  • PFAS規制に対応 PFASフリー コーティング剤 ・潤滑性を付与 摩擦低減、耐摩耗性向上 ・離型性を付与 撥水・撥油性、非粘着 など、多様の用途で提案が可能 素材は、金属・プラスチック・ゴムなど問いません!
  • 義務化された熱中症対策に取り組む製造現場、工場、物流倉庫へ 排気熱風なく※室温-4.1℃の冷風を 工事不要で暑さ対策 気化式スポットクーラー Pure Drive ピュアドライブ ※環境条件…室温35℃/湿度50%/風量「中」
    • Contact this company

      Contact Us Online

    Products

    • Search for Products

    Company

    • Search for Companies

    Special Features

    • Special Features

    Ranking

    • Overall Products Ranking
    • Overall Company Ranking

    support

    • site map
    IPROS
    • privacy policy Regarding external transmission of information
    • terms of service
    • About Us
    • Careers
    • Advertising
    COPYRIGHT © 2001-2025 IPROS CORPORATION ALL RIGHTS RESERVED.
    Please note that the English text on this page is automatically translated and may contain inaccuracies.