List of filtering products
- classification:filtering
1~45 item / All 54 items
Analysis and debugging tools for network administrators! 【Manufactured by Allegro】
- filtering

We will be exhibiting at Inter BEE 2024.
We will be exhibiting at Inter BEE 2024, which will be held at Makuhari Messe from November 13 (Wednesday) to November 15 (Friday). We will showcase IP packet analysis devices and IP traffic emulators necessary for the IP transformation of broadcasting. Please be sure to stop by our exhibition booth.
Utilizing action analysis algorithms to detect anomalies hidden within network traffic and identify signs of malicious behavior or breaches!
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Standalone appliance! Available as hardware or virtual.
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
The generated flow statistics are analyzed in detail! Introducing products that can also be used in virtual environments.
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
The core of multi-layered defense against cyber attacks! Introducing the role of NDR.
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Prioritize important network traffic! Introducing case studies of the network traffic monitoring tool "Flowmon."
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Providing clients with robust security solutions! Publicizing case studies on countermeasures against cyber attacks.
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
IaaS provisioning through network traffic monitoring! Case studies on countermeasures against cyber attacks are now available.
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
A case study on countermeasures against cyber attacks that enables behavior detection even on shared servers has been released!
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
A case study of cyber attack countermeasures that easily visualizes the communication status of multiple securities systems has been released!
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
No limit on the number of applications! HTTPS traffic can be monitored under specific conditions.
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Introducing products that allow for cause analysis when specific troubleshooting is needed!
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
There are six recommended selection points to consider! We will introduce the differences between our NDR system and those of other companies.
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Evolving Cyber Attacks! An Introduction to Challenges and Attempts in Business
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Optimal Solution Selection! Best Practices and Guidelines for Strengthening Security
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Prepare for attacks! Solutions to help build robust cybersecurity.
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Reconsider the old approach and break free from it! Provide scalability in preparation for the future.
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
We have released a case study on measures against cyber attacks that instantly visualized the traffic of the group company network through flow analysis!
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
We have published a case study on measures against cyber attacks, where we built a network visualization system and established a rapid incident response framework!
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
We have published a case study on measures against cyber attacks that achieved full traffic visualization and advanced analysis!
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Responding through "flow analysis" is becoming important! It reduces both time and costs.
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
The number of ransom demands and suspension of medical services due to ransomware infections is increasing. As IT advances, the risks also grow. Don't forget to implement effective intrusion preventio...
- Firewall and intrusion prevention
- filtering
- Other security
Gain visibility into complex infrastructure! Introducing the case study of the network traffic monitoring tool "Flowmon."
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Enhancing incident response for large-scale networks with the introduction of the network traffic monitoring tool "Flowmon"! Case study of our product implementation.
- filtering

Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
We provide a safe work environment with "i-FILTER," which allows access only to secure websites.
- filtering
- Virus software
- Other security
Contributing to the improvement of the company's reliability! Integrating multiple different security features into a single hardware.
- Software (middle, driver, security, etc.)
- Other security
- filtering
Prevent the spread of malware infections and provide a safe and secure internal network environment!
- Software (middle, driver, security, etc.)
- Other security
- filtering
All-in-one necessary security measures! Comprehensive network security with high-performance UTM.
- filtering
- Virus software
- Firewall and intrusion prevention
Detect unknown malware that has bypassed traditional antivirus software and minimize damage to the greatest extent possible!
- filtering
- Virus software
- Firewall and intrusion prevention
Completely solving the three major issues faced by customers in the information systems departments of small and medium-sized organizations!
- filtering
- Virus software
- Firewall and intrusion prevention
We provide generous support when assistance is needed! In the event of a threat detection, we will promptly notify you via email.
- filtering
- Virus software
- Firewall and intrusion prevention
Blocking access to fraudulent sites is possible! You can easily achieve a safe and secure network environment.
- filtering
- Virus software
- Firewall and intrusion prevention
Peace of mind with security measures for both PCs and networks, including monitoring and operation!
- filtering
- Virus software
- Firewall and intrusion prevention
All-in-one security solution that integrates all features.
- filtering
- Firewall and intrusion prevention
- Encryption and authentication
Let's strengthen the company's information security measures by implementing UTM and firewalls.
- filtering
- Firewall and intrusion prevention
- Other PCs and OA equipment
Measures for proper device operation! Elimination of personal USB memory devices, etc. / Support for individual management of company USB memory devices.
- filtering
- Other security
Thorough measures against information leaks! Complete management of all removable media and device access.
- filtering
- Other security
Block targeted attack emails before they arrive! You can start using it shortly after the decision to implement it.
- filtering
[COMODO Product] Eliminate damage from unknown threats! "AutoContainment" technology with U.S. patent.
- Virus software
- filtering
- Other security
Shut out viruses and malware with a whitelist that has no loopholes!
- Other security
- filtering
Achieving the only "correct sanitization." Electronic file "sanitization and disinfection" solution. No. 1 in implementation results in local governments. Beware of similar products.
- filtering
- Firewall and intrusion prevention
- Other security
COMODO is a cloud-based solution that can be easily integrated into existing email infrastructure.
- Virus software
- filtering
- Other security
Cloud-based solution that blocks advanced threats such as endpoints from COMODO.
- Virus software
- filtering
- Other security