List of Other security products
- classification:Other security
1201~1260 item / All 1917 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
Tamper-evident label that clearly shows whether it has been opened or not.
- Other security
- Other consumables
- label
Close the door and it auto-locks! To open it, just use the passcode! No power needed, so it's safe to use even during power outages or disasters—maintenance-free button lock.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
A lineup of distinctive technologies, including intrusion detection used in ship radar monitoring systems.
- Other security
The domestically produced cloud-based WAF Aegis, which requires no complicated setup or operation, supports the healthy growth of your company's web business.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Detect unauthorized use of your own domain! By understanding the existence and content of phishing emails, you can also prevent damage to customers and partners.
- Other security
TwoFive signs agency contract with DigiCert Japan and starts selling BIMI-compliant certification mark certificates.
TwoFive Inc. has entered into a sales agency agreement with DigiCert Japan LLC for the Verified Mark Certificates (VMC), which comply with the new email authentication technology known as the BIMI standard. Additionally, to enable the reflection of results in security measures after implementing DMARC, we provide a cloud service called "DMARC / 25 Analyze" that aggregates and visualizes DMARC reports, which report the authentication results on the email receiving side in an easy-to-understand manner. We support all companies and organizations that send emails to appropriately utilize DMARC and BIMI without requiring special expertise.
We detect and block cyber attacks on websites at a low cost. Equipped with an AI engine, it automatically responds to the latest attacks, eliminating the need for manual operation.
- Firewall and intrusion prevention
- Other security
- Software (middle, driver, security, etc.)
Recruiting agents and distributors! IT solution "NinjaConnect ISM" for the manufacturing industry that enables remote maintenance of industrial PCs.
- Other security
- Other network tools
Log in from your computer or mobile device! You can easily view it anytime, anywhere.
- Other information systems
- Internal Control and Operational Management
- Other security
It has been implemented in multiple factories of Wipro, one of the four major IT companies in India. A free trial is also currently available!
- Server monitoring and network management tools
- Other security
- Other network tools
We will be exhibiting at ITmedia Virtual EXPO 2021 in the fall!
e-Jan Networks will participate in the online exhibition "ITmedia Virtual EXPO 2021 Autumn" to be held in September 2021. At our online booth, you can view our remote maintenance solutions for factories. Since it is an online exhibition, anyone is welcome to join. ■ Exhibition Overview - Dates: September 1, 2021 (Wed) - September 30, 2021 (Thu) - Venue: Online - Participation Fee: Free - Organizer: ITmedia Inc. ■ What is NinjaConnect ISM? NinjaConnect ISM is a solution for remote maintenance of industrial PCs connected to factory networks. By installing a dedicated connector in the factory network, it enables remote maintenance without directly connecting the industrial PCs to the internet. It supports file transfers and log file storage, reducing costs associated with on-site maintenance, improving operational efficiency, and promoting digital transformation in the manufacturing industry.
Securely integrate information technology (IT) and operational technology (OT) to protect factory networks from cyber attacks.
- Other security
We will be exhibiting at ITmedia Virtual EXPO 2021 in the fall!
e-Jan Networks will participate in the online exhibition "ITmedia Virtual EXPO 2021 Autumn" to be held in September 2021. At our online booth, you can view our remote maintenance solutions for factories. Since it is an online exhibition, anyone is welcome to join. ■ Exhibition Overview - Dates: September 1, 2021 (Wed) - September 30, 2021 (Thu) - Venue: Online - Participation Fee: Free - Organizer: ITmedia Inc. ■ What is NinjaConnect ISM? NinjaConnect ISM is a solution for remote maintenance of industrial PCs connected to factory networks. By installing a dedicated connector in the factory network, it enables remote maintenance without directly connecting the industrial PCs to the internet. It supports file transfers and log file storage, reducing costs associated with on-site maintenance, improving operational efficiency, and promoting digital transformation in the manufacturing industry.
Advancing DX, how to protect OT/IoT? Special edition of the Critical Infrastructure Cybersecurity Conference Report.
