List of Other security products
- classification:Other security
496~540 item / All 1828 items
Drip-proof mechanism (equivalent to IPX5), slim (13mm) surface-mounted design ◎ Random 10-key display with 7-segment notation.
- Other security
- Entrance and exit control system
Unexpected, yet assured peace of mind. Proven implementation in various industries across the country.
- Other security
It is possible to achieve both safety and convenience! It helps prevent loss and theft, as well as counterfeiting and impersonation. [Free materials available!]
- Other security
An alarm of 90 decibels will sound when the magnetic sensor and the main unit are separated.
- Other security
- Other office supplies
- others
Two tools collaborate! An integrated service for cybersecurity measures and support for work style reform.
- Virus software
- Firewall and intrusion prevention
- Other security
Visualize internal risks and challenges! It is important to raise each individual's security awareness.
- Other security
- Email/Fax transmission
A third-generation antivirus software that utilizes deep learning for cyber attack prevention.
- Virus software
- Firewall and intrusion prevention
- Other security
High-security system achieved at low cost.
- Other security
This is a digital locker lock ideal for delivery boxes. It uses a passcode for locking and unlocking.
- Other security
It is possible to set location restrictions that can be opened individually or by group even without an IC card! It is also suitable for storing important documents such as My Number!
- Other security
This is Lavish's new card reader that can be customized for free.
- Other security
- Entrance and exit control system
It is a card reader with a dedicated specification.
- Other security
- Entrance and exit control system
Explosion-proof network IP camera that has passed domestic explosion-proof certification, obtained international explosion-proof standard (IECEx), and can be used in Class 1 hazardous locations (Zone ...
- Other network tools
- Surveillance Cameras
- Other security
We will introduce the benefits of implementing CrackProof and its background.
- Other security

[Product Information Update] Reasons Why CrackProof is Chosen for App Security Measures
We have updated the product information. While introducing the points that have received high praise from our customers, we explained the benefits of implementing CrackProof and the background behind it. Please take a look.
Four different encryption algorithms are supported, including RC4, AES-128 in OFB mode, and AES-128 in CCM mode.
- Other security
We provide a safe business environment with "m-FILTER," which only receives secure emails.
- Email/Fax transmission
- Other security
We provide a safe work environment with "i-FILTER," which allows access only to secure websites.
- filtering
- Virus software
- Other security
Before Windows apps are affected, various protective features are added to prevent attacks and strengthen security!
- Other security
Before iOS apps are affected, various protective features are added to prevent attacks and strengthen security!
- Other security
Before Android apps are affected, various protective features are added to prevent attacks and strengthen security!
- Other security
Security software that protects applications from cracking (unauthorized analysis and tampering).
- Other security
We will introduce a case where cracking prevention was achieved through actual use!
- Other security
Introducing the security solution product "CrackProof" that protects apps from unauthorized attacks in a manga format!
- Other security
Before Android apps are affected, various protective features are added to prevent attacks and strengthen security!
- Other security
Usable in standalone mode or on a network, a compact and easy-to-use NFC card reader.
- Other security
Utilizing our proprietary know-how! Supporting your product business from cybersecurity.
- Other security
- Other services
Introduction to FIPS 140-2 Level Certified Smart Card-Based Authentication Devices
- Other security
I will explain the comprehensive support system of the app security measure tool "CrackProof."
- Other security

Product Information Update: Follow-up with Customers After the Introduction of 【CrackProof】
We have updated the product information. When selecting security products, many companies place great importance on whether there is a sufficient follow-up system after implementation. We have explained the follow-up system for CrackProof after implementation. Please take a look.
Are you worried or troubled about your company's response to app security? "CrackProof" will solve it!
- Other security

【Product Information Update】Resolving concerns about in-house app security! "CrackProof"
We have updated our product information. Do you have any concerns or worries about your company's handling of app security? We compared the advantages and disadvantages of having an in-house app security system and partnering with a specialized company that has app protection technology to implement measures. Please take a look.
Providing reassurance to consumers and managing products with a strong traceability system in case of defective products.
- Production Management System
- Other security
- Other security and surveillance systems
Introduction to an integrated ID authentication platform that allows anyone to easily and reliably determine the authenticity using a smartphone.
- Other network tools
- Other security
- label
We support the development of cybersecurity talent that is truly useful in real-world situations.
- Other security
- Business Skills Seminar
- Management Seminar
Preparing for security threats starts with "monitoring the health of your IT environment." Are you aware of your company's IT health status?
- Other security
- Server monitoring and network management tools
- Integrated operation management