List of Other security products

  • classification:Other security

766~810 item / All 1807 items

Displayed results

LED light and touch keypad! An IC card reader with high stability and energy efficiency.

  • Personal authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

It is a Lavish non-contact unlocking switch type remote control.

  • Other security
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
導入事例.jpg

Case studies available for viewing in photos! EPIC Smart Lock / Lavish Electric Lock

We are introducing examples of our products, such as the retrofittable smart lock brand 'EPIC' and the electric lock security system 'Lavish' that meets a wide range of needs, along with photos of their actual implementation. If you are considering installation or have concerns about security around your doors, please take a look and feel free to contact us. 【Past Installation Achievements】 Entrance auto locks, apartments, condominiums, single-family homes, offices, stores, kindergartens/nurseries, short-term rentals, hotels, rental conference rooms, storage rooms, warehouses, pharmaceutical storage, lockers. 【Unlocking Methods】 Face recognition, QR codes, barcodes, cards (FeliCa, MIFARE, EM, proprietary standards), API, PIN codes, fingerprints, remote controls, apps, buttons, intercoms, business phones. Please check the related links below. ▼

An integrated platform for conducting security testing of web applications.

  • Firewall and intrusion prevention
  • Other security
  • Other network tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Solve the challenges of human error in inventory and tool management! A management box for the manufacturing industry that controls tray opening and closing with barcode authentication.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Data erasure software to prevent information leakage from USB memory and external HDDs.

  • Data Erasing
  • Other security
  • Other PCs and OA equipment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We provide IT security services that contribute to risk avoidance!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We will develop a safety device that utilizes technology, not relying solely on human strength. Scheduled for sale in spring 2023.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A management box with casters that allows for tray opening and closing control through barcode authentication! It is useful for preventing ordering mistakes, inventory management, and as a picking sys...

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A smart padlock that can be opened with a smartphone app! Introducing a padlock system that supports your company's digital transformation (DX).

  • Other security
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

From diagnosis to countermeasures for the security environment! We provide total support for information security systems in the office.

  • Integrated operation management
  • Other security
  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

100% protection that does not rely on detection. Enterprise-level endpoint security! Thoroughly protect your PC from malware threats.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

"Network separation" enables work style transformation, BYOD, and telecommuting! It connects various communication methods and systems centered around people.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introducing an IP camera that complies with waterproof standard IP66! It features 360° continuous pan rotation.

  • Other security and surveillance systems
  • Other security
  • Surveillance Cameras

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What should we do against increasingly sophisticated cyber attacks? Introducing measures to prevent the spread of viruses!

  • Routers, Switches, and Hubs
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
2022-09-09_09h09_41.png

<Security Measures> Introducing measures to prevent the spread of viruses.

We are offering a document summarizing the security measures implemented by SubGate Co., Ltd. It includes "Things to Address in 2022," "Security Measures for 2022," and "Necessary Measures for Supply Chain Attack Prevention," among other virus prevention strategies. Our security switch, 'SubGate,' protects your network. [Offered Materials] ■ Things to Address in 2022 ■ Security Measures for 2022 ■ Necessary Measures for Supply Chain Attack Prevention ■ [Fear Newspaper] True Scary Stories, Episode 1 ■ [Fear Newspaper] True Scary Stories, Episode 2 *For more details, please refer to the related products and catalog, or feel free to contact us.

A security solution that enables intuitive network operations.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
2022-09-09_09h23_51.png

Security solution "SubGate"

"SubGate" is a network internal security solution that automatically detects and blocks security threats occurring within the network, enhancing the stability of network services and the convenience of operations. It protects the network with patented technology from Special Publication 2011-523822 "Access Level Security Device and Security System." The MDS engine analyzes traffic based on behavior and automatically detects and blocks harmful traffic without degrading switch performance. *For more details, please refer to related products and catalogs, or feel free to contact us.

We will introduce the key points of issues that require strengthened measures and security switches!

  • Routers, Switches, and Hubs
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
2022-09-09_09h16_28.png

Things to address in 2022

In preparation for the day when measures to prevent the spread of viruses become even more essential, we would like to introduce the actions to be taken in 2022. Key points for strengthening measures include the "amendment of the Personal Information Protection Law," the "amendment of the Electronic Bookkeeping Law," and "measures for telework PCs." Our security switch, 'SubGate,' allows for easy internal measures. It is suitable for preventing the spread of computer viruses, detecting and blocking harmful traffic, and preventing eavesdropping on internal IP phones and confidential data. *For more details, please refer to related products and catalogs, or feel free to contact us.

Supply chain attacks are on the rise! Real-time detection and prevention of the spread of worms, viruses, and more.

