List of Other security products
- classification:Other security
1081~1125 item / All 1807 items
Combination of vulnerability scanners and penetration testing tools! A vulnerability management solution that addresses real risks.
- Other network tools
- Server monitoring and network management tools
- Other security
Maximize the use of security infrastructure! We support users in making the most of their security investments.
- Other network tools
- Server monitoring and network management tools
- Other security
Real-time cyber security visualization! It helps improve reliability and safety.
- Other network tools
- Server monitoring and network management tools
- Other security
Strongly prevent the leakage and hacking of important data such as personal information!
- Other security
- Document and Data Management
- server
A blockchain chip that has achieved miniaturization of blockchain systems that can be implemented in IoT devices and other applications.
- Other security
- Embedded Board Computers
- Communications
Educational materials for cultivating blockchain engineers, whose demand is certain to expand in the future【Sees Sandbox System】.
- Other security
- Other services
- Distance learning/E-learning
No recorder needed, tampering prevention, protection against theft of recorded data! High-security [blockchain surveillance camera].
- Other security
- Surveillance Cameras
- Other information systems
Pre-built blockchain with various categories of decentralized applications (DApps).
- Other security
- Document and Data Management
- Other information systems
Protect your documents and data files from tampering and leakage with robust security!
- Other security
- Software (middle, driver, security, etc.)
Verify performance and proactively avoid business risks! We meet customer needs with a rich lineup.
- Other security
- Other network tools
Completely block external hacking! Essential for organizations that handle various confidential data!
- Other security
- Other network tools
To CISOs, SOCs, CSIRTs, and security personnel! Real-time analysis of behaviors that impact critical assets!
- Other security
- Other network tools
Packet capture without packet loss up to 40Gbps! A revolutionary platform that serves four roles in one device.
- Other security
- Other network tools
Enhance website security! Block 99.9% of fraudulent bots without affecting users!
- Other security
- Other network tools
Automating IT/OT security operations! Facilitating the smooth delivery of incident/threat information.
- Other security
- Other network tools
Covers various attacks that include "IT + OT"! Always provides 21 different new attack vectors.
- Software (middle, driver, security, etc.)
- Other security
- Other network tools
A network video recorder with a redundant system for peace of mind, suitable for large surveillance camera systems. It can connect up to 254 cameras.
- Surveillance Camera System
- Other security
We have prepared a plan to automate the lending and storage of keys within the factory, enabling improved operational efficiency and history management.
- Entrance and exit control system
- Other security
Manage up to 128 entry and exit groups and 1000 readers! Providing a reliable and physical access control solution.
- Entrance and exit control system
- Other security
Edge computing processing is possible! Solutions for various segments.
- Other security
Shut out viruses and malware with a whitelist that has no loopholes!
- Other security
- filtering
We centrally manage all logs to utilize them for identifying the causes of failures and detecting threats.
- Other security
Achieving the only "correct sanitization." Electronic file "sanitization and disinfection" solution. No. 1 in implementation results in local governments. Beware of similar products.
- filtering
- Firewall and intrusion prevention
- Other security
We offer "unlimited" email accounts, email storage, and domains!
- Other security
- Internal Control and Operational Management
- Email/Fax transmission
Consolidated management of emails for the entire corporate group! Ideal for internal control, email audit operations, and litigation measures!
- Other security
- Internal Control and Operational Management
- Email/Fax transmission
When device manufacturers develop devices equipped with Amazon Alexa, security testing at an authorized lab is mandatory.
- Contract Inspection
- Other security
- Public Testing/Laboratory
Black box testing contract services for products (IoT devices/network devices, etc.)
- Other security
- Contract Inspection
- ISO-related consultant
We will verify the security requirements of ETSI EN 303 645 that are required for selling products (IoT/NW devices) in the EU.
- Contract Inspection
- Other security
- Public Testing/Laboratory
Providing advanced solutions that excel in safety and flexibility to meet the stringent needs of healthcare facilities!
- Entrance and exit control system
- Other security
Eliminate complex cable wiring for partitions! Offering a wide range of access control features with safety, reliability, and convenience.
- Entrance and exit control system
- Other security
Operates reliably 24 hours a day, 365 days a year! Enhances seamless integration with existing video security systems!
- Entrance and exit control system
- Other security
Provides comprehensive visitor management features! Manage up to 128 entry/exit groups and 1000 readers!
- Entrance and exit control system
- Other security
Remote monitoring is possible using general lines (telephone lines) and PBX internal lines. The input signal has 8 contacts, and "voice/SMS notifications" can be configured according to the environmen...
- Other security
An automated security assessment tool designed for network-connected products!
- Other security

Announcement of a webinar discussing security regulations and measures for Industrial IoT in various countries!
Onward Security Japan Co., Ltd. (Headquarters: Minato-ku, Tokyo) and Ask Co., Ltd. (Headquarters: Chiyoda-ku, Tokyo) will co-host a webinar titled "Discussing Security Regulations and Measures for Industrial IoT in Various Countries!" on Tuesday, July 20, aimed at security/QA personnel in the manufacturing industry and integrators proposing solutions to manufacturing customers. In this webinar, we will explain the current situation surrounding IIoT (Industrial IoT) security, as well as the security regulations and measures in various countries. Following that, we will introduce products offered by Onward Security as solutions to comply with these regulations. Although the time is short, we encourage you to participate freely. Webinar Content: 1. The current situation surrounding IIoT and security regulations/measures in various countries 2. Introduction of solutions to strengthen IIoT security 3. Q&A session
A network that never stops, 24 hours a day, 365 days a year! Supporting smart factories.
- Wireless LAN
- Server monitoring and network management tools
- Other security

Exhibiting at the 7th Smart Factory Expo. Supporting the digital transformation of the manufacturing industry towards achieving digital transformation with a comfortable and safe network.
Allied Telesis, Inc. (Headquarters: Shinagawa-ku, Tokyo; Chairman: Sachie Oshima) will exhibit at the "7th Smart Factory EXPO" held at Tokyo Big Sight from January 25 (Wednesday) to January 27 (Friday), 2023. At this year's "7th Smart Factory EXPO," under the theme of "Supporting Digital Transformation in Manufacturing with Comfortable and Safe Networks," we will introduce measures aimed at achieving digital transformation (DX) in the manufacturing industry, including the networking of various devices within factories, as well as networks connecting factories, overseas bases, and headquarters, ultimately strengthening the supply chain. *For details, please refer to the PDF materials or related links.
Safe and low-cost! Strengthening cloud storage security from the endpoint.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Robust and flexible security measures! A solution for restricting the transfer of important files.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Risk management for fraudulent use that financial institutions should address now! Explaining ATM fraud as a use case!
- Other security
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
Supports open, close, and stop operations according to needs! Anyone can operate it easily.
- others
- Other security
Compatible with bicycle traffic! Made of aesthetically pleasing stainless steel, designed with a focus on environmental durability.
- Other security
Achieving a safe and secure network environment! Measures against indiscriminate and merciless cyber attacks.
- Other safety equipment
- Other security
COMODO is a cloud-based solution that can be easily integrated into existing email infrastructure.
- Virus software
- filtering
- Other security
Cloud-based solution that blocks advanced threats such as endpoints from COMODO.
- Virus software
- filtering
- Other security
Fire Detection System FDS
- Other temperature and humidity measuring instruments
- Image analysis software
- Other security