List of Other security products
- classification:Other security
136~180 item / All 1824 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
It won't break even after 1 million repetitions! A mat switch with reliable operation, high durability, and low price. Suitable for options in machine tools as well. Please consult us about delivery t...
- Sensors
Explanation of the significantly revised P Mark examination criteria as of April 1, 2022!
- Other security
The solution is technology against A-DDOS, such as the establishment of identity access management!
- Other security
Supply and install DDoS attack devices for customers, and perform software configuration!
- Other security
Using technologies such as Kali Linux and Wireshark! Identify vulnerabilities early and take measures before they can be exploited.
- Other security
Using SOAR, SIEM, UEBA, and packet analysis technologies! Implementing information leakage prevention systems and disaster recovery systems.
- Other security
We will introduce how both the public and private sectors can work together to confront cyber attacks.
- Other security
Even in difficult situations for recognition, real-time matching with millions of face databases is possible!
- Other security and surveillance systems
- Personal authentication
- Other security
Attention companies struggling with compliance to the JAMA/JAPIA Cybersecurity Guidelines! We offer support for the introduction and operation of countermeasure products!
- Other security
Reliable security! Smart lock with self-locking mechanism for slide bypass.
- Other security and surveillance systems
- Other security
- Other office supplies
Double monitoring of temperature anomalies and power anomalies in cold storage for COVID-19 vaccines!! <Ideal for early detection and prevention of malfunctions and issues>
- Other environmental equipment
- Other security
- Data Logger

Case Study: Miura City Hall, Kanagawa Prefecture - Introduction of "Ultra-Low Temperature Freezer Monitoring Solution" to Prevent Vaccine Waste ★ Monitoring of Freezer Temperature & Power Supply + Power Backup System (Note 1)
Utilizing the "Ultra-Low Temperature Freezer Monitoring Solution," a system that automatically monitors temperature and power abnormalities in freezers for storing COVID-19 vaccines, the Miura City Hall is implementing measures to prevent vaccine disposal. This initiative, which involves the introduction of a system that monitors both temperature and power, is one of the few of its kind in the country. <Purpose of Implementation> To monitor temperature and power abnormalities in freezers and ultra-low temperature freezers (deep freezers) storing COVID-19 vaccines, in order to prevent vaccine disposal accidents caused by power outages, equipment malfunctions, and human errors. <Results of Implementation> The system operated during power outages, allowing vaccines to be stored without compromising quality. Additionally, the vaccine storage environment (internal temperature and power abnormalities) can now be checked from smartphones and PCs, leading to reduced work hours for staff and improved operational efficiency. <Freezers monitored by the system at Miura City Hall> - One unit from Japan Freezer Co., Ltd. - One unit from PHC Corporation *For details about the system, please refer to the product PDF. *For more information, visit our company website or the Ipros introduction page. <Note 1> With a 270W freezer, the standard configuration provides 2 hours and 45 minutes of backup. In the maximum configuration (with two additional battery units), it can provide 5 hours and 5 minutes of backup.
Enhancing Defense with Threat Intelligence and Attack Simulation 'Filigran'
- Other security
An industrial switching hub equipped with managed features that contribute to network management, control, and improved reliability, such as VLAN and QoS!
- Routers, Switches, and Hubs
- VPN/Wide Area Ethernet
- Other security

Introducing the new CC-Link IE TSN compatible industrial managed hub "SH-9210TSN" equipped with rich managed features, dual power supply support for DC power input, and SFP slots.
Contec Co., Ltd. has started selling the "SH-9210TSN," an industrial managed switching hub that has obtained CC-Link IE TSN recommended network wiring component certification Class B. It features dual power supply redundancy, a DC power input, eight gigabit ports, and two SFP slots. The SH-9210TSN complies with IEEE 802.3ab (1000BASE-T), IEEE 802.3u (100BASE-TX), and IEEE 802.3 (10BASE-T) standards, and is designed for use in environments where quiet operation and long lifespan are required due to its fanless design. Additionally, it achieves an operating temperature range of -10 to 65°C thanks to its excellent heat dissipation metal casing. It can be installed on a 35mm DIN rail or mounted on walls using various mounting brackets. In addition to a wide-range DC power input (12-48VDC), it supports input from two power supply lines and includes various managed functions for network management, control, and reliability enhancement.
We will also introduce the construction and operation of ISMS! Please use this to assist you in preparing for strengthening information security.
- Other security
We will also introduce an overview of the logo, the design concept, and the correct usage!
- Other security
We will also introduce sensitive personal information in the context of personal information protection!
- Other security
Explanation of the three elements of confidentiality, integrity, and availability, and the four elements of authenticity, reliability, accountability, and non-repudiation!
- Other security
Explaining what consultants do and what to watch out for when choosing a consulting firm!
- Other security
Introducing cases of ransomware damage, internal fraud, and unauthorized use of credit card information!
- Other security
This is useful information for those who use online shopping sites, so please read it all the way to the end!
- Other security
We will also introduce consulting fees and security measures costs!
- Other security
We will also introduce tips and tricks for achieving project success!
- Other security
We also introduce recommended qualifications for security personnel! Please use this as a reference for obtaining qualifications.
- Other security
We will also introduce the necessity of regularly changing passwords and points to be careful about in management!
- Other security
We will also introduce the details of internal audits and the benefits of using checklists!
- Other security
We will also introduce the supervision and evaluation criteria formulation for the contractor, as well as the conclusion of contracts with the contractor!
- Other security
An explanation of the evaluation methods for contractors and the frequency of checks on their information security systems!
- Other security
We will also introduce who conducts the internal audit and who receives the internal audit!
- Other security
Security solutions tailored to our company's security policy!
- Software (middle, driver, security, etc.)
- Other security
It is a high-performance network video recorder capable of executing AI image recognition at high speed. It is a product equipped with VMS and AI functions that can be executed independently by the de...
- Surveillance Camera System
- Video Recorder
- Other security
We capture and detect the license plates of moving vehicles from network camera footage!
- Image analysis software
- Other security
- Surveillance Camera System
Defend your website against various threats such as web attacks, information leaks, and website tampering, and verify the history through analysis reports!
- Other security
Easily verify and record official identification! We support reading tasks.
- Software (middle, driver, security, etc.)
- Other security
- Other inspection equipment and devices
"ID SakuSaku Lite," which supports the reading of official identification documents easily and without leaving a record.
- Software (middle, driver, security, etc.)
- Other security
- Other inspection equipment and devices
"Authentic8," a web-based platform for freedom and security that protects browsers with cloud isolation and blocks threats with zero trust.
- Other security
Solving various challenges in SBOM and vulnerability management!
- Other security
Frictionless IDS/IPS that eliminates the need for large-scale renovations of the entire system!
- Other security
We will quickly and reliably build the optimal cloud environment for your business and provide a secure IT infrastructure.
- Integrated operation management
- Other security
Add "advanced malware protection features" and "remote device management capabilities" to the backup!
- Other security
It is now possible to manage the patch application targets, timing, and frequency in detail based on the policy!
- Other security
By being able to prioritize effectively for patching work and focus only on what is important, operational efficiency is further improved!
- Other security
A lineup of seven types of products, including a workspace for IT analysts (device status, remote control)!
- Integrated operation management
- Other security
Utilizing Intercept X technology! An advanced endpoint security solution powered by AI.
- Other security