List of Other security products
- classification:Other security
301~360 item / All 1911 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
From the attacker's perspective, we will conduct a multifaceted assessment of whether the publicly available environment of the website is in a state where "valuable information can be collected."
- Other security
- Firewall and intrusion prevention
Ministry of Economy, Trade and Industry Registered Service × Expert Diagnosis × Ongoing Support" Platform Diagnosis that "Doesn't End with Discovery
- Other security
- Firewall and intrusion prevention
"Ministry of Economy, Trade and Industry registered services × Expert diagnosis × Ongoing support" Total support for visualizing, improving, and maintaining web application security.
- Other security
- Firewall and intrusion prevention
Enhancing web security through vulnerability assessments certified by the Ministry of Economy, Trade and Industry, regardless of industry or size.
- Other security
- Firewall and intrusion prevention
Functions as a secure gateway between onboard equipment and external services, ensuring protection and seamless connectivity!
- Other security
- Routers, Switches, and Hubs
Notice of Participation in Bariship 2025
We are pleased to inform you that we will be exhibiting at "BariShip 2025," which will be held from May 22 (Thursday) to May 24 (Saturday), 2025, at Technoport Imabari and other locations. ● Exhibition: BariShip 2025 ● Date: May 22 (Thursday) to May 24 (Saturday), 2025, from 10:00 AM to 5:00 PM (until 4:00 PM on the final day) ● Location: Technoport Imabari and others, 5-14-3 Higashimon-cho, Imabari City, Ehime Prefecture ● Exhibitor Name: MCM Japan Co., Ltd. ● Booth Number: B-63 (Zone B, Technoport Imabari) ● Exhibited Products: Security solutions compliant with IACS UR E26/27 ■ Robustel's Cybersecurity Gateway for Vessels (MG460) ■ Veinland's Cybersecurity Switch for Vessels (LAN24CH) ● Exhibitor Seminar: May 23 (Friday) from 4:20 PM to 4:50 PM, Seminar Room A (2nd Floor, Technoport Imabari) ■ S-218: Security solutions compliant with IACS UR E26/27
"Don't miss disaster information, heatstroke warnings, and emergency information emails!" Alerts anywhere via Wi-Fi | Important email notification system for schools and public facilities.
- Other environmental equipment
- Other security
- Data Logger
Immediate response to the "Heat Stroke Warning Alert"! Urgent proposal of heat stroke prevention products that can be used on-site right now.
In response to the "Special Heat Stroke Warning Alert" and the "Mandatory Heat Stroke Measures" that began full-scale operation in June 2025, we are reintroducing our IoT heat stroke countermeasure solutions. The target products are the three series: "Meru Maru-kun + Heat Stroke Alert," "Miharukun PRO," and "Momoko and Ayaka." With this system revision, heat stroke measures have changed from "effort obligations" to "obligations" for all businesses employing workers. As measures are required across all industries and sites, including government agencies, educational institutions, welfare facilities, distribution, and construction, ISA supports the creation of a safe and secure environment through existing products that can be operated immediately. ■ Introduction of three heat stroke countermeasure products (1) Meru Maru-kun + Heat Stroke Warning Alert Email Distribution Service (2) Miharukun PRO (WBGT compatible model) (3) Momoko and Ayaka Environmental Monitoring Solution (environmental monitoring, recording, alerts) ◆ Main industries and achievements of implementation Local governments (offices, evacuation centers, nurseries) Educational institutions (playgrounds, gymnasiums, classrooms) Medical and welfare facilities (nursing homes, disability support facilities) Distribution and construction industries (warehouses, job sites, delivery hubs) General companies (reception areas, warehouses, employee break rooms)
Introducing email threats that bypass gateway security!
- Other security
For zone management within the facility! In addition to simple applications, it can also be linked with automatic doors and door locks.
- 2D Code Reader
- Other security
Effective for preventing ticket resale! In addition to the information in a standard two-dimensional code, hidden characters can be included.
- 2D Code Reader
- Other security
- Encryption and authentication
Targeted OT networks. How to protect the "invisible areas" of the manufacturing site.
