List of Other security products
- classification:Other security
91~135 item / All 2112 items
Heat resistant up to 1200℃. We will custom-make high-performance insulation covers that ensure safety in the working environment!
- Glass
Easily understand and reduce the "hard-to-see risks" in the OT field!
- Virus software
- Other security
Support for the development of short-term, high-quality OT security policies and guidelines through the use of AI.
- Other security
Utilizing various OT network devices, we are building an OT system based on the concept of multi-layered defense!
- Other security and surveillance systems
- Other security
It is a highly reliable solution for businesses that supports everything from document verification to facial recognition and API utilization at Keesing Technologies.
- Other security
Installed at the network exit! Detects and automatically blocks unauthorized communication to the attacker's command server.
- Other security
- Firewall and intrusion prevention
A case where C2 communication, which is likely to occur after an intrusion, was detected and blocked to prevent data exfiltration!
- Other security
- Firewall and intrusion prevention
Summarize and reinforce the "external communication control, logs, reporting, and emergency response" required for client checks!
- Other security
- Firewall and intrusion prevention
Automatically block C2 communications! Simplify operations with notifications and monthly reports, supporting accountability.
- Other security
- Firewall and intrusion prevention
Examples of exit strategies to meet security requirements as a business partner or contractor!
- Other security
- Firewall and intrusion prevention
Block C2 communications that could lead to the exfiltration of design data! Strengthen the ability to respond to security demands from business partners.
- Other security
- Firewall and intrusion prevention
Detection of C2 server communication through a blacklist and automatic blocking! A case where explanations during client audits became easier.
- Other security
- Firewall and intrusion prevention
Preventing the risk of information leakage and exploitation after infection with export measures! Simplifying operations with notifications and monthly reports.
- Other security
- Firewall and intrusion prevention
Detect and automatically block C2 communications! Visualize the situation even for companies with multiple locations through notification emails and monthly reports.
- Other security
- Firewall and intrusion prevention
Prevent the expansion of damage that leads to factory shutdowns! Operations with notifications and monthly reports even in environments with thin information systems.
- Other security
- Firewall and intrusion prevention
Monitor and block C2 communications at the exit! Operations include automatic blocking, notifications, and monthly reports, allowing for management by a small team.
- Other security
- Firewall and intrusion prevention
Prevent information leaks and business interruption risks! Utilize notifications and monthly reports for audit and reporting responses.
- Other security
- Firewall and intrusion prevention
Automatically block C2 communications in logistics sites where operations cannot be halted! Accelerate initial response with notifications and understand operational status through monthly reports.
- Other security
- Firewall and intrusion prevention
A case where measures that can be "explained" were established not only for our own company but also as a position handling customer information!
- Other security
- Firewall and intrusion prevention
Prevent the leakage of confidential information! With notifications and monthly reports, it's easier to maintain operations even in environments with thin IT resources.
- Other security
- Firewall and intrusion prevention
Added exit strategies for industries with strict supply chain demands! Mitigating risks of platformization and information leakage.
- Other security
- Firewall and intrusion prevention
Upper Collision Warning System for Unic Vehicles
- Other safety and hygiene products
- Other safety equipment
- Other security
A security strategy that does not stop factory operations! An explanation of the 24-hour monitoring and response service.
- Other security
- Firewall and intrusion prevention
Introducing the management of PCs and storage media, data backup management, and the management of user IDs and passwords!
- Other security
Introducing helpful information about malware threats and their countermeasures!
- Other security
Introducing the security and security risks associated with the use of email!
- Email/Fax transmission
- Other security
Introduction to external and internal factors, and the initiatives that should be undertaken!
- Other security
Introduction to the basics of business management, information assets, and information security measures!
- Other security
Supports Japanese yen payments and invoice payments! One-stop support from implementation to operation.
- Other services
- Other security
Experienced professionals leverage their management skills to solve customers' problems!
- Other security
Comprehensive operational services to optimize your hybrid IT infrastructure environment.
- Other security
Visualizing cyber risks in contract management! Strengthening measures against information leaks.
- Other security
We support copyright protection and safe software development.
- Other security
Cyber resilience law measures mandated in 2027! Supporting OSS vulnerability assessments.
- Other security
Compliance with the Cyber Resilience Act mandated in 2027. Strengthening the security of payment systems!
- Other security
Supporting the enhancement of security for critical infrastructure in anticipation of the Cyber Resilience Act starting in 2027.
- Other security
Measures for supply chain vulnerabilities, compliance with the Cyber Resilience Act by 2027.
- Other security
Building a safe educational environment and protecting personal information. Supporting compliance with cyber resilience laws.
- Other security
Responding to the Cyber Resilience Law mandated in 2027! Visualizing software risks.
- Other security
Compliance with the Cyber Resilience Act mandated in 2027. Visualizing software risks.
- Other security
Measures against medical information leaks in anticipation of the Cyber Resilience Act of 2027. Visualizing software risks.
- Other security
Compliance with the Cyber Resilience Act mandated in 2027!
- Other security
Enhance fraud detection and comply with the Cyber Resilience Act.
- Other security
Reduce copyright risks of entertainment content through OSS/SBOM management.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses