List of filtering products
- classification:filtering
1~15 item / All 61 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
Prevent unknown malware from executing. Whitelist-type security 'SecNucleus WhiteEgret' optimized for embedded Linux.
- Software (middle, driver, security, etc.)
- Virus software
- filtering
Invitation to Exhibit at the '2026 YOKOHAMA Automotive Technology Exhibition'
We are pleased to announce that we will be exhibiting at the "Automotive Technology Exhibition 2026 YOKOHAMA," which will be held at Pacifico Yokohama from May 27 (Wednesday) to May 29 (Friday), 2026. We invite you to visit us during this opportunity. < Exhibition Overview > Name: Automotive Technology Exhibition 2026 YOKOHAMA Dates: May 27 (Wednesday) to May 29 (Friday), 2026, 10:00 AM - 5:00 PM Venue: Pacifico Yokohama Exhibition Hall, Booth Number 193 Registration: [Free] Pre-registration required (you can register from the related link) < Exhibited Products > ■ Self-Localization / SLAM Solutions This technology allows mobile entities such as AGVs to map their surrounding environment while moving and estimate their own position. It observes surrounding features, estimates its own position based on that information, and simultaneously generates an environmental map. ■ Integrated Security for Automobiles Protecting from Finished Vehicles to Manufacturing Processes An integrated security solution that covers everything from finished vehicles to the automotive manufacturing process. It protects both in-vehicle and manufacturing environments with whitelist-based defense, quantum-resistant encryption, and licensing.
Is there no risk of backup storage data leaking? It's also important to have a system in place that prevents data from being stolen.
- Firewall and intrusion prevention
- Other security
- filtering
Remote maintenance of the system is necessary, but it also becomes a "gateway" for ransomware attacks... a new idea to physically seal it off.
- Firewall and intrusion prevention
- Other network tools
- filtering
Business owners have a headache. Securing the supply chain can be enhanced even with different levels of partners using OWC's secure link for file security.
- Firewall and intrusion prevention
- Other information systems
- filtering
Damage from ransomware infections is further increasing. A slight improvement in convenience can lead to unexpected risks. Let's be mindful of implementing multilayered intrusion and information leaka...
- Firewall and intrusion prevention
- filtering
- Other security
The intrusion of information-gathering malware cannot be completely prevented. Let's effectively use data diodes (OWCD) as a communication restriction to protect ourselves from theft and encryption.
- Firewall and intrusion prevention
- Other security
- filtering
Is your company's OT network secure? Reading this will give you the basics of security measures! Case studies are also available.
- filtering
Are you ready to respond to the evolving industrial network? We are offering a guidebook on network building and 8 related materials!
- filtering
Analysis and debugging tools for network administrators! 【Manufactured by Allegro】
- filtering
We will be exhibiting at Inter BEE 2024.
We will be exhibiting at Inter BEE 2024, which will be held at Makuhari Messe from November 13 (Wednesday) to November 15 (Friday). We will showcase IP packet analysis devices and IP traffic emulators necessary for the IP transformation of broadcasting. Please be sure to stop by our exhibition booth.
Utilizing action analysis algorithms to detect anomalies hidden within network traffic and identify signs of malicious behavior or breaches!
- filtering
How far have hospitals progressed in their ransomware countermeasures? - Progress Software conducts a reality survey.
Due to a series of ransomware attacks targeting hospitals, there has been a growing interest in cybersecurity among medical institutions. For example, in October 2022, a ransomware attack on a hospital in Osaka rendered electronic medical records unusable, halting outpatient services and taking two months to restore the system using backup data. Given the detailed reports of the serious damage, many inquiries have been received by the agencies (SIers) handling "Flowmon ADS," a ransomware countermeasure solution offered by Progress Software. You can find more details in the related links below.
Standalone appliance! Available as hardware or virtual.
- filtering
Seven Ways to Keep Business Files Safe and Protect Data
In December of last year, the systems of a third-party vendor for Uber Technologies Inc. were attacked by hackers, resulting in a data breach. Details of 77,000 Uber employees were leaked and put at risk. For a company to continuously operate its business, it is necessary to securely retain and transfer electronic files that often contain various confidential information. If a corporate culture exists that does not prioritize the protection of confidential data and tends to postpone it, it cannot avoid cybersecurity incidents. Gartner predicts that cyberattacks related to third parties will continue to increase beyond 2023. You can find more details in the related links below.
The generated flow statistics are analyzed in detail! Introducing products that can also be used in virtual environments.
- filtering
How far have hospitals progressed in their ransomware countermeasures? - Progress Software conducts a reality survey.
Due to a series of ransomware attacks targeting hospitals, there has been a growing interest in cybersecurity among medical institutions. For example, in October 2022, a ransomware attack on a hospital in Osaka rendered electronic medical records unusable, halting outpatient services and taking two months to restore the system using backup data. Given the detailed reports of the serious damage, many inquiries have been received by the agencies (SIers) handling "Flowmon ADS," a ransomware countermeasure solution offered by Progress Software. You can find more details in the related links below.
The core of multi-layered defense against cyber attacks! Introducing the role of NDR.
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.