List of Firewall and intrusion prevention products
- classification:Firewall and intrusion prevention
91~105 item / All 184 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
A detailed ranking of 7 industrial firewall providers is published.
- Firewall and intrusion prevention
Simply connect the sensor to the existing LAN for easy installation! It can also be used in a wireless LAN environment.
- Firewall and intrusion prevention
Providing measures against unauthorized connections in the cloud! Reducing implementation costs for efficient service utilization.
- Firewall and intrusion prevention
Leave complex operations to us / Domestic EDR developed in-house + monitoring operation service (MDR) for isolation response included.
- Firewall and intrusion prevention
Explaining examples of "supply chain attacks" lurking in the manufacturing industry and the necessity of security measures. Including the case of Volkswagen! A guidebook is being offered!
- Firewall and intrusion prevention
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Possessing achievements and experience/skills in the international market! Responding immediately to unknown threats, detecting zero-day attacks, and proactively defending.
- Firewall and intrusion prevention
Supporting safe business operations! A specialized team provides centralized monitoring of all networks.
- Other services
- Firewall and intrusion prevention
[Introduced in a comic] What is the best protective frame for renovation work in family apartments?
- others
- Firewall and intrusion prevention
We protect companies' websites from the risks of information leaks and tampering with industry-leading cutting-edge technology.
- Firewall and intrusion prevention
To all the members of the information systems department in the automotive industry who are facing security threats all alone!
- Firewall and intrusion prevention
- Other security
Virtual function-equipped SSL-VPN remote access solution
- Firewall and intrusion prevention
- Encryption and authentication
- Personal authentication
Ideal for BYOD, no dedicated app required, prevents information leakage from smart devices.
Logical Tech Co., Ltd. will start selling its information leakage prevention system "LOCK STAR-SGateM" (Lock Star SGateM), which uses a screen transfer method and is compatible with any terminal and OS, from March 4, 2013. "LOCK STAR-SGateM" is a screen transfer-based security solution built on a Linux server. This solution operates on browsers that support HTML5, eliminating the need for dedicated applications. Additionally, by utilizing free OS, it allows companies to save on the substantial costs associated with licensing fees. Furthermore, by integrating with the currently available integrated security system LOCK STAR-SGate series, it can accommodate various usage scenarios tailored to corporate needs. Groupware such as Notes, which was previously only usable on PCs, can now be used directly on smartphones and tablets (iPhone, iPad, Android devices) without leaving any data on the device, making it easy and cost-effective, thus providing an optimal environment for BYOD (Bring Your Own Device) utilization.
Avoiding risks through training for highly sophisticated "targeted attack emails."
- Firewall and intrusion prevention
Two tools collaborate! An integrated service for cybersecurity measures and support for work style reform.
- Virus software
- Firewall and intrusion prevention
- Other security
A third-generation antivirus software that utilizes deep learning for cyber attack prevention.
- Virus software
- Firewall and intrusion prevention
- Other security
CIVAMS for video analysis, including facial recognition, access control, attendance management, vehicle management, and suspicious person detection.
- Entrance and exit control system
- Personal authentication
- Firewall and intrusion prevention