List of Other security products
- classification:Other security
1021~1080 item / All 1916 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
We will enhance threat response capabilities across the entire enterprise!
- Other security
We will confidently design, build, and deploy large-scale network segmentation!
- Other security
Implement policy-based controls and automate! Respond quickly to incidents.
- Other security
You can gain our unique insights into the overall picture of the device without interrupting business processes!
- Other security
Use commercially available USB devices as keys for PCs to lock unauthorized operations on Windows Server. It also supports USB connection restrictions for smartphones.
- Encryption and authentication
- others
- Other security
Create an encrypted disk with simple operations by following the wizard.
- Encryption and authentication
- Other security
- others
Standard functions are prepared from sensing to data control, communication, alarms, and graphing! We achieve continuous operation for over one year with original devices.
- Other information systems
- Other security
In addition to excellent authentication accuracy, it allows for the registration of up to 100,000 fingers.
- Personal authentication
- Other security
Significantly reduced size, weight, and power consumption compared to a typical IFF transponder.
- Other electronic parts
- Other security
This is a charging storage unit that can charge and store up to 10 units in delivery services, apparel shops, supermarkets, factories and production sites, warehouses and logistics, hospitals, etc.
- Other security
- Other PCs and OA equipment
- Office furniture
Early detection of falls, accidents, and sudden illnesses such as heatstroke!
- Other security and surveillance systems
- Other security
- Image analysis software
From entrance management to the front doors of apartments and private homes! It combines a sense of security that cannot be faked or stolen with the convenience of not needing to carry keys.
- Personal authentication
- Other security
We introduce a plan where the DX system is available for 16,500 yen per account per month (tax included)!
- Other security
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
Windows environment restoration software to restore to the original state with reboot or shutdown.
- Software (middle, driver, security, etc.)
- Other security
High-speed transfer USB 3.1 Gen 1 (USB 3.0) compatible! A USB memory stick dedicated to protecting information for businesses.
- Other security
Just install it to thoroughly record operations on your Windows PC. No dedicated server required.
- Other security
- Other office supplies
Ideal for My Number measures! Launch of the PC operation log collection software "LB Access Log 2 Pro" equipped with monitoring features and no server required.
Lifeboat Co., Ltd. (President Takahiro Yamazaki, Chiyoda-ku, Tokyo, TEL 03-3265-1250, URL http://www.lifeboat.jp/) will start selling "LB Access Log 2 Pro" (LB Access Log 2 Pro), a software developed by Es Computer that does not require a dedicated server and can collect and monitor PC operation logs, starting from February 15, 2016, through various sales agents, with a standard price of 22,000 yen (excluding tax) and up. In addition to collecting operation logs, it features the ability to take screenshots and notify administrators when specific actions are performed, monitor network traffic to detect unexpected data transmissions, and restrict the use of USB devices, among other diverse functionalities. It is an ideal software for monitoring PCs and collecting operation logs, particularly for enhancing the security of PCs handling My Number information. ● For more details on LB Access Log 2 Pro, please visit http://www.lifeboat.jp/products/alog2p/.
Windows operation log collection software. Enhanced PC monitoring features. No server required.
- Other security
- others
Proposing security systems for nursing care facilities and hospitals!
- Other security
- others
Excellent security and operability! For customers considering dimple key cylinders.
- Other security
- others
Prevent unauthorized operation of the PC / Lock the PC / Support for two-factor authentication / Log in to Windows just by inserting the key
- Other security
- others
- Other services
Free publication of seminar materials on the tethered balloon camera solution for security, introduced by NHK, commercial broadcasters, and major newspapers!
- Other security
You will be able to reduce the efficiency of daily email operations by 10 minutes a day, saving over 40 hours a year.
- Other security
- Email/Fax transmission
Adopting double monitoring with ICT and human oversight! If you haven't been watching the push notifications, we will contact you by phone from the monitoring center.
- Remote Control
- Surveillance Camera System
- Other security
A unit that restricts the flow of data in one direction and completely blocks cyber attacks from the outside! It safely transmits on-site data to the cloud.
- Other security
- server
Aiming for control that is independent of the connection environment! Introducing key points of privileged ID management in telework on the blog.
- Other information systems
- Other security and surveillance systems
- Other security
We are introducing examples of information leaks due to internal misconduct and three countermeasures on our blog!
- Other information systems
- Other security and surveillance systems
- Other security
We will introduce many examples of internal fraud countermeasures! Please use this to review the internal fraud countermeasures in your organization.
- Other information systems
- Other security and surveillance systems
- Other security
Is your supply chain access management okay? We introduce best practices for access management in our blog.
- Other information systems
- Other security and surveillance systems
- Other security
Streamlining high-load requirements! Tips for maintaining "PCI DSS compliance" introduced in the blog.
- Other information systems
- Other security and surveillance systems
- Other security
An example of improved internal security awareness through the establishment of a workflow for task approval.
- Other security
- Other information systems
Automation and efficiency of log management! We will introduce a case where two tools collaborated to achieve this.
- Other security
- Other information systems
Centralized management of internal access to the server! A case where the quality and efficiency of access control have significantly improved.
- Other security
- Other information systems
Significant cost reduction! Introducing a case study of an access management tool implemented for internal control.
