List of Software (middle, driver, security, etc.) products
- classification:Software (middle, driver, security, etc.)
3151~3195 item / All 3912 items
The ideal IT asset management software that can be used for telework and remote management!
- Software (middle, driver, security, etc.)
AI technology patented analyzes malware at the DNA level!
- Software (middle, driver, security, etc.)
- Other security
Dramatically improve your security environment! Targeted cyber attack countermeasure solution.
- Software (middle, driver, security, etc.)
- Other security and surveillance systems
- Other security
Total support for IT operations from implementation to development! We propose by combining know-how from various genres.
- Software (middle, driver, security, etc.)
- Electronic documents
- Other core systems
View the information you need when you want to! Digital signage compatible with smart devices.
- Software (middle, driver, security, etc.)
- Electronic documents
- Other core systems
If you're struggling with case management, we can solve your concerns about visualizing work progress, efficiency, and profits!
- Software (middle, driver, security, etc.)
- Electronic documents
- Other core systems
Leave the before-and-after of construction, property introductions, and the management of achievements, history, and images all to us!
- Software (middle, driver, security, etc.)
- Electronic documents
- Other core systems
We pursue the technical skills to operate the system stably.
- Software (middle, driver, security, etc.)
- Other contract services
A software that demonstrates its power with a baseball scorebook! Easily edit using highlight scenes.
- Software (middle, driver, security, etc.)
Software that contributes as metadata for content reuse and libraries!
- Software (middle, driver, security, etc.)
We provide solutions for AML and KYC from DMG Corporation!
- Software (middle, driver, security, etc.)
- Other security
Leave smartphone app development to us.
- Software (middle, driver, security, etc.)
Next-generation DCIM software that overcomes many weaknesses in implementation.
- Software (middle, driver, security, etc.)
We support the utilization of methods that leverage IT technologies such as molecular simulations!
- Software (middle, driver, security, etc.)
- Development support tools (ICE, emulators, debuggers, etc.)
- Other contract services
We will solve your problems with the database system!
- Other services
- Software (middle, driver, security, etc.)
Maximize the effectiveness of existing tools and departmental output through orchestration and automation!
- Software (middle, driver, security, etc.)
- Other security
Web application vulnerabilities can be easily mitigated without specialized knowledge!
- Software (middle, driver, security, etc.)
- Other security
Automatically assess and understand the risks across the entire infrastructure.
- Software (middle, driver, security, etc.)
- Other security
Enables quicker and more accurate decision-making throughout the entire lifecycle of risk detection and response.
- Software (middle, driver, security, etc.)
- Other security
Equipped with two types of non-parametric structural optimization techniques! Responding to practical needs in the design field!
- Software (middle, driver, security, etc.)
- Other analyses
It is possible to simulate powder flow, solid-gas two-phase flow, solid-liquid two-phase flow, gas-liquid two-phase flow, and solid-gas-liquid three-phase flow!
- Software (middle, driver, security, etc.)
- Other analyses
We will overwhelmingly improve development quality and duration, and achieve agile system integration.
- project management
- Software (middle, driver, security, etc.)
- Database
Significantly reduce the hassle of data entry tasks! A service that reads text and converts it into data has arrived.
- Electronic documents
- Software (middle, driver, security, etc.)
A multi-use revolution from maintenance manuals to usage instructions! We support maintenance inspections with 3D and MR/AR technology.
- Software (middle, driver, security, etc.)
No special applications or editors needed! You can produce and operate it in-house without any special know-how.
- Software (middle, driver, security, etc.)
We create and provide user-friendly manuals in a chat format using AI!
- Software (middle, driver, security, etc.)
We provide embedded system development environments and undertake contract development services.
- Software (middle, driver, security, etc.)
- Embedded system design service
- Other embedded systems (software and hardware)
Software that can extract cracks from digital camera images.
- Visual Inspection Equipment
- Software (middle, driver, security, etc.)
IoT secure authentication technology to prevent "spoofing" in device-to-device communication.
- Encryption and authentication
- Software (middle, driver, security, etc.)
- Embedded Board Computers
Realizing centralized cloud management of a vast number of IoT devices.
- Software (middle, driver, security, etc.)
- Integrated operation management
- Server monitoring and network management tools
Edge computing middleware for IoT based on high-speed databases.
- Software (middle, driver, security, etc.)
Automate repetitive tasks on your computer! Reduce errors that are typical of simple tasks!
- Software (middle, driver, security, etc.)
- Other information systems
Easy to expand and simple to implement! Ideal for those who want to start RPA at the department or individual level.
- Software (middle, driver, security, etc.)
- Other information systems
Measurement waveform data capture software developed to meet the needs of research and development environments.
- Software (middle, driver, security, etc.)
Are you wasting valuable time on routine PC data entry? A purely domestic RPA tool that can dramatically improve your work efficiency.
- Other network tools
- Software (middle, driver, security, etc.)
Enables safe external use of PCs. Data can be used securely even in locations without a network environment.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Prevent information leaks due to internal misconduct! Eliminate unauthorized use of privileges and rights to take out information to "nothing."
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Using secret dispersal technology to render data meaningless! Safe storage and management on the cloud is possible.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
For sending and receiving important data and large volumes of data! Even if any fragment leaks during transport, the original data remains safe.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Data De-identification Library! A new concept of "de-identification" for data protection and authentication.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
ActiveX, kiosk terminals, multi-device support - a remote control software with numerous achievements in the embedded field.
- Software (middle, driver, security, etc.)
- Other information systems
- Server monitoring and network management tools
Always diagnose based on new vulnerability information! Introduction to the cloud-based automatic annual vulnerability diagnosis service.
- Software (middle, driver, security, etc.)
- Server monitoring and network management tools
- Other security
High-security, low-cost, and highly convenient file server security software!
- Software (middle, driver, security, etc.)
- Other security
Ideal for continuous vulnerability monitoring of web applications! Annual diagnostic service for monitored web applications.
- Software (middle, driver, security, etc.)
- Server monitoring and network management tools
- Other security