List of Other security products
- classification:Other security
496~540 item / All 1824 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Over 1,600 high-quality diagnoses annually! Re-diagnosis is possible as many times as needed with one year of after-support.
- Other security
AI technology to detect zero-day attacks! Conducting inspections through a unique four-phase process.
- Other security
Why we are promoting DX! An explanation of the risks of not promoting it and key points for success.
- Other services
- Other security
Protect your information assets from the latest threats. UTM for small businesses.
- Other security
Drip-proof mechanism (equivalent to IPX5), slim (13mm) surface-mounted ◎ Can be installed in various locations, both outdoors and indoors.
- Other security
- Entrance and exit control system
To set an appropriate password! An explanation of weak passwords and attack methods.
- Encryption and authentication
- Other security
Explaining examples of dangerous passwords and methods to prevent unauthorized access by third parties!
- Encryption and authentication
- Other security
The reality of password management in companies! A column explaining the measures that should be taken.
- Other security
- Integrated operation management
- Encryption and authentication
A detailed explanation of the importance and key points of password management in a column!
- Other security
- Integrated operation management
- Encryption and authentication
Explaining safe password management methods! Also introducing recommended password management tools.
- Other security
- Integrated operation management
- Encryption and authentication
Introduction to the necessity of access control, its basic functions, and types of control methods!
- Encryption and authentication
- Other security
Explaining the causes of damage, examples of damage, and the measures taken by users and companies!
- Other security
An overview and explanation of single sign-on features! We are comparing major tools.
- Encryption and authentication
- Personal authentication
- Other security
Introducing the cloud-based and on-premises types! Also explaining the main features and how to choose.
- Encryption and authentication
- Personal authentication
- Other security
Explaining the differences between IdP and SP, the flow of the authentication process, and the benefits of IdP!
- Encryption and authentication
- Other security
An introduction to IDaaS, including an explanation of what it is and why it has gained attention!
- Integrated operation management
- Other security
Comparison of recommended IDaaS products! An overview of IDaaS, its benefits, and how to choose, explained in a column.
- Integrated operation management
- Other security
The difference between "SSO" and "IDaaS"! Introducing the benefits of implementation and recommended services.
- Other security
- Integrated operation management
Evaluate the security of networks and systems! Discover vulnerabilities and simulate attacks.
- Software (middle, driver, security, etc.)
- Other security
Cloud-based IT asset management and information leak prevention. It's easy to start managing work hours and laptops taken home for telework.
- Other security
Electronic watermarking can embed information in data that is not discernible to the human eye. It is effective for copyright protection of images, preventing leaks, and image management!
- Other security
Dedicated staff for phone and email support! Both management and user functions are well-equipped.
- Other security
- Integrated operation management
Warp to the site from wherever you are at any time! Improve your work efficiency too!
- Other security and surveillance systems
- Other security
Encryption measures for data exchange between general-purpose machines, UNIX, and WinglayS!
- Other security
Leave the file security of in-house servers and PCs to this one solution!
- Other security
Providing a reliable backup system for business scenarios that require robustness.
- Other security
"Temporary use" is possible! Lightweight and compact portable gate.
- Other security
Multi-zone compatible metal detector that reliably detects metal! A stylish metal detector that harmonizes with buildings.
- Other security
Ideal for installation in narrow spaces and for use as security zoning gates within rooms!
- Other security
Introducing a water-tight door that can be operated quickly and accurately during flooding! It boasts high precision.
- Other security
A clear casing that ensures visibility. Smart high security for various locations.
- Other security
Simultaneously achieve strict management and efficiency of important key management! Cloud key management system provided by Kumahira *Physical showroom available.
- Other security
Announcement of Participation in Back Office DXPO Tokyo '24 [Summer]
We will be exhibiting SPLATS at the Kumahira booth during the "Back Office DXPO Tokyo '24 [Summer]" event, which will be held for two days from July 23 (Tuesday) to July 24 (Wednesday) at Tokyo Big Sight, West Exhibition Hall 1 and 2. The "Back Office DXPO Tokyo '24 [Summer]" is an exhibition aimed at improving operational efficiency and promoting DX in management departments. ▽ Exhibited Products At our booth, we will introduce the cloud-based entry and exit management service "SPLATS PASS," the cloud key management service "SPLATS KEY" (key boxes and individual key boxes), as well as various integration services (attendance management system "KING OF TIME," reception system "RECEPTIONIST," cloud HR and labor software "SmartHR," and commercial cloud-based alcohol checker "Alkiller NEX"). We understand you may be busy, but we would be delighted to welcome you to our booth during your visit.
