List of Other security products
- classification:Other security
541~585 item / All 1828 items
After implementation, security information will be automatically updated! A package of security measures necessary for small and medium-sized enterprises.
- Other security
Multi-layered defense measures against information leakage suitable for small and medium-sized enterprises! Protecting a company's information assets from external and internal threats.
- Other security
Solving issues such as missed detections and over-detections through the use of AI! Visualizing various communications.
- Other security
Covering the lifecycle of security measures with a single agent!
- Other security
It's easy to consider how to advance measures toward realization! Providing specific examples of measures based on risks.
- Other security
Leave the operation to us for a reduced burden! Please leave the management after implementation to our company as well.
- Other security
Achieving low prices through the use of cloud platforms! A high-quality automated cyber attack analysis system.
- Other security
New iPad 11-inch, compatible with 12.9-inch and various iPads!! This stylish and simple stand is the most popular at exhibitions and receptions!
- Other security
Continuous charging is possible by passing the cable through the back! Comfortable even in spaces with limited room.
- Other security
Compatible with our security wire! All functions of the iPad can be used even when locked.
- Other security
Fixed to the desk with a theft prevention clamp! Easy adjustment with smooth sliding action.
- Other security
Compatible with various Surface Pro and Surface Go models! Designed to allow full functionality even when locked.
- Other security
The arm length is a maximum of 25 cm with two joints! Tilt, pan, and swing to your preferred angle.
- Other security
The tilt angle is a user-friendly 60°! When the enclosure is locked, the keyboard is fixed.
- Other security
Tilt, rotate, stretch, and shrink! Easily adjustable to your preference.
- Other security
Vertical and horizontal rotation is possible, and installation is easy! The design prevents unauthorized removal.
- Other security
For mobile POS, shopping assistance services, self-checkouts, etc.! Balancing display and handheld operation.
- Other security
Available for various exhibitions such as shops, POS, reception, education, and healthcare!
- Other security
Designed with a non-removable feature, made of aluminum alloy! Compatible with 10.2-inch / 9.7-inch iPad.
- Other security
A stable base with a balanced weight! Compatible with our security wire.
- Other security
Compatible with 10.2-inch iPad! Can be combined with our desktop stands and floor stands.
- Other security
Simple and slim, securely fixed with screws! Organize cables inside.
- Other security
Considering breathability, part of the corners and back are open! Easy lock and release with a key.
- Other security
A compact size that won't get in the way when placed on a desk! We offer various applications tailored to different situations.
- Other security
Lightweight and compact! Achieves fast and high-precision authentication with a unique certification algorithm.
- Other security
Supports self-extracting archives and archives with multiple volumes! Guarantees the decoding of Word/Excel files.
- Other security
Create a management key for the Windows server to enhance security, collect operation logs, and log on to Windows users simply by inserting the key.
- Other security
- Other server related
- Other operation management software
A new standard for biometric authentication!
- Other security
Are you only feeling secure with security measures for the app and network protection?
- Other security

[Product Information Update] Is that security measure sufficient? - Vulnerabilities in app attacks and their countermeasures -
We have updated the product information. Are you only feeling secure with security measures for the app and network protection? Even if you have strong security measures for the network, there is a risk that cracking of the app (unauthorized analysis and tampering of the app) could enable attacks on the server. We explain this danger. Please take a look.
Products developed through various tests to protect important devices from theft!
- Other security
This is a solution for resilience measures (decontamination) for local governments!
- Other security
- Other security and surveillance systems
We will introduce case studies of companies that have implemented our product CrackProof and how to protect applications and software from attacks.
- Other security

[Product Information Update] Security Incident Cases in the Manufacturing Industry and Their Countermeasures
We have updated the product information. We will introduce case studies of companies that have implemented our product, CrackProof, and how to protect applications and software from attacks. Please take a look.
Fire alarm with 'flashing lights'! Effective not only for fires but also in factories and facilities where alarm sounds are difficult to recognize due to noise and other factors. [*Installation case s...
- Other safety equipment
- Other security
Integrating network functions and security functions in the cloud! High independence through dedicated containers.
- Other security