List of filtering products
- classification:filtering
31~60 item / All 60 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Gain visibility into complex infrastructure! Introducing the case study of the network traffic monitoring tool "Flowmon."
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Enhancing incident response for large-scale networks with the introduction of the network traffic monitoring tool "Flowmon"! Case study of our product implementation.
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
We provide a safe work environment with "i-FILTER," which allows access only to secure websites.
- filtering
- Virus software
- Other security
Contributing to the improvement of the company's reliability! Integrating multiple different security features into a single hardware.
- Software (middle, driver, security, etc.)
- Other security
- filtering
Prevent the spread of malware infections and provide a safe and secure internal network environment!
- Software (middle, driver, security, etc.)
- Other security
- filtering
All-in-one necessary security measures! Comprehensive network security with high-performance UTM.
- filtering
- Virus software
- Firewall and intrusion prevention
Detect unknown malware that has bypassed traditional antivirus software and minimize damage to the greatest extent possible!
- filtering
- Virus software
- Firewall and intrusion prevention
Completely solving the three major issues faced by customers in the information systems departments of small and medium-sized organizations!
- filtering
- Virus software
- Firewall and intrusion prevention
We provide generous support when assistance is needed! In the event of a threat detection, we will promptly notify you via email.
- filtering
- Virus software
- Firewall and intrusion prevention
Blocking access to fraudulent sites is possible! You can easily achieve a safe and secure network environment.
- filtering
- Virus software
- Firewall and intrusion prevention
Peace of mind with security measures for both PCs and networks, including monitoring and operation!
- filtering
- Virus software
- Firewall and intrusion prevention
All-in-one security solution that integrates all features.
- filtering
- Firewall and intrusion prevention
- Encryption and authentication
Let's strengthen the company's information security measures by implementing UTM and firewalls.
- filtering
- Firewall and intrusion prevention
- Other PCs and OA equipment
Measures for proper device operation! Elimination of personal USB memory devices, etc. / Support for individual management of company USB memory devices.
- filtering
- Other security
Thorough measures against information leaks! Complete management of all removable media and device access.
- filtering
- Other security
Block targeted attack emails before they arrive! You can start using it shortly after the decision to implement it.
- filtering
[COMODO Product] Eliminate damage from unknown threats! "AutoContainment" technology with U.S. patent.
- Virus software
- filtering
- Other security
Shut out viruses and malware with a whitelist that has no loopholes!
- Other security
- filtering
Achieving the only "correct sanitization." Electronic file "sanitization and disinfection" solution. No. 1 in implementation results in local governments. Beware of similar products.
- filtering
- Firewall and intrusion prevention
- Other security
COMODO is a cloud-based solution that can be easily integrated into existing email infrastructure.
- Virus software
- filtering
- Other security
Cloud-based solution that blocks advanced threats such as endpoints from COMODO.
- Virus software
- filtering
- Other security
The administrator only makes decisions, while AIO automatically monitors, analyzes, and optimizes the network! It solves issues related to talent and skill shortages as well as management costs.
- VPN/Wide Area Ethernet
- Integrated operation management
- filtering
A mechanism that automatically handles the "etiquette" of sending emails. Automatic processing for preventing mis-sending and managing attachments. It realizes the efficiency of email operations.
- Other security
- Email/Fax transmission
- filtering
Bring the technology used by large corporations and government agencies in Japan to your business as well.
- Virus software
- Other security
- filtering
Achieving high reliability in security while keeping operational costs low.
- filtering
- Firewall and intrusion prevention
- Other security
Prohibit downloading/printing/screen capturing of content shared on the web system.
- Firewall and intrusion prevention
- filtering
- Other security
Harnessing the wisdom of the Warring States period for the power of control system defense.
- Other security
- filtering
Visualize dispersed information! A software solution for data leak prevention that enables automatic detection and protection of confidential data.
- filtering
- Encryption and authentication
- Other security
Next-generation "leadership-type" information leakage prevention solution
- filtering
- Encryption and authentication
- Other security
High performance and astonishingly low price! A spam filter that has established a new standard.
- filtering