List of filtering products
- classification:filtering
1~15 item / All 60 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
The number of ransom demands and service suspensions due to ransomware infections is increasing. As IT advances, the risks also grow. Don't forget to implement effective intrusion and information leak...
- Firewall and intrusion prevention
- filtering
- Other security
Digital transformation also emphasizes the importance of system protection. Let's effectively use data diodes (OWCD) as a communication restriction to protect ourselves from information-gathering malw...
- Firewall and intrusion prevention
- Other security
- filtering
To securely obtain information in the supply chain, there are methods like this that can strengthen cybersecurity even with partners at different levels of response.
- Firewall and intrusion prevention
- filtering
- Other security
The compatibility between Zero Trust and data diodes is actually outstanding! The number of adoption cases is steadily increasing. Let's make visible progress!
- Other security
- Firewall and intrusion prevention
- filtering
Is there a possibility that the backup storage data could be leaked? It's also important to have a system in place that prevents data from being stolen.
- Firewall and intrusion prevention
- Other security
- filtering
Isn't the remote line for system maintenance affecting the fate of the company? A new idea to physically seal off the "invasion point" of ransomware.
- Firewall and intrusion prevention
- Other network tools
- filtering
Securing the supply chain is a headache for managers. With OWC-D file secure link, you can enhance security even with partners at different levels.
- Firewall and intrusion prevention
- Other information systems
- filtering
Is your company's OT network secure? Reading this will give you the basics of security measures! Case studies are also available.
- filtering
Are you ready to respond to the evolving industrial network? We are offering a guidebook on network building and 8 related materials!
- filtering
Analysis and debugging tools for network administrators! 【Manufactured by Allegro】
- filtering
We will be exhibiting at Inter BEE 2024.
We will be exhibiting at Inter BEE 2024, which will be held at Makuhari Messe from November 13 (Wednesday) to November 15 (Friday). We will showcase IP packet analysis devices and IP traffic emulators necessary for the IP transformation of broadcasting. Please be sure to stop by our exhibition booth.
Utilizing action analysis algorithms to detect anomalies hidden within network traffic and identify signs of malicious behavior or breaches!
- filtering
How far have hospitals progressed in their ransomware countermeasures? - Progress Software conducts a reality survey.
Due to a series of ransomware attacks targeting hospitals, there has been a growing interest in cybersecurity among medical institutions. For example, in October 2022, a ransomware attack on a hospital in Osaka rendered electronic medical records unusable, halting outpatient services and taking two months to restore the system using backup data. Given the detailed reports of the serious damage, many inquiries have been received by the agencies (SIers) handling "Flowmon ADS," a ransomware countermeasure solution offered by Progress Software. You can find more details in the related links below.
Standalone appliance! Available as hardware or virtual.
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
The generated flow statistics are analyzed in detail! Introducing products that can also be used in virtual environments.
- filtering
Progress's WhatsUp Gold has been named a leader in the G2 Network Monitoring Tools Report.
When it comes to product evaluation, you might imagine observing the product's performance in a lab or office setting, but G2 Software Reviews are not of that kind. G2's reviews are based on evaluations from actual users who regularly use the tools. It is not theoretical; being chosen as a leader in the G2 Grid report (Network Monitoring) based on candid feedback from specific users is a great honor. This is the result of evaluations from 130 customers who use Progress's WhatsUp Gold. You can find more details in the related links below.
The core of multi-layered defense against cyber attacks! Introducing the role of NDR.
- filtering
Active Directory Monitoring: Reasons and Methods
Active Directory (AD), which is a crucial part of the network, can be considered a lifeline, especially in terms of user and ID management. Many companies position AD as a core directory service, enabling them to identify, track, and manage users and IT assets appropriately. All these IDs are stored in Active Directory, and IT assets are logged. Through this directory data, it is possible to identify breaches and abnormal behavior; however, if Active Directory is not monitored, malicious actors may go unnoticed when they begin to infiltrate the network. You can find more details in the related links below.
Prioritize important network traffic! Introducing case studies of the network traffic monitoring tool "Flowmon."
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.