List of Other security products
- classification:Other security
856~900 item / All 1809 items
By centrally managing vehicle entry and exit, including passengers, as well as pedestrian entry and exit, we will enhance security, simplify reception duties, and alleviate congestion.
- Other security
Deterrence and prevention through restraint! Differences from the actual item can be judged for authenticity with the naked eye or simple devices.
- Other security
- Printing/Publishing
- others
Reasonable price and durability! Lockout is possible in a wide range of scenes! It is expected to have a significant effect on improving safety in the work environment.
- Other security
- Other security and surveillance systems
- Other safety and hygiene products
Since it is a resin-made padlock, it ensures a safer working environment without the worry of sparks or electrical conduction. It is an OSHA-compliant product with excellent corrosion resistance and n...
- Other security
- Other security and surveillance systems
- Other safety and hygiene products
Windows login enters the passwordless era! Protected with advanced security.
- Encryption and authentication
- Other security
High security with low operational load! Introducing a very powerful and user-friendly solution!
- Other security
- Other operation management software
Introduction of a case where a camera + AI solution was built to inform in real-time about the office congestion status.
- Entrance and exit control system
- Other security
- others
A whitelist with no loopholes shuts out viruses and malicious software!
- Other security
Measures for proper device operation! Elimination of personal USB memory devices, etc. / Support for individual management of company USB memory devices.
- filtering
- Other security
Thorough measures against information leaks! Complete management of all removable media and device access.
- filtering
- Other security
Achieving SASE (Secure Access Service Edge) that simply integrates SD-WAN and network security!
- VPN/Wide Area Ethernet
- Firewall and intrusion prevention
- Other security
We provide custom-made web systems and websites tailored to our customers!
- Other information systems
- Other security
- Other server related
Break away from the state of managing only with ID and password, and achieve detailed permission management!
- Other security
- Other information systems
Suitable for tracking many non-powered assets such as valuables, wire reels, tools, and construction machinery.
- Other security
- Communications
Email distribution to the registered guardians' addresses! It also includes a mass email distribution feature for guardians and staff.
- Software (middle, driver, security, etc.)
- Other security
- Entrance and exit control system
Centralized management of Forescout deployment across the entire extended enterprise!
- Other security
We will enhance threat response capabilities across the entire enterprise!
- Other security
We will confidently design, build, and deploy large-scale network segmentation!
- Other security
Implement policy-based controls and automate! Respond quickly to incidents.
- Other security
You can gain our unique insights into the overall picture of the device without interrupting business processes!
- Other security
Use commercially available USB devices as keys for PCs to lock unauthorized operations on Windows Server. It also supports USB connection restrictions for smartphones.
- Encryption and authentication
- others
- Other security
Create an encrypted disk with simple operations by following the wizard.
- Encryption and authentication
- Other security
- others
Standard functions are prepared from sensing to data control, communication, alarms, and graphing! We achieve continuous operation for over one year with original devices.
- Other information systems
- Other security
In addition to excellent authentication accuracy, it allows for the registration of up to 100,000 fingers.
- Personal authentication
- Other security
This is a charging storage unit that can charge and store up to 10 units in delivery services, apparel shops, supermarkets, factories and production sites, warehouses and logistics, hospitals, etc.
- Other security
- Other PCs and OA equipment
- Office furniture
Early detection of falls, accidents, and sudden illnesses such as heatstroke!
- Other security and surveillance systems
- Other security
- Image analysis software
From entrance management to the front doors of apartments and private homes! It combines a sense of security that cannot be faked or stolen with the convenience of not needing to carry keys.
- Personal authentication
- Other security
We introduce a plan where the DX system is available for 16,500 yen per account per month (tax included)!
- Other security
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
Windows environment restoration software to restore to the original state with reboot or shutdown.
- Software (middle, driver, security, etc.)
- Other security
High-speed transfer USB 3.1 Gen 1 (USB 3.0) compatible! A USB memory stick dedicated to protecting information for businesses.
- Other security
Just install it to thoroughly record operations on your Windows PC. No dedicated server required.
- Other security
- Other office supplies

Ideal for My Number measures! Launch of the PC operation log collection software "LB Access Log 2 Pro" equipped with monitoring features and no server required.
Lifeboat Co., Ltd. (President Takahiro Yamazaki, Chiyoda-ku, Tokyo, TEL 03-3265-1250, URL http://www.lifeboat.jp/) will start selling "LB Access Log 2 Pro" (LB Access Log 2 Pro), a software developed by Es Computer that does not require a dedicated server and can collect and monitor PC operation logs, starting from February 15, 2016, through various sales agents, with a standard price of 22,000 yen (excluding tax) and up. In addition to collecting operation logs, it features the ability to take screenshots and notify administrators when specific actions are performed, monitor network traffic to detect unexpected data transmissions, and restrict the use of USB devices, among other diverse functionalities. It is an ideal software for monitoring PCs and collecting operation logs, particularly for enhancing the security of PCs handling My Number information. ● For more details on LB Access Log 2 Pro, please visit http://www.lifeboat.jp/products/alog2p/.
Windows operation log collection software. Enhanced PC monitoring features. No server required.
- Other security
- others
Proposing security systems for nursing care facilities and hospitals!
- Other security
- others
Excellent security and operability! For customers considering dimple key cylinders.
- Other security
- others
Prevent unauthorized operation of the PC / Lock the PC / Support for two-factor authentication / Log in to Windows just by inserting the key
- Other security
- others
- Other services
You will be able to reduce the efficiency of daily email operations by 10 minutes a day, saving over 40 hours a year.
- Other security
- Email/Fax transmission
Adopting double monitoring with ICT and human oversight! If you haven't been watching the push notifications, we will contact you by phone from the monitoring center.
- Remote Control
- Surveillance Camera System
- Other security
A unit that restricts the flow of data in one direction and completely blocks cyber attacks from the outside! It safely transmits on-site data to the cloud.
- Other security
- server
Aiming for control that is independent of the connection environment! Introducing key points of privileged ID management in telework on the blog.
- Other information systems
- Other security and surveillance systems
- Other security
We are introducing examples of information leaks due to internal misconduct and three countermeasures on our blog!
- Other information systems
- Other security and surveillance systems
- Other security
We will introduce many examples of internal fraud countermeasures! Please use this to review the internal fraud countermeasures in your organization.
- Other information systems
- Other security and surveillance systems
- Other security