List of Other security products
- classification:Other security
541~585 item / All 1824 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
We will explain methods and tips for those who find order management difficult!
- Other security
- Other information systems
- Other network tools
Web authentication system using USB keys. Effective security measures. Strong security is possible with one-time passwords.
- Personal authentication
- Other security
High-quality standard-compliant smart card token "LOCK STAR-uToken"
- Personal authentication
- Encryption and authentication
- Other security
Combine tape libraries with built-in off-network secure vaults!
- Virus software
- Other security
[Essential for those considering or gathering information] Have you found the best selection that suits your company? An explanation of how to choose the optimal facial recognition system!
- Other security and surveillance systems
- Other security
- Entrance and exit control system
[A must-see for those considering or gathering information] We will explain the features of thermal cameras and how to utilize them!
- Surveillance Cameras
- Other security
We will act on your behalf to continuously monitor for information leaks on the Dark Web! Unlike one-time investigations from other services, we will keep monitoring the Dark Web at all times.
- Other security
What risks are associated with the use of apps in the manufacturing industry? What security measures are necessary? We will explain app security-related knowledge in an easy-to-understand manner.
- Other security
The long-awaited new model "Novel" has been born in the VingCard series of card locks, which have been implemented in over 8 million rooms worldwide!
- Entrance and exit control system
- Encryption and authentication
- Other security
Introducing the latest model of the VingCard series, "Novel"!
It goes without saying that the VingCard non-contact card lock "Novel" combines the latest security technology with usability and will become the representative model of next-generation card locks for accommodation facilities. Novel captivates guests and hoteliers as a modern, beautiful, and powerful electronic card lock. Mobile access, online integration, and Apple Wallet can also be added quickly when needed. Additionally, Novel is fully committed to environmental protection through the use of sustainable raw materials, lightweight product design, minimized packaging volume, and battery-free options.
No power or network environment required! Easy to install! Wireless compact fixed lens outdoor camera with 4G LTE solar panel.
- Other security
Calico Open Source (Kubernetes CNI Plugin) Security Upgrade
- Other security
Cloud-based Matrix USB key. It can be operated like a physical dongle via API.
- Other security
Prevent worker mistakes and improve operational efficiency with barcode and QR code authentication! Operate with inventory management shelves that maintain the existing box sizes and arrangements!
- Other security
"Over 600 camera design achievements" We select manufacturers and cameras tailored to the installation location and purpose, implementing more effective camera designs.
- Other security
- Color camera
- others
Addressing new needs! Security has become an indispensable element among customer challenges.
- Other security
In-house diagnosis of a vast number of websites! Achieving cost reduction and increased scope and frequency of diagnosis.
- Other security
Easy to use and multifunctional for peace of mind! Protecting grandpa and grandma from scam calls and solicitation calls.
- Other security
- Other PCs and OA equipment
More advanced, more convenient! Products of professional quality recognized by security experts.
- Other security
Support for the construction of small to medium-sized system infrastructure.
- server
- Storage Backup
- Other security
The world's first explosion-proof smartwatch that has passed domestic explosion-proof certification, obtained international explosion-proof standards (IECEx), and can be used in Class 1 hazardous loca...
- Other safety and hygiene products
- others
- Other security
It is a USB card reader compatible with FeliCa/MIFARE standards.
- Other security
- Entrance and exit control system
Easy to install! Nighttime, always-on type. It can be used with solar power in places where power cannot be obtained or during disasters (can be mounted on existing poles or placed directly).
- Other security
A security camera that can be installed by simply sticking or placing it, allowing you to take pictures from indoors through the window.
- Other security and surveillance systems
- Other security
- Other office supplies
Solar charging and a motion sensor-equipped LED light serve as both a dummy security camera and nighttime lighting.
- Other security
- Other security and surveillance systems
- Surveillance Cameras
Drip-proof mechanism (equivalent to IPX5), slim (13mm) surface-mounted design ◎ Random 10-key display with 7-segment notation.
- Other security
- Entrance and exit control system
Unexpected, yet assured peace of mind. Proven implementation in various industries across the country.
- Other security
It is possible to achieve both safety and convenience! It helps prevent loss and theft, as well as counterfeiting and impersonation. [Free materials available!]
- Other security
An alarm of 90 decibels will sound when the magnetic sensor and the main unit are separated.
- Other security
- Other office supplies
- others
Two tools collaborate! An integrated service for cybersecurity measures and support for work style reform.
- Virus software
- Firewall and intrusion prevention
- Other security
Visualize internal risks and challenges! It is important to raise each individual's security awareness.
- Other security
- Email/Fax transmission
A third-generation antivirus software that utilizes deep learning for cyber attack prevention.
- Virus software
- Firewall and intrusion prevention
- Other security
High-security system achieved at low cost.
- Other security
This is a digital locker lock ideal for delivery boxes. It uses a passcode for locking and unlocking.
- Other security
It is possible to set location restrictions that can be opened individually or by group even without an IC card! It is also suitable for storing important documents such as My Number!
- Other security
This is Lavish's new card reader that can be customized for free.
- Other security
- Entrance and exit control system
It is a card reader with a dedicated specification.
- Other security
- Entrance and exit control system
Explosion-proof network IP camera that has passed domestic explosion-proof certification, obtained international explosion-proof standard (IECEx), and can be used in Class 1 hazardous locations (Zone ...
- Other network tools
- Surveillance Cameras
- Other security
We will introduce the benefits of implementing CrackProof and its background.
- Other security
[Product Information Update] Reasons Why CrackProof is Chosen for App Security Measures
We have updated the product information. While introducing the points that have received high praise from our customers, we explained the benefits of implementing CrackProof and the background behind it. Please take a look.
Four different encryption algorithms are supported, including RC4, AES-128 in OFB mode, and AES-128 in CCM mode.
- Other security
We provide a safe business environment with "m-FILTER," which only receives secure emails.
- Email/Fax transmission
- Other security
We provide a safe work environment with "i-FILTER," which allows access only to secure websites.
- filtering
- Virus software
- Other security
Before Windows apps are affected, various protective features are added to prevent attacks and strengthen security!
- Other security
Before iOS apps are affected, various protective features are added to prevent attacks and strengthen security!
- Other security