- Internal Control and Operational Management
- Other information systems
- Other security
[Indoor Type] Monitors your home in real-time with smartphone management, ensuring safety and security through crime prevention measures!
- Other security
A printing service that provides security for important printed materials such as gift certificates and securities!
- Printing/Publishing
- Other security
Flexible system! We offer a lineup of software utilizing new technologies.
- Other security and surveillance systems
- Other security
- Personal authentication
[COMODO Product] Eliminate damage from unknown threats! "AutoContainment" technology with U.S. patent.
- Virus software
- filtering
- Other security
Enhanced security measures. Cutting-edge surveillance systems for home and business use.
- Other security
- Color camera
Are you still going to continue handling complicated and troublesome IT security measures in-house?
- Other security
Application protection from memory to the web! Detect fileless attacks and memory corruption attacks within milliseconds.
- Other network tools
- Server monitoring and network management tools
- Other security
Protect your assets from "Zero-Day" attacks! All-in-one "SaaS-type" vulnerability management tool!
- Other network tools
- Server monitoring and network management tools
- Other security
Save time and costs! Providing an open and scalable threat intelligence platform.
- Other network tools
- Server monitoring and network management tools
- Other security
Combination of vulnerability scanners and penetration testing tools! A vulnerability management solution that addresses real risks.
- Other network tools
- Server monitoring and network management tools
- Other security
Maximize the use of security infrastructure! We support users in making the most of their security investments.
- Other network tools
- Server monitoring and network management tools
- Other security
Real-time cyber security visualization! It helps improve reliability and safety.
- Other network tools
- Server monitoring and network management tools
- Other security
Strongly prevent the leakage and hacking of important data such as personal information!
- Other security
- Document and Data Management
- server
A blockchain chip that has achieved miniaturization of blockchain systems that can be implemented in IoT devices and other applications.
- Other security
- Embedded Board Computers
- Communications
Educational materials for cultivating blockchain engineers, whose demand is certain to expand in the future【Sees Sandbox System】.
- Other security
- Other services
- Distance learning/E-learning
No recorder needed, tampering prevention, protection against theft of recorded data! High-security [blockchain surveillance camera].
- Other security
- Surveillance Cameras
- Other information systems
Pre-built blockchain with various categories of decentralized applications (DApps).
- Other security
- Document and Data Management
- Other information systems
Protect your documents and data files from tampering and leakage with robust security!
- Other security
- Software (middle, driver, security, etc.)
Verify performance and proactively avoid business risks! We meet customer needs with a rich lineup.
- Other security
- Other network tools
Completely block external hacking! Essential for organizations that handle various confidential data!
- Other security
- Other network tools
To CISOs, SOCs, CSIRTs, and security personnel! Real-time analysis of behaviors that impact critical assets!
- Other security
- Other network tools
Packet capture without packet loss up to 40Gbps! A revolutionary platform that serves four roles in one device.
- Other security
- Other network tools
Enhance website security! Block 99.9% of fraudulent bots without affecting users!
- Other security
- Other network tools
Automating IT/OT security operations! Facilitating the smooth delivery of incident/threat information.
- Other security
- Other network tools
Covers various attacks that include "IT + OT"! Always provides 21 different new attack vectors.
- Software (middle, driver, security, etc.)
- Other security
- Other network tools
A network video recorder with a redundant system for peace of mind, suitable for large surveillance camera systems. It can connect up to 254 cameras.
- Surveillance Camera System
- Other security
We have prepared a plan to automate the lending and storage of keys within the factory, enabling improved operational efficiency and history management.
- Entrance and exit control system
- Other security
Manage up to 128 entry and exit groups and 1000 readers! Providing a reliable and physical access control solution.
- Entrance and exit control system
- Other security
Edge computing processing is possible! Solutions for various segments.
- Other security
Shut out viruses and malware with a whitelist that has no loopholes!
- Other security
- filtering
We centrally manage all logs to utilize them for identifying the causes of failures and detecting threats.
