List of Other security products
- classification:Other security
766~810 item / All 2159 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
Eliminate all files and remove malware! The number one decontamination solution in the domestic market.
- Other security
- Virus software
The email sanitization "Active! zone" collaborates with the attachment sanitization "VOTIRO Disarmer," set to be released in spring 2021.
Qualityia Inc. announces that it will begin releasing its collaboration with Azgent Inc., which primarily provides email sanitization "Active! zone" and network security, for the file sanitization solution "VOTIRO Disarmer" starting in the spring of 2021.
Achieve phishing email countermeasures that do not burden administrators or employees. Compatible with G Suite and Office 365.
- Email/Fax transmission
- Other security
Phishing email countermeasure solution "IRONSCALES" wins the CYBER DEFENSE GLOBAL AWARDS.
The phishing email countermeasure solution "IRONSCALES," sold by Azgent, has won the CYBER DEFENSE GLOBAL AWARDS. IRONSCALES is a phishing email countermeasure solution that performs message delivery, detection, and remediation in the inbox, which is the most affected area by phishing. It not only detects advanced impersonation emails using machine learning but also has the capability to share phishing email information within the organization and isolate it from mailboxes, making phishing countermeasures easy and seamless for both security administrators and employees (email recipients). Additionally, it offers mobile applications for iOS and Android, allowing security administrators to access the IRONSCALES dashboard via the internet while on the go and respond with a single click, thereby reducing the response time for phishing email incidents. [Contact Information] Azgent Inc. E-mail: info@asgent.co.jp
Enhance security simply by adding it as an extension to your familiar browser!
- Other information systems
- Other security
We will introduce essential safety measures to prevent accidental information leaks!
- Other security
Introducing safety management measures related to information systems that serve as the business infrastructure of companies!
- Other security
We also introduce cases where individuals are excluded from personal information handling businesses!
- Other security
Many businesses are required to properly protect personal information!
- Other security
We will also introduce information to which "rights regarding personal information" do not apply!
- Other security
Shut out the entry of unrelated vehicles and suspicious vehicles, as well as the leakage of sensitive information!
- Other security
Introducing a highly scalable multifunctional type of video intercom that meets the diverse communication needs of various facilities!
- Color camera
- Other security
This is a collection of case studies on the implementation of the "IX System," which has overcome distance and equipment limitations to enable communication between remote locations and the introducti...
- Other security
Wouldn't you like to reduce the hassle of security and visitor management? Improve your operations with the 'IX System' for monitoring, crime prevention, and remote communication.
- Entrance and exit control system
- Other security
- Other operation management software
Compliant with the NDAA (National Defense Authorization Act). Definitely for government agencies and bidding projects!
- Surveillance Camera System
- Surveillance Cameras
- Other security
Automatically recognizes faces and enables real-time mosaic processing. While capturing clear footage with surveillance cameras, privacy is well protected!
- Other security
- Other PCs and OA equipment
- Surveillance Camera System
Remote monitoring is possible even without LAN wiring or network environment.
- Surveillance Camera System
- Other security
- Other PCs and OA equipment
Latest network cameras (AI cameras, etc.), coaxial cameras, recorders, surveillance monitors, and more are featured!
- Other security
- Other PCs and OA equipment
- Surveillance Camera System
The number of remote workers using connected safety solutions will reach 2.3 million in 2024.
- Other security
- others
NG USB Guard | USB security for factories and industries! Achieve safe operations with data protection and virus prevention, and prevent unauthorized access.
- Other security
- Virus software
Frontegg provides industry-leading customer ID management solutions (SSO/CIAM).
- Other security
No annual contract required! A must-have product for companies with a privacy mark!
- Software (middle, driver, security, etc.)
- Other security
A printing log collection solution that enhances security and prevents information leakage by saving images of printed materials.
- Printer
- Ink/Toner
- Other security
Minimize operational burdens! We can contribute to the efficiency and advancement of aviation obstruction light maintenance operations.
- Other security
Monitoring of aviation obstruction lights: Minimizing operational burden! We can contribute to the efficiency and advancement of aviation obstruction light maintenance operations.
- Other security
Utilizing tokenbase as the foundational system for STO! Developing an STO platform.
- Software (middle, driver, security, etc.)
- Other security
- others
Notice of Participation in "NexTech Week 2025" from April 15 (Tuesday) to April 17 (Thursday), 2025.
Number One Solutions Co., Ltd. will be exhibiting at "NexTech Week 2025" held at Tokyo Big Sight. This exhibition is an event where companies looking to promote DX and individuals from various industries seeking the latest technologies will gather. We look forward to your visit.
In small companies, the personal information protection manager may check everything!
- Other security
Considering that information may flow between group companies, it is necessary to take measures to prevent the leakage of personal information!
- Other security
Explanation of who, when, to whom, and how it is done! Recommended qualifications for security personnel will also be introduced.
- Other security
An explanation of the four necessary educational contents for the P Mark, as well as the flow of employee training for the operation and implementation of the P Mark!
- Other security
An explanation of what types of outsourcing partners handle personal information and how to evaluate these partners!
- Other security
Why do drone intrusions occur in prohibited areas? Explanation of causes and countermeasures!
- Other security
Providing a solution that requires no wiring and is easy to install! Welcome to the next level of guest connectivity.
- Other security
Create safe, flexible, and strategic added value! Let's simplify access management.
- Other security
We will also build a firewall as a measure to prevent information leakage!
- Other security
[Currently showcasing construction examples] Achieving a barrier-free gate that allows passage for wheelchairs and carts! Lane width and length can be selected according to the security level!
- Other security
High-performance dimple key cylinder capable of assembling a master key system.
- Other security
Countermeasures against thumb turn manipulation - Kaba Safety Thumb Turn
- Other security
Barrier-free model available! Achieve smooth entry and exit management in crowded building and office entrances! Outdoor installation is also possible!
- Other security
No power supply or batteries needed! Easy setup with just the numeric keypad operation for push button access control.
- Other security
Automated security gates at openings such as main entrances, factories, and parking lots! Remote operation settings are possible, achieving cost reduction through automation!
- Other security
"Fookes Software," a professional powerhouse tool that pursues the efficiency of digital operations.
- Other security