- Firewall and intrusion prevention
- Other security
Implementing internal risk measures such as information leakage and internal misconduct through behavioral analysis! A new corporate risk management approach to prevent risks before they occur.
- Server monitoring and network management tools
- Other security
- Entrance and exit control system
Explaining the specific settings for the screensaver and points to be aware of during the setup!
- Other security
Explaining the high probability of successful unauthorized access known as "trashing"!
- Other security
I will explain in detail the measures that cloud server administrators should take!
- Other security
Points for maintaining a safe internet environment! An explanation of the types and risks when not used properly.
- Other security
A detailed explanation of definitions, types, and countermeasures. This is useful information for those using IT equipment in the workplace.
- Other security
Would you like to prepare for compliance with the Cyber Resilience Act using 'Black Duck SCA', which supports OSS risk management and SBOM creation?
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
The weather-resistant and waterproof permanent adhesive seal that can be used outdoors allows for the management of outdoor equipment, materials, and assets.
- Other security
- label
- Packaging materials
Achieving faster and smarter investigations: "CCL Digital Forensic Software"
- Other security
Monitoring the number of people in a specific area at low cost! What are the benefits of understanding the number of people?
- Other security
Eliminating the need for applying to take out digital cameras and transferring data to PCs increases work efficiency!
- Other security
- Image Transmission Equipment
Installing network infrastructure to support complex digital video transmission at each subway station!
- Routers, Switches, and Hubs
- Other security
- Firewall and intrusion prevention
We would like to introduce a case where the speed of information sharing within the company has significantly improved, allowing us to thoroughly implement the rules for handling shooting data!
- Other security
Safe and secure to use even for telework! Prevents information leaks in advance and strengthens your business.
- Other security
No data is left on the device! Even if the device is lost, it can prevent the risk of information leakage.
- Other security
From security measures to disaster preparedness, we deliver "peace of mind" in any environment!
- Other security
An electric destruction device capable of physically destroying HDDs and SSDs with 12 tons of hydraulic power. By simply changing the tool, it can also destroy magnetic tapes with one unit.
- Data Erasing
- Other security
- Other server related
The most recommended and ideal data destruction device right now is the physical destruction device, Storage Puncher STPN-30.
Methods for data erasure of unnecessary HDDs, SSDs, magnetic tapes, etc. are as follows: 1. Erasure software, 2. Electrical shock to erase magnetic data, 3. Physical destruction Pros and cons: 1. Erasure software Licensing fees are incurred each time data is erased, resulting in significant costs. 2. Electrical shock magnetic erasure Magnetic erasure devices are very heavy, making it difficult to reuse HDDs. It is also cumbersome to check again by re-inserting into a PC after processing. 3. Physical destruction The easiest, fastest, and cheapest method for erasing data on HDDs is to drill holes in the platters. The currently most recommended device is the physical destruction device Storage Puncher STPN30. What’s good about it: 1. Destruction power of up to 12 tons 2. Processing time of about 10 seconds 3. Hydraulic high-power destruction 4. Various destruction tools can be exchanged on one main unit, allowing for the destruction of HDDs, SSDs, and magnetic tapes. This is a world first. 5. Drills four holes in the HDD to destroy the platter 6. Even if the destruction bit is damaged, it can be easily replaced 7. Function to prevent the destruction shaft from coming out after destruction 8. SSDs are bent at 5mm intervals in a wavy pattern to break the circuit board and destroy the IC chips 9. Battery operation is possible even in places without power, enabling on-site work 10. Weight of about 18 kg
An electric device that physically destroys HDDs with 12 tons of hydraulic power and 4 destruction bits. By swapping the destruction tool, it can also destroy SSDs and magnetic tapes.
- Data Erasing
- Other security
- Other server related
The most recommended and ideal data destruction device right now is the physical destruction device, Storage Puncher STPN-30.