- Other security
Achieving the only "correct sanitization." Electronic file "sanitization and disinfection" solution. No. 1 in implementation results in local governments. Beware of similar products.
- filtering
- Firewall and intrusion prevention
- Other security
We offer "unlimited" email accounts, email storage, and domains!
- Other security
- Internal Control and Operational Management
- Email/Fax transmission
Consolidated management of emails for the entire corporate group! Ideal for internal control, email audit operations, and litigation measures!
- Other security
- Internal Control and Operational Management
- Email/Fax transmission
When device manufacturers develop devices equipped with Amazon Alexa, security testing at an authorized lab is mandatory.
- Contract Inspection
- Other security
- Public Testing/Laboratory
Black box testing contract services for products (IoT devices/network devices, etc.)
- Other security
- Contract Inspection
- ISO-related consultant
We will verify the security requirements of ETSI EN 303 645 that are required for selling products (IoT/NW devices) in the EU.
- Contract Inspection
- Other security
- Public Testing/Laboratory
Providing advanced solutions that excel in safety and flexibility to meet the stringent needs of healthcare facilities!
- Entrance and exit control system
- Other security
Eliminate complex cable wiring for partitions! Offering a wide range of access control features with safety, reliability, and convenience.
- Entrance and exit control system
- Other security
Operates reliably 24 hours a day, 365 days a year! Enhances seamless integration with existing video security systems!
- Entrance and exit control system
- Other security
Provides comprehensive visitor management features! Manage up to 128 entry/exit groups and 1000 readers!
- Entrance and exit control system
- Other security
Remote monitoring is possible using general lines (telephone lines) and PBX internal lines. The input signal has 8 contacts, and "voice/SMS notifications" can be configured according to the environmen...
- Other security
An automated security assessment tool designed for network-connected products!
- Other security
Announcement of a webinar discussing security regulations and measures for Industrial IoT in various countries!
Onward Security Japan Co., Ltd. (Headquarters: Minato-ku, Tokyo) and Ask Co., Ltd. (Headquarters: Chiyoda-ku, Tokyo) will co-host a webinar titled "Discussing Security Regulations and Measures for Industrial IoT in Various Countries!" on Tuesday, July 20, aimed at security/QA personnel in the manufacturing industry and integrators proposing solutions to manufacturing customers. In this webinar, we will explain the current situation surrounding IIoT (Industrial IoT) security, as well as the security regulations and measures in various countries. Following that, we will introduce products offered by Onward Security as solutions to comply with these regulations. Although the time is short, we encourage you to participate freely. Webinar Content: 1. The current situation surrounding IIoT and security regulations/measures in various countries 2. Introduction of solutions to strengthen IIoT security 3. Q&A session
A network that never stops, 24 hours a day, 365 days a year! Supporting smart factories.
- Wireless LAN
- Server monitoring and network management tools
- Other security
Exhibiting at the 7th Smart Factory Expo. Supporting the digital transformation of the manufacturing industry towards achieving digital transformation with a comfortable and safe network.
Allied Telesis, Inc. (Headquarters: Shinagawa-ku, Tokyo; Chairman: Sachie Oshima) will exhibit at the "7th Smart Factory EXPO" held at Tokyo Big Sight from January 25 (Wednesday) to January 27 (Friday), 2023. At this year's "7th Smart Factory EXPO," under the theme of "Supporting Digital Transformation in Manufacturing with Comfortable and Safe Networks," we will introduce measures aimed at achieving digital transformation (DX) in the manufacturing industry, including the networking of various devices within factories, as well as networks connecting factories, overseas bases, and headquarters, ultimately strengthening the supply chain. *For details, please refer to the PDF materials or related links.
Safe and low-cost! Strengthening cloud storage security from the endpoint.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Robust and flexible security measures! A solution for restricting the transfer of important files.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Risk management for fraudulent use that financial institutions should address now! Explaining ATM fraud as a use case!
- Other security
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
Supports open, close, and stop operations according to needs! Anyone can operate it easily.
- others
- Other security