List of Other security products
- classification:Other security
901~945 item / All 1825 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Achieving SASE (Secure Access Service Edge) that simply integrates SD-WAN and network security!
- VPN/Wide Area Ethernet
- Firewall and intrusion prevention
- Other security
We provide custom-made web systems and websites tailored to our customers!
- Other information systems
- Other security
- Other server related
Break away from the state of managing only with ID and password, and achieve detailed permission management!
- Other security
- Other information systems
Suitable for tracking many non-powered assets such as valuables, wire reels, tools, and construction machinery.
- Other security
- Communications
Email distribution to the registered guardians' addresses! It also includes a mass email distribution feature for guardians and staff.
- Software (middle, driver, security, etc.)
- Other security
- Entrance and exit control system
Centralized management of Forescout deployment across the entire extended enterprise!
- Other security
We will enhance threat response capabilities across the entire enterprise!
- Other security
We will confidently design, build, and deploy large-scale network segmentation!
- Other security
Implement policy-based controls and automate! Respond quickly to incidents.
- Other security
You can gain our unique insights into the overall picture of the device without interrupting business processes!
- Other security
Use commercially available USB devices as keys for PCs to lock unauthorized operations on Windows Server. It also supports USB connection restrictions for smartphones.
- Encryption and authentication
- others
- Other security
Create an encrypted disk with simple operations by following the wizard.
- Encryption and authentication
- Other security
- others
Standard functions are prepared from sensing to data control, communication, alarms, and graphing! We achieve continuous operation for over one year with original devices.
- Other information systems
- Other security
In addition to excellent authentication accuracy, it allows for the registration of up to 100,000 fingers.
- Personal authentication
- Other security
Significantly reduced size, weight, and power consumption compared to a typical IFF transponder.
- Other electronic parts
- Other security
This is a charging storage unit that can charge and store up to 10 units in delivery services, apparel shops, supermarkets, factories and production sites, warehouses and logistics, hospitals, etc.
- Other security
- Other PCs and OA equipment
- Office furniture
Early detection of falls, accidents, and sudden illnesses such as heatstroke!
- Other security and surveillance systems
- Other security
- Image analysis software
From entrance management to the front doors of apartments and private homes! It combines a sense of security that cannot be faked or stolen with the convenience of not needing to carry keys.
- Personal authentication
- Other security
We introduce a plan where the DX system is available for 16,500 yen per account per month (tax included)!
- Other security
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
Windows environment restoration software to restore to the original state with reboot or shutdown.
- Software (middle, driver, security, etc.)
- Other security
High-speed transfer USB 3.1 Gen 1 (USB 3.0) compatible! A USB memory stick dedicated to protecting information for businesses.
- Other security
Just install it to thoroughly record operations on your Windows PC. No dedicated server required.
- Other security
- Other office supplies
Ideal for My Number measures! Launch of the PC operation log collection software "LB Access Log 2 Pro" equipped with monitoring features and no server required.
Lifeboat Co., Ltd. (President Takahiro Yamazaki, Chiyoda-ku, Tokyo, TEL 03-3265-1250, URL http://www.lifeboat.jp/) will start selling "LB Access Log 2 Pro" (LB Access Log 2 Pro), a software developed by Es Computer that does not require a dedicated server and can collect and monitor PC operation logs, starting from February 15, 2016, through various sales agents, with a standard price of 22,000 yen (excluding tax) and up. In addition to collecting operation logs, it features the ability to take screenshots and notify administrators when specific actions are performed, monitor network traffic to detect unexpected data transmissions, and restrict the use of USB devices, among other diverse functionalities. It is an ideal software for monitoring PCs and collecting operation logs, particularly for enhancing the security of PCs handling My Number information. ● For more details on LB Access Log 2 Pro, please visit http://www.lifeboat.jp/products/alog2p/.
Windows operation log collection software. Enhanced PC monitoring features. No server required.
- Other security
- others
Proposing security systems for nursing care facilities and hospitals!
- Other security
- others
Excellent security and operability! For customers considering dimple key cylinders.
- Other security
- others
Prevent unauthorized operation of the PC / Lock the PC / Support for two-factor authentication / Log in to Windows just by inserting the key
- Other security
- others
- Other services
Free publication of seminar materials on the tethered balloon camera solution for security, introduced by NHK, commercial broadcasters, and major newspapers!
- Other security
You will be able to reduce the efficiency of daily email operations by 10 minutes a day, saving over 40 hours a year.
- Other security
- Email/Fax transmission
Adopting double monitoring with ICT and human oversight! If you haven't been watching the push notifications, we will contact you by phone from the monitoring center.
- Remote Control
- Surveillance Camera System
- Other security
A unit that restricts the flow of data in one direction and completely blocks cyber attacks from the outside! It safely transmits on-site data to the cloud.
- Other security
- server
Aiming for control that is independent of the connection environment! Introducing key points of privileged ID management in telework on the blog.
- Other information systems
- Other security and surveillance systems
- Other security
We are introducing examples of information leaks due to internal misconduct and three countermeasures on our blog!
- Other information systems
- Other security and surveillance systems
- Other security
We will introduce many examples of internal fraud countermeasures! Please use this to review the internal fraud countermeasures in your organization.
- Other information systems
- Other security and surveillance systems
- Other security
Is your supply chain access management okay? We introduce best practices for access management in our blog.
- Other information systems
- Other security and surveillance systems
- Other security
Streamlining high-load requirements! Tips for maintaining "PCI DSS compliance" introduced in the blog.
- Other information systems
- Other security and surveillance systems
- Other security
An example of improved internal security awareness through the establishment of a workflow for task approval.
- Other security
- Other information systems
Automation and efficiency of log management! We will introduce a case where two tools collaborated to achieve this.
- Other security
- Other information systems
Centralized management of internal access to the server! A case where the quality and efficiency of access control have significantly improved.
- Other security
- Other information systems
Significant cost reduction! Introducing a case study of an access management tool implemented for internal control.
- Other security
- Other information systems
Migrating the management of high-privilege IDs (privileged IDs) to cloud services! A case that significantly streamlined responses to system audits.
- Other security
- Other information systems
Two points to check during implementation! Key selection criteria for products that manage high-privilege IDs (privileged IDs) introduced in the blog.
- Other information systems
- Other security and surveillance systems
- Other security
What are the advantages and disadvantages of each method? Key points for selecting management products for high-privilege IDs (privileged IDs) introduced in the blog.
- Other information systems
- Other security and surveillance systems
- Other security
What is the most threatening event for our company? We explain the importance of managing high-privilege IDs (privileged IDs) and the approach methods in our blog!
- Other information systems
- Other security and surveillance systems
- Other security
The key point is the boundary of responsibility in the cloud! We will introduce how to manage "administrator accounts" in a blog.
- Other information systems
- Other security and surveillance systems
- Other security