Methods for data erasure of unnecessary HDDs, SSDs, magnetic tapes, etc. are as follows: 1. Erasure software, 2. Electrical shock to erase magnetic data, 3. Physical destruction Pros and cons: 1. Erasure software Licensing fees are incurred each time data is erased, resulting in significant costs. 2. Electrical shock magnetic erasure Magnetic erasure devices are very heavy, making it difficult to reuse HDDs. It is also cumbersome to check again by re-inserting into a PC after processing. 3. Physical destruction The easiest, fastest, and cheapest method for erasing data on HDDs is to drill holes in the platters. The currently most recommended device is the physical destruction device Storage Puncher STPN30. What’s good about it: 1. Destruction power of up to 12 tons 2. Processing time of about 10 seconds 3. Hydraulic high-power destruction 4. Various destruction tools can be exchanged on one main unit, allowing for the destruction of HDDs, SSDs, and magnetic tapes. This is a world first. 5. Drills four holes in the HDD to destroy the platter 6. Even if the destruction bit is damaged, it can be easily replaced 7. Function to prevent the destruction shaft from coming out after destruction 8. SSDs are bent at 5mm intervals in a wavy pattern to break the circuit board and destroy the IC chips 9. Battery operation is possible even in places without power, enabling on-site work 10. Weight of about 18 kg
An electric physical destruction device that cuts LTO and other magnetic tapes with 12 tons of hydraulic power and cutting blades. By replacing the destruction tool, it is also possible to destroy HDD...
- Data Erasing
- Other security
- Other information systems
The most recommended and ideal data destruction device right now is the physical destruction device, Storage Puncher STPN-30.
Methods for data erasure of unnecessary HDDs, SSDs, magnetic tapes, etc. are as follows: 1. Erasure software, 2. Electrical shock to erase magnetic data, 3. Physical destruction Pros and cons: 1. Erasure software Licensing fees are incurred each time data is erased, resulting in significant costs. 2. Electrical shock magnetic erasure Magnetic erasure devices are very heavy, making it difficult to reuse HDDs. It is also cumbersome to check again by re-inserting into a PC after processing. 3. Physical destruction The easiest, fastest, and cheapest method for erasing data on HDDs is to drill holes in the platters. The currently most recommended device is the physical destruction device Storage Puncher STPN30. What’s good about it: 1. Destruction power of up to 12 tons 2. Processing time of about 10 seconds 3. Hydraulic high-power destruction 4. Various destruction tools can be exchanged on one main unit, allowing for the destruction of HDDs, SSDs, and magnetic tapes. This is a world first. 5. Drills four holes in the HDD to destroy the platter 6. Even if the destruction bit is damaged, it can be easily replaced 7. Function to prevent the destruction shaft from coming out after destruction 8. SSDs are bent at 5mm intervals in a wavy pattern to break the circuit board and destroy the IC chips 9. Battery operation is possible even in places without power, enabling on-site work 10. Weight of about 18 kg
Autonomous security operations & GRC platform "Simbian AI" for 24-hour cyber defense
- Other security
Improve the significant security vulnerability of "people"! Protect employees and the business.
- Software (middle, driver, security, etc.)
- Other security
Improve productivity with simple integrated endpoint management! Protection from mobile threats.
- Software (middle, driver, security, etc.)
- Integrated operation management
- Other security
Cybersecurity Solutions - NDR, CTI, and SOC Automation for Advanced Threat Detection 'Gatewatcher'
- Other security
Introducing the relationship between the Privacy Mark and My Number, along with two points to note and guidelines for safety management measures!
- Other security
We will also introduce the benefits of obtaining a P mark and the personal information held by web production companies and how it is handled!
- Other security
We will also explain the methods of robocalls, the risks for companies, and key countermeasures!
- Other security
I will also explain the advantages and disadvantages of obtaining ISMS!
- Other security
It will also explain how the business size classification for the P mark is determined.
- Other security
Construction and maintenance support for communication and network components! You can leave it to us.
- Other network tools
- Other security
- Communications
You can rely on us for internet connection/VPN setup and maintenance support! No need to worry even without a dedicated person.
- Wireless LAN
- Other security
- Communications