  • Routers, Switches, and Hubs
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
2022-09-09_09h26_23.png

What is necessary for countering supply chain attacks

There has been a rapid increase in supply chain attacks that target the group companies, contractors, and suppliers of a target, using them as a foothold to infiltrate the target company. Since it is difficult to penetrate large corporations with strong security measures, attackers often aim for smaller companies that have less comprehensive security measures. Therefore, we recommend 'SubGate' for supply chain attack countermeasures. *For more details, please refer to the related products and catalog, or feel free to contact us.

The fear of dangerous supply chain attacks! Use the ultimate technique of excellent behavior detection to contain the fierce attacks!

  • Routers, Switches, and Hubs
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
2022-09-09_09h31_06.png

Terrifying News: A Truly Scary Story - Episode 1

In the horror news, we introduce truly scary stories. The first story is about "The Fear of Dangerous Supply Chain Attacks." "There were attacks targeting the supply chains of major Japanese manufacturers," and "a subsidiary's subcontractor messed up," leading to damage that spread from subcontractors to subsidiaries and then to parent companies. In such times, the security switch 'SubGate' protects the network. With its excellent behavior detection capabilities, it can block harmful traffic, prevent the spread of viruses, and stop data theft. *For more details, please refer to related products and catalogs, or feel free to contact us.*

The damage that occurred just from bringing the telework PC back to the company! Containing the cluster with a special move!

  • Routers, Switches, and Hubs
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
2022-09-09_09h34_35.png

Terrifying News: A Truly Scary Story, Episode 2

In the horror news, we introduce truly scary stories. The second episode is about "Just bringing the telework PC back to the company...". There have been incidents such as "connecting the telework PC to the company's LAN," "the fear of home clusters," and "the emergence of corporate clusters from returned PCs." In such times, the security switch 'SubGate' protects the network. With its excellent behavior detection capabilities, it can block harmful traffic, prevent the spread of viruses, and stop data theft. *For more details, please refer to the related products and catalog, or feel free to contact us.

We are introducing how to prevent sophisticated cyber attacks and what should be done!

  • Routers, Switches, and Hubs
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
2022-09-09_09h15_05.png

[Data] Security Measures in 2022

This document introduces security measures for 2022 on how to address increasingly sophisticated cyber attacks such as EMOTET, ransomware, and supply chain attacks. It includes sections on "What is EMOTET," "Attack Methods," and "Examples of Attacks on Major Manufacturing Supply Chains." Additionally, it introduces 'SubGate,' which helps prevent the spread of viruses. Please make use of this information for your countermeasures. *For more details, please refer to related products and catalogs, or feel free to contact us.

Investigating major vulnerabilities that are easily exploited and have a significant impact!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Detection of attempts to misuse! Visualization of vulnerabilities in layers lower than the OS (i.e., firmware).

  • Software (middle, driver, security, etc.)
  • Server monitoring and network management tools
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Matrix Corporation (Chuo Ward, Osaka City) is pleased to announce that it has begun development of a safety device (tentative) to support the prevention of leaving passengers behind on buses.

  • Other security
  • Safety Sensors
  • Other safety equipment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Achieve strong two-factor authentication with simple operations! You can choose a product that suits your needs. *Free trial version available.

  • Other security
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We offer various training on security.

  • Other security
  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

For matters related to information security, please contact our company.

  • Other information systems
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cybersecurity tool that collects information from multiple sources.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Detects fire sources and notifies! Fire source detection cameras for reducing fire risk are now on sale!

  • Other security
  • Surveillance Camera System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introducing products suitable for environmental maintenance, visualization measures, security measures, and labor management!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Providing peace of mind to all businesses with security solutions recognized by the world!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Without using pattern files, it counteracts unknown ransomware with situational awareness technology, and also includes file backup and recovery features just in case!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

An OSINT tool with over 20 years of research experience and the world's largest database covering 97% of the internet.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Started selling in August 2022] Can be installed anywhere as long as there is SIM communication. In places where lines cannot be drawn, or where camera installation was previously given up.

  • Surveillance Cameras
  • Other security
  • Surveillance Camera System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
IPROS80249550175265915532.png

The solar panel-equipped IP camera "SolLa SLL-01LTE," which does not require a power supply, was featured in Yahoo! News!

Our new product, the solar panel-equipped IP camera "SolLa SLL-01LTE," which has been on sale since August 16, was featured in Yahoo! News on August 21 at 9:30. In the agricultural sector, where fruit theft is a growing concern, comprehensive theft prevention measures are being considered. As part of these measures, installing surveillance cameras not only helps prevent actual thefts but also promotes the image that "theft prevention is being thoroughly implemented" throughout the municipality, which is expected to deter crime. For more details, please check the "Related Links" and "Related Products" below. We also welcome any inquiries you may have!

It is a lavish wireless standalone reader.

