List of Other security products
- classification:Other security
1~45 item / All 2112 items
Heat resistant up to 1200℃. We will custom-make high-performance insulation covers that ensure safety in the working environment!
- Glass
Installed at the network exit! Detects and automatically blocks unauthorized communication to the attacker's command server.
- Other security
- Firewall and intrusion prevention
A case where C2 communication, which is likely to occur after an intrusion, was detected and blocked to prevent data exfiltration!
- Other security
- Firewall and intrusion prevention
Summarize and reinforce the "external communication control, logs, reporting, and emergency response" required for client checks!
- Other security
- Firewall and intrusion prevention
Automatically block C2 communications! Simplify operations with notifications and monthly reports, supporting accountability.
- Other security
- Firewall and intrusion prevention
Examples of exit strategies to meet security requirements as a business partner or contractor!
- Other security
- Firewall and intrusion prevention
Block C2 communications that could lead to the exfiltration of design data! Strengthen the ability to respond to security demands from business partners.
- Other security
- Firewall and intrusion prevention
Detection of C2 server communication through a blacklist and automatic blocking! A case where explanations during client audits became easier.
- Other security
- Firewall and intrusion prevention
Preventing the risk of information leakage and exploitation after infection with export measures! Simplifying operations with notifications and monthly reports.
- Other security
- Firewall and intrusion prevention
Detect and automatically block C2 communications! Visualize the situation even for companies with multiple locations through notification emails and monthly reports.
- Other security
- Firewall and intrusion prevention
Prevent the expansion of damage that leads to factory shutdowns! Operations with notifications and monthly reports even in environments with thin information systems.
- Other security
- Firewall and intrusion prevention
Monitor and block C2 communications at the exit! Operations include automatic blocking, notifications, and monthly reports, allowing for management by a small team.
- Other security
- Firewall and intrusion prevention
Prevent information leaks and business interruption risks! Utilize notifications and monthly reports for audit and reporting responses.
- Other security
- Firewall and intrusion prevention
Automatically block C2 communications in logistics sites where operations cannot be halted! Accelerate initial response with notifications and understand operational status through monthly reports.
- Other security
- Firewall and intrusion prevention
A case where measures that can be "explained" were established not only for our own company but also as a position handling customer information!
- Other security
- Firewall and intrusion prevention
Prevent the leakage of confidential information! With notifications and monthly reports, it's easier to maintain operations even in environments with thin IT resources.
- Other security
- Firewall and intrusion prevention
Added exit strategies for industries with strict supply chain demands! Mitigating risks of platformization and information leakage.
- Other security
- Firewall and intrusion prevention
Even though it's called easy implementation, there are points to check! Explaining the confirmation points before implementation.
- Other security
The fear of the expansion of damage "after" the intrusion itself is greater! Explaining the reasons why entrance measures alone are not enough.
- Other security
Protecting information with an 'exit wall' even after being breached! An explanation of the introduction process of DDHBOX.
- Other security
In an era where it is difficult to completely prevent intrusions, let's organize the idea of "preventing the expansion of damage after an intrusion."
- Other security
What is necessary is not the relaxation of restrictions, but the separation of roles! Designing material operations by distinguishing between internal storage and external sharing.
- Other security
Five steps: Inventory → Requirement organization → Classification → Migration → Establishment! Materials for companies considering MAM/DAM implementation.
- Other security
Multi-layered defense security to protect communication networks from ransomware.
- Other security
Multi-layered defense security to protect operational data from ransomware.
- Other security
Multi-layered defense solution to protect IT systems from ransomware.
- Other security
Protecting equipment from ransomware and supporting stable operations.
- Other security
Multi-layered defense security to protect manufacturing operations from ransomware.
- Other security
Thorough countermeasures against ransomware threats with a multi-layered defense.
- Other security
Prevent worker mistakes and improve operational efficiency with barcode and QR code authentication! Operate with inventory management shelves that maintain the existing box sizes and layout!
- Other security
Ransomware damage is increasing, and the risks are growing. If breached, only a handful succeed in preventing data leaks. Are you implementing measures to prevent theft?
- Firewall and intrusion prevention
- Other security
- Virus software
This is an ASP service that notifies via email about abnormalities and operational status of terminal devices.
- Other network tools
- Other security
- Other security and surveillance systems
We will be exhibiting at the "2nd Manufacturing Industry DX Exhibition" within the Monozukuri World.
Dear Sir/Madam, I hope this message finds you in good health and spirits. We are pleased to announce that our company will be exhibiting at the "2nd Manufacturing DX Exhibition" within the Manufacturing World, which will be held at Tokyo Big Sight from June 19, 2024. ■ Exhibition Dates June 19 (Wednesday) - 21 (Friday), 2024 ■ Venue Tokyo Big Sight, South Hall 2 ■ Highlights of Our Exhibition - A SaaS-based monitoring system ideal for remote monitoring of multi-site equipment. - ASP services for abnormal monitoring of industrial machinery such as pumps and boilers. - A power data collection system utilizing B-route of smart meters (ECHONet Lite specification). - We will introduce various monitoring systems and data collection devices aimed at the digital transformation and labor reduction of equipment monitoring. ■ Booth Number S15-9 (South Hall 2) We warmly invite you to visit our booth. Our staff looks forward to welcoming you.
Usable by anyone in various scenes! Equipped with multi-function and dorsal hand vein authentication.
- Other electronic parts
- Entrance and exit control system
- Other security
It is possible to set location restrictions that can be opened individually or by group even without an IC card! It is also suitable for storing important documents such as My Number!
- Other security
- Other Storage
- Personal authentication
A case where it was adopted because it can be built with only low initial and monthly costs!
- Entrance and exit control system
- Personal authentication
- Other security
Compared to conventional fingerprint and facial recognition, a highly accurate hand vein authentication system enables reliable identity verification and access control.
- Entrance and exit control system
- Personal authentication
- Other security
Can be utilized in accordance with diverse work styles such as core time attendance and shared offices!
- Entrance and exit control system
- Personal authentication
- Other security
You can manage entry and exit logs with timestamps in seconds, enabling "visualization of logs"!
- Entrance and exit control system
- Personal authentication
- Other security
Top-level certification accuracy! The introduction of the hand vein authentication device VP-IIX enables high-security access control management.
- Entrance and exit control system
- Personal authentication
- Other security
The back of the hand vein authentication device "VP-IIX" thoroughly manages entry and exit at the site.
- Entrance and exit control system
- Personal authentication
- Other security
Top-level certification accuracy! By introducing a hand vein authentication device, we eliminate the hassle of attendance management!
- Entrance and exit control system
- Personal authentication
- Other security
Highest level of authentication accuracy! By introducing a hand vein authentication device, we prevent impersonation and achieve a high-security environment 24 hours a day.
- Entrance and exit control system
- Personal authentication
- Other security
The highest level of certification accuracy! An ideal biometric authentication system for managing entry and exit in rooms that require security measures.
- Entrance and exit control system
- Personal authentication
- Other security
Highest level of certification accuracy! The introduction of a hand vein authentication device enables centralized management of entry/exit control and attendance management.
- Entrance and exit control system
- Personal authentication
- Other security
Highest level of certification accuracy! The introduction of a hand vein authentication device enables centralized management of entry/exit control and attendance management.
- Entrance and exit control system
- Personal authentication
- Other security