- Other security
- Other information systems
Migrating the management of high-privilege IDs (privileged IDs) to cloud services! A case that significantly streamlined responses to system audits.
- Other security
- Other information systems
Two points to check during implementation! Key selection criteria for products that manage high-privilege IDs (privileged IDs) introduced in the blog.
- Other information systems
- Other security and surveillance systems
- Other security
What are the advantages and disadvantages of each method? Key points for selecting management products for high-privilege IDs (privileged IDs) introduced in the blog.
- Other information systems
- Other security and surveillance systems
- Other security
What is the most threatening event for our company? We explain the importance of managing high-privilege IDs (privileged IDs) and the approach methods in our blog!
- Other information systems
- Other security and surveillance systems
- Other security
The key point is the boundary of responsibility in the cloud! We will introduce how to manage "administrator accounts" in a blog.
- Other information systems
- Other security and surveillance systems
- Other security
To those who feel that it is not someone else's problem, yet are troubled by not knowing what measures to take.
- Other security
No need to change the router settings, so it can be implemented immediately and the security is perfect!
- VPN/Wide Area Ethernet
- Other security
Are you spending a lot of man-hours on log reconciliation work? Introducing a privileged ID management solution.
- Server monitoring and network management tools
- Other security
Can be implemented as an independent system! Eliminating threats lurking in Wi-Fi to achieve a clean Wi-Fi environment.
- Sensors
- Wireless LAN
- Other security
No need for the introduction of a large-scale server system. Easily reduce risks with the functions of cameras and dedicated recorders!
- Other network tools
- Other security
Security + Sales Strategy Tool. Glassphere People Counting System Solution now available!
- Other network tools
- Other security
Built-in microphone, 1920×1080 30fps, full HD compatible compact camera.
- Recorders
- Other security
- Other security and surveillance systems
The successor to the HDIP-1000, the HDIP-2000, is now on sale!!
Despite its small size, it boasts high performance; the successor to the HDIP-1000 is finally on sale!! This time, it comes with an NTSC external output, allowing you to connect it to a small monitor as well! *Note: Only monitors that support composite input are compatible.
Constantly monitor and visualize Wi-Fi usage! It can be implemented without changing the existing network.
- Other security
Enhance identity verification with one-time passwords, multi-factor authentication, and multi-step authentication! Reduce the risk of unauthorized access!
- Other security
- Personal authentication
Quickly search internal data to identify the location of data containing personal information! Execute necessary actions such as deletion!
- Other security
- Data Erasing
Compliance with UN-R155 Cybersecurity Regulations and ISO/SAE 21434
- Other security
Explaining how to build a license model tailored to customer usage and how to protect the software itself!
- Other embedded systems (software and hardware)
- Software (middle, driver, security, etc.)
- Other security
[Event Participation] Participating in an event for robot system integrators on November 2 (Wednesday)!
WIBU-SYSTEMS AG, which sells the software application protection and licensing solution CodeMeter, will participate in the following event and give a presentation on how CodeMeter products can contribute to your software business. We invite you to join us. ■ Event Name: 2022 First New Products and Services Presentation for Robot System Integrators ■ Organizer: FA and Robot System Integrators Association ■ Venue: 6th Floor Conference Room, Mechanical Engineering Promotion Hall ■ Participation Fee: Free 【Reasons Why CodeMeter is Chosen in the Robotics and FA Industry】 - Damage from illegal copying and copyright infringement: with real examples - Four needs that can be realized with CodeMeter - Reason 1: Software protection and security - Reason 2: Licensing and access control - Reason 3: High scalability of use cases - Introduction of user cases in the FA/robot industry Target Audience: SIers in the FA/robot industry, developers of industrial AI applications, etc.
The concept of security for customer service. Improving the security of existing security gates.
- Other security
Acrylic security gate system that maintains the aesthetics of the store while achieving a wide span entrance with high detection capability!
- Other security
A large number of "Keylex" products that can be installed both indoors and outdoors, such as in offices, warehouses, and stores!
- Other security and surveillance systems
- Other security
Introducing a door lock that supports remote monitoring! It significantly improves the management of people entering and exiting, as well as convenience.
- Other security
No network installation required, no initial costs! Introducing surveillance cameras that can be installed anywhere.
- Surveillance Cameras
- Surveillance Camera System
- Other security
Customize the size to fit the site! Control radio wave leakage and reduce misreads with our RFID gate antenna. #RFID #IoT #Customization #NewProduct
- IC tag
- Other security
- Process Control System
[New Product] Customize the size to fit the site! UHF band RFID gate antenna that controls radio wave leakage and minimizes misreads.
The gate antenna newly developed by Denpa Maspro. It has been designed to allow customization of the gate's height and width even more than conventional products, tailored to the specific site. Additionally, it features a structure that controls radio wave leakage from the top and outside of the gate, ensuring that RF tags passing through the gate are read accurately while preventing readings from the outside. This is a new antenna that Denpa Maspro confidently proposes. ● Height adjustment in 19 levels by combining parts ● Width adjustment according to the installation location and purpose ● An antenna that controls radio wave leakage and minimizes misreads ● Further efficiency with optional additions 1: Tablet installation is possible 2: Casters can be attached to the legs 3: Infrared sensor can be installed *For more details on the gate antenna, please refer to the PDF document or feel free to contact us.