  • Other security
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
導入事例.jpg

Case studies available for viewing in photos! EPIC Smart Lock / Lavish Electric Lock

We are introducing examples of our products, such as the retrofittable smart lock brand 'EPIC' and the electric lock security system 'Lavish' that meets a wide range of needs, along with photos of their actual implementation. If you are considering installation or have concerns about security around your doors, please take a look and feel free to contact us. 【Past Installation Achievements】 Entrance auto locks, apartments, condominiums, single-family homes, offices, stores, kindergartens/nurseries, short-term rentals, hotels, rental conference rooms, storage rooms, warehouses, pharmaceutical storage, lockers. 【Unlocking Methods】 Face recognition, QR codes, barcodes, cards (FeliCa, MIFARE, EM, proprietary standards), API, PIN codes, fingerprints, remote controls, apps, buttons, intercoms, business phones. Please check the related links below. ▼

Vehicle management using automated intelligent systems.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Entry model for small to medium-sized businesses.

  • Other security
  • cabinet
  • furniture

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

International Frontier Industry Messe 2023

Exhibition Scale Approximately 400 booths [2022 Results: 427 companies and organizations, 496 booths (including concurrent events)] Theme "Future Society Depicted by Technology" Special Exhibition "Innovation Creating the Future" Exhibition Content DX (ICT, Robotics), Health & Medical, Environment & Energy, Aerospace (including drones), Electrical & Electronics, Manufacturing, Lifestyle (food, housing, etc.), Regional Promotion & Local Industries, Group Exhibitions, Industry-Academia Collaboration & Support Organizations, etc. Organizer International Frontier Industry Expo Executive Committee (Hyogo Prefecture, Kobe City, (Public Interest Incorporated Foundation) New Industry Creation Research Organization, (Public Interest Incorporated Foundation) Hyogo Science and Technology Association, Kobe Chamber of Commerce and Industry, (Public Corporation) Hyogo Industrial Association, (Public Interest Incorporated Foundation) Hyogo Industrial Revitalization Center, Hyogo Prefectural Federation of Chambers of Commerce and Industry, Hyogo Prefectural Federation of Small Business Associations, Hyogo Prefectural Central Council of Small and Medium Enterprises, (Public Interest Incorporated Foundation) Hyogo Prefectural International Exchange Association, (Public Interest Incorporated Foundation) Kobe City Industry Promotion Foundation, (General Incorporated Foundation) Kobe Tourism Bureau, (Public Interest Incorporated Foundation) Hyogo Environmental Creation Association, Hyogo Eco-Town Promotion Council) [Secretariat: (Public Interest Incorporated Foundation) New Industry Creation Research Organization] Our Exhibition Content Introduction of Key Management Devices and Electronic Smart Lockers "Strictly managing important assets of companies and organizations unmanned" Key Management System and Locker Management System Traka

It is a locking type deadbolt lock that operates when powered. Since it is a surface-mounted type, it can also be retrofitted.

  • Other security
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Beware of ransomware! Information on security measures and the necessity of backups is provided.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is the current state of security surrounding medical institutions and what are the solutions? Explained in a blog!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A communication monitor solution that allows for easy diagnostics anywhere!

  • Testing Equipment and Devices
  • Other security
  • Communications

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

You can easily install a network camera "anywhere" just by attaching it to a light bulb socket! Made in Japan for your peace of mind!

  • Other security
  • Color camera
  • Surveillance Cameras

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The latest facial recognition device RESR-LF4. It is equipped with facial recognition and mask detection functions. Settings can be configured to allow authentication only when a mask is worn.

  • Other security
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
RESR-LF5_カタログ-1.jpg

■ Version with temperature measurement available 【Mask detection | Japanese voice】■ Information about the facial recognition device RESR-LF5 / RESR-LF5T

We are pleased to announce the new facial recognition readers "RESR-LF5" and "RESR-LF5T" from the electric lock brand Lavish. ★ Authentication is possible just by displaying the face on the screen ★ Facial recognition rate of 99.8% *measured value ★ 5-inch LCD screen ★ Drip-proof design (requires caulking) ★ Compatible with IC cards! ★ Supported card standards: Product model number ending in FM…MIFARE Classic, FeliCa ★ Supported card standards: Product model number ending in ME…MIFARE Classic, EM ★ Unlocking possible with facial recognition! ★ Unlocking possible with a PIN code!! ★ Unlocking possible with an IC card!!! ★ History can include up to 24,000 entries, including facial photos ★ Up to 1,000 people can be registered! ★ Guidance in Japanese voice ★ Mask detection feature included; it is possible to prevent authentication of individuals not wearing masks ★ LAN connection allows for various settings to be made from a PC browser ★ Touch panel operation allows for various settings to be made directly from the device ★ Non-contact authentication is hygienic ★ In the version with temperature measurement, body temperature is displayed on the screen when the face is shown! This facial recognition device changes the conventional concept of facial recognition. Please check the details in the various materials.

Filter

classification
Delivery Time
Location