List of Safety features products
- classification:Safety features
2521~2565 item / All 3227 items
Proactive security measures! Effective against targeted attacks that exploit vulnerabilities!
- Firewall and intrusion prevention
Compatible with PCs and mobile phones! A monitoring and control device that can respond quickly even in emergencies.
- VPN/Wide Area Ethernet
- Other security
- Other security and surveillance systems
Centralized management of Apple’s Mac, iPhone, and iPad with Microsoft’s Active Directory!
- Other operation management software
- Other services
- Personal authentication
Prioritizing comfort and convenience for people working in the office.
- Other security
- Other information systems
By simply connecting a USB, it is possible to investigate the possession of personal information! It prevents the leakage of confidential information in advance!
- Other security
We propose IoT-focused consulting backed by the experience and achievements of a group of security experts.
- Other security
- Other services
Automatic collection and visualization of access rights + audit support made easy and low-cost.
- server
- Other security
Protects the company's PC from vulnerabilities when there are no users present.
- Software (middle, driver, security, etc.)
- Entrance and exit control system
- Other security
An event registration system that does not store "customer information" in the cloud. Easy to implement as it is more likely to receive internal approval [Catalog available].
- Entrance and exit control system
- Other information systems
- SFA/Sales Support System
Introducing LTE-X technology! LTE technology can now be provided across various infrastructures!
- Encryption and authentication
- Other network tools
- Server monitoring and network management tools
You can utilize a wide range of features such as history management and prevention of unauthorized access due to loss!
- Other security
- Other security and surveillance systems
Instant automatic recovery from tampering in less than 0.1 seconds! SaaS-based instant tampering detection and recovery service.
- Server monitoring and network management tools
- Other security
Patent obtained! Endpoint security that does not seek threats.
- Firewall and intrusion prevention
- Other security
Cloud-era security archive application for Windows!
- Other security
High-precision defense with AI! Utilizing artificial intelligence algorithms to achieve predictive defense and prevention against cyber attacks.
- Other security and surveillance systems
- Other security
New concept OS-protect type endpoint security!
- Other security
The growing threat of targeted attack emails every day. Can you tell them apart?
- Email/Fax transmission
- Other information systems
- Other security
It is said that about 70% of information leakage incidents are due to internal factors.
- Other security
Small transaction settlement electronic commerce system (Co-wallet)
- Other electronic parts
- Other network tools
- Personal authentication
File Encryption System CS101
- Development support tools (ICE, emulators, debuggers, etc.)
- Data Erasing
- Encryption and authentication
From passive crime prevention to proactive 24-hour response!
- Other security
I want to change the system from live-in management to daytime management!
- Other security
Easily prevent laptop theft even while on business trips or outings!
- Other security
Slim security wire suitable for a wide range of applications.
- Other security
Newly developed one-click lock security wire
- Other security
The definitive security wire! Patented T-lock.
- Other security
Eliminate password entry and control login with fingerprint authentication + single sign-on.
- Other security
- Personal authentication
Realizing time recorders with transportation and distribution IC cards and mobile wallets.
- Other information systems
- Other PCs and OA equipment
- Entrance and exit control system
Is it enough to rely on just a "password" to protect confidential information? Easily implement 'two-factor authentication'! Check securely while on the go.
- Software (middle, driver, security, etc.)
- Encryption and authentication
Bring the technology used by large corporations and government agencies in Japan to your business as well.
- Virus software
- Other security
- filtering
Build and operate a website that supports one-time password authentication.
- Software (middle, driver, security, etc.)
- Encryption and authentication
Urchin successor software!
- Server monitoring and network management tools
- Other security
- Development support tools (ICE, emulators, debuggers, etc.)
High-security network utilizing mobile phone technology
- Encryption and authentication
Numerous implementation results with large machinery and major chemical manufacturers! An event reception system that does not store "customer information" in the cloud [Introduction of case studies].
- Entrance and exit control system
- Other information systems
- SFA/Sales Support System
Make attendance management smarter! Time cards on a tablet.
- Entrance and exit control system
- Other information systems
- Other services
It helps with employee compliance with laws, improving morals, and confirming safety!
- Entrance and exit control system
Effectively utilize IT assets through data erasure and re-resource (reuse) of used IT assets!
- Rental/lease
- Data Erasing
- Other operation management software
We offer three types of data erasure tailored to meet your needs!
- Data Erasing
We will find security "holes"! Attack scenarios can be customized according to the implementation purpose.
- Other security
- Remote Control
- Other services