List of Other security products
- classification:Other security
1126~1170 item / All 1811 items
Achieving a safe and secure network environment! Measures against indiscriminate and merciless cyber attacks.
- Other safety equipment
- Other security
COMODO is a cloud-based solution that can be easily integrated into existing email infrastructure.
- Virus software
- filtering
- Other security
Cloud-based solution that blocks advanced threats such as endpoints from COMODO.
- Virus software
- filtering
- Other security
Fire Detection System FDS
- Other temperature and humidity measuring instruments
- Image analysis software
- Other security
Quickly respond to critical issues! We won't miss serious errors in infrastructure equipment.
- Other security
The arrival of "IoT" in apartment living! A monitoring center will continue to watch over your life.
- Remote Control
- Surveillance Camera System
- Other security
No need for patrol monitoring! Work style changes because you can check from anywhere with your smartphone.
- Remote Control
- Surveillance Camera System
- Other security
Reduce processing time by 30% compared to fingerprint authentication! Accurately track attendance at construction sites using facial recognition!
- Entrance and exit control system
- Other security
All-in-one security solution that integrates all features.
- Other security and surveillance systems
- Other security
Face/palm/fingerprint/card/password compatible! Temperature measurement compatible hybrid authentication terminal.
- Other security
- Other security and surveillance systems
- Personal authentication
Equipped with multiple authentication modes! An access control management system that significantly alleviates inventory pressure.
- Other security
- Other security and surveillance systems
- Personal authentication
Made of stainless steel for excellent durability! Easy to operate with a control panel featuring an LCD screen.
- Other security
- Other security and surveillance systems
- Personal authentication
Helps eliminate hygiene concerns! Face and palm authentication and fever detection terminal.
- Other security
- Other security and surveillance systems
- Personal authentication
Utilize objective records to grasp work conditions! It can be useful for employee health management.
- Personnel and Labor
- Other security
- Software (middle, driver, security, etc.)

[Held on 11/19] 'e-Employment OasiS Solves the Challenges of Attendance Management Environment Changing in the Telework Era!'
This webinar will focus on the theme of "e-Employment OasiS × Telework," introducing how we can solve the challenges of attendance management during telework with e-Employment OasiS. ◆ Webinar Overview ◆ - Seminar Title: "e-Employment OasiS" Solves the Challenges of Attendance Management in the Era of Telework! - Date: November 19 (Friday) 13:00 - 13:30 * This will be a 30-minute seminar, so please feel free to join. - Cost: Free - Application Deadline: November 18 (Thursday) 18:00 【Recommended for】 ■ Those who want to obtain objective records of employees during telework ■ Those who want to know who is working on-site even during telework ■ Those who want to reimburse commuting expenses based on actual costs rather than a fixed amount ■ Those who want to clock in safely and securely even when coming to the office 【How to Apply】 Please visit the e-Employment OasiS website. https://www.nds-tyo.co.jp/e-oasis/ * This webinar will use the web conferencing system Zoom. We will send the webinar URL via email later. We sincerely look forward to your participation.
A lineup of card issuance software tailored to various applications!
- Other security
- Personal authentication
- Other security and surveillance systems
AI technology patented analyzes malware at the DNA level!
- Software (middle, driver, security, etc.)
- Other security
Experts will take on the minimum necessary security! We are starting a shared security service.
- Other security
- Other services
- Temporary staffing business
Support for building a system to respond to security incidents!
- Other security
- Other services
It is possible to understand situations deemed vulnerable and analyze the business impact of identified risks.
- Other security
- Other services
It is possible to carry out operations with awareness of information security and to maintain security levels.
- Other security
- Other services
We can reduce security incidents and maintain and improve information security activities.
- Other security
- Other services
Always provides a high level of defense! Achieves high throughput with the uniquely developed processor FortiASIC.
- Other security and surveillance systems
- Other security
Easily manage in the cloud! About four times easier to connect than before, and stress-free even with an increase in IoT devices.
- Other security and surveillance systems
- Other security
Timely provision of OSS vulnerability information! You can maintain the security level of your system.
- Other security
- Integrated operation management
- Server monitoring and network management tools
We will introduce the architecture of IoT gateways and an architecture with enhanced security.
- Other security
- Server monitoring and network management tools
- Other server related
A cloud-based service that can accommodate flexible schedules such as spot diagnoses and regular check-ups.
- Other security
Cyber defense solution capable of detecting and blocking unknown threats using AI machine learning.
- Other security
Convert IP camera signals to video signals! Full HD compatible decoder!
- Video Recorder
- Other security
- Other security and surveillance systems
A platform that allows for diverse authentication methods for each door (PIN, IC card, fingerprint, face, mobile access) with customizable security levels!
- Other security and surveillance systems
- Other security
- Entrance and exit control system
A film that prevents information leakage through peeping on trains and in outdoor settings.
- Other consumables
- Other security
- Other office supplies
The benefits of Industry 4.0 and the balance of security! We present a white paper!
- Other embedded systems (software and hardware)
- Software (middle, driver, security, etc.)
- Other security

Exhibiting at Embedded World 2025 (Nuremberg, Germany) and introducing new features of CodeMeter Embedded.
From March 11 to 13, we will showcase the latest advancements in embedded security and licensing at the Open Source Automation Development Lab (OSADL) booth (Hall 4, Booth 168) during "Embedded World 2025" in Nuremberg, Germany. ■ Highlights of the exhibition - Expanded platform support: Support for ARM version of Microsoft Windows - License borrowing: Network licenses available temporarily offline - Live demo: Connection from CodeMeter Embedded to CodeMeter Cloud - Ongoing collaboration with OSADL: Strengthening the synergy between proprietary technology and open-source technology through collaboration
Contributing to the efficiency and cost reduction of payroll processing.
- Other information systems
- Internal Control and Operational Management
- Other security
Support for security and communication in offices, schools, hospitals, and apartments!
- Other security
Already available password lists and leaked information on the dark web can be investigated!
- Firewall and intrusion prevention
- Other security
It is a device for protection against ransomware for NAS with a completely new concept.
- Other security
To customers who cannot avoid the labor of security risk analysis: We can significantly reduce the effort required for the tedious task of creating security risk analysis reports through automation.
- Other security
The risk analysis results are clearer with our original four-level evaluation method!
- Other security
- Other services
It will serve as a powerful tool for the initial management of cybersecurity for overseas bases and business partners of the company.
- Other security
An English version of the tool based on IPA's "Security Risk Analysis of Control Systems" for strengthening cybersecurity at overseas bases and business partners.
- Other security
"ScreenChaser" - Preventing information leakage from PC display photography.
- Other security