A lineup of various products including Babel Obfuscator Enterprise!
- Software (middle, driver, security, etc.)
- Encryption and authentication
- Other security
Would you like to introduce a genuine smart lock at an overwhelming low cost? [Flassa 1J Subscription]
- Other security
Perfect for rental management! Upgraded Flassa 1J
【Main New Features】 ◆ Occupied/Vacant Mode By switching modes, it prevents unauthorized entry during occupancy by management company staff and simplifies the response to cleaning contractors when the unit is vacant. 【Occupied Mode】 During occupancy, only the user can unlock the door. Administrators cannot unlock it. When switching back to vacant mode upon leaving, unlocking and viewing history in the app can be done using the administrator information registered before occupancy. 【Vacant Mode】 Administrators can also unlock the door. *User information will be deleted when switching modes. ◆ Initialization Card *Shipping Option The initialization can be performed from outside using the initialization card without using the highest administrator PIN. It can also be initialized from the outside even when transferring the highest administrator privileges to a user. In addition to the above, convenient features have been added! 【Basic Information】 ■ Unlock Methods: Fingerprint, PIN, Card, App, Remote Control (sold separately) ■ Compatible Cards: Transportation IC Cards, Mobile Wallet, Smartphone NFC, FeliCa(R), MIFARE(R) For more product details, please check the 'Flassa 1J Product Page' in the related links.
Providing affordable malicious ransomware countermeasures targeting small and medium-sized enterprises and hospitals.
- Other security
"CrackProof," a security product that protects CAD/CAM/CAE from unauthorized attacks.
- Other security
Product Information Update: What Security Measures Are Necessary for CAD/CAM/CAE Software?
We have updated the product information. We provided an explanation of security measures for CAD/CAM/CAE software for companies that develop and sell these products. Please take a look.
To all the members of the information systems department in the automotive industry who are facing security threats all alone!
- Firewall and intrusion prevention
- Other security
We provide visualization and optimization support for comfortable use of Wi-Fi environments, as well as prevention of information leaks due to unauthorized use and cyber attacks.
- Other security
WiSAS 4th Anniversary Project: Recruitment of Monitor Companies for Wi-Fi Vulnerability Diagnosis Service (Limited to 3 Companies)
Spline Network Inc. (Headquarters: Shibuya, Tokyo; CEO: Yoichi Yukino) is recruiting monitor companies starting from March 15, 2024, to offer a free trial of its WiSAS vulnerability assessment service, in celebration of the 4th anniversary of its cloud-based Wi-Fi security solution "Wi-Fi Security Assurance Series" (hereinafter referred to as WiSAS), which the company plans and sells as a measure against information leakage in the Wi-Fi domain.
Notice of participation in the 'Rental Housing Fair 2024' from August 6 (Tuesday) to August 7 (Wednesday), 2024.
Enspiration Inc. (EPIC/Lavish/Guub) will be exhibiting at the "Rental Housing Fair 2024" held at Tokyo Big Sight from August 6 (Tuesday) to August 7 (Wednesday), 2024. We will showcase new products such as Japan's first battery-operated facial recognition smart lock and QR code readers, so please feel free to stop by if you have time.
Explaining the risks of cyber attacks and the importance of security measures for IoT gateways.
- Other security
A mail archiving and auditing solution with numerous large-scale user achievements that can handle everything from regular email audits to e-discovery requirements.
- Other security
For those utilizing apps in the manufacturing industry and wanting to know the measures to take before distribution, we will explain knowledge related to app security.
- Other security
It is possible to conduct security evaluations in accordance with ISO/SAE 2143.
- Other security
It is a security service equipped with ID management and authentication functions to protect information assets.
- Other security