List of Virus software products
- classification:Virus software
31~60 item / All 71 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
We provide services for responding to ransomware infections, including incident response and breach diagnosis investigation services. We also handle responses for overseas locations and in short timef...
- Other security
- Virus software
Many companies implement "obfuscation" as a method of app protection. Can we say that obfuscation alone is sufficient for app security measures?
- Other security
- Virus software
【Product Information Update】For attacks that cannot be prevented by obfuscation alone! App protection tool CrackProof.
We have updated the product information. One of the security measures applied to apps is "obfuscation." In the manufacturing industry, some companies are implementing it as a method of app protection. However, is obfuscation alone sufficient for app security measures? We would like to introduce our security tool, CrackProof, which protects apps from attacks that cannot be fully defended against by obfuscation alone, providing multi-faceted protection. If you are concerned about security measures for your app, including obfuscation, please take a look.
To ensure that "it's already too late by the time you realize it!" is definitely prevented! We will significantly reduce operational burdens and operational costs.
- Virus software
Campaign extension decided! Until December 31, 2022. Strong support for vulnerability assessments and incident response training! Take advantage of this special package to combat increasingly malicious cyber attacks.
Allied Telesis, Inc. (Headquarters: Shinagawa-ku, Tokyo; Chairman: Akira Oshima) announces the extension of its ongoing "Pentest Campaign," which targets web server diagnostic services and phishing email training services, until December 31, 2022 (for orders received). As digital transformation (DX) progresses across various markets, cyberattacks such as "targeted attacks" primarily using email and "website tampering" exploiting network vulnerabilities are becoming increasingly malicious, and the expansion of their damage has become a global issue. In the event of an attack, not only could business and services be halted, but there is also the potential for significant damage that threatens business continuity due to the leakage of confidential information and loss of trust. To protect organizations from these threats, it is essential to conduct vulnerability assessments to prevent damage in advance, improve employees' security literacy through training, and provide incident response education to appropriately handle emergencies. *For more details, please refer to the PDF materials or related links.*
Defense against malware, blocking suspicious communications and information leaks! We assist in implementing multi-layered defense!
- Firewall and intrusion prevention
- Virus software
- Desktop PC
All-in-one necessary security measures! Comprehensive network security with high-performance UTM.
- filtering
- Virus software
- Firewall and intrusion prevention
Detect unknown malware that has bypassed traditional antivirus software and minimize damage to the greatest extent possible!
- filtering
- Virus software
- Firewall and intrusion prevention
[Information Leakage Countermeasures] The rapid increase in online file transfers. Learn about the risks involved and solutions from usage examples!
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Completely solving the three major issues faced by customers in the information systems departments of small and medium-sized organizations!
- filtering
- Virus software
- Firewall and intrusion prevention
We provide generous support when assistance is needed! In the event of a threat detection, we will promptly notify you via email.
- filtering
- Virus software
- Firewall and intrusion prevention
Blocking access to fraudulent sites is possible! You can easily achieve a safe and secure network environment.
- filtering
- Virus software
- Firewall and intrusion prevention
Peace of mind with security measures for both PCs and networks, including monitoring and operation!
- filtering
- Virus software
- Firewall and intrusion prevention
Security Software Measures in 5 Minutes: A Simple Explanation of McAfee and Acronis Blacklists and Whitelists!
- Software (middle, driver, security, etc.)
- Virus software
- Other embedded systems (software and hardware)
Abolishing the mailing of USB memory! Introducing a case that achieves safe and speedy delivery (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Achieving a speedup in business operations! Introducing a case study that significantly reduced the production time for design (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Introducing a case study that achieved enhanced security and single sign-on with the internal information infrastructure! (Crypto Delivery)
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Send all documents encrypted with TLS! A case study of achieving secure file transfer (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Achieve minimization of information risk due to misdelivery by utilizing a closed transmission function for the transfer of personal information of insurance subscribers (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Secure transfer of personal information and automation of file sending and receiving! Achieving significant cost reduction and improving operational efficiency (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
A complete abolition of the transfer of personal information using physical media such as CD-ROMs and USB drives! Significantly reduce the risk of leaks and the burden of media management!
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
[eBook] Collect My Number Safely and Efficiently! What are the Methods for Corporations to Transfer My Number?
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Security services for working with peace of mind.
- Virus software
- Firewall and intrusion prevention
[COMODO Product] Eliminate damage from unknown threats! "AutoContainment" technology with U.S. patent.
- Virus software
- filtering
- Other security
COMODO is a cloud-based solution that can be easily integrated into existing email infrastructure.
- Virus software
- filtering
- Other security
Cloud-based solution that blocks advanced threats such as endpoints from COMODO.
- Virus software
- filtering
- Other security
You can quickly, easily, and reliably create a management environment for "FFRI yarai"! The hassle of setting up a management server is eliminated.
- Virus software
- Firewall and intrusion prevention
- Other information systems
Thoroughly guard against threats from information leaks and external viruses! We also provide support for maintenance and management after implementation via phone and remote assistance.
- Virus software
- Other security
- Other services
Files after harmless processing can also support supervisor approval operations! Introduction of an appliance server equipped with a web adapter.
- Virus software
- Firewall and intrusion prevention
- Data Erasing
Achieve short-term implementation! Introduction of the electronic file "Decontamination and Disinfection" solution.
- Virus software
- Firewall and intrusion prevention
- Data Erasing
Bring the technology used by large corporations and government agencies in Japan to your business as well.
- Virus software
- Other security
- filtering
Centralized management of endpoint security for all hosts within the corporate network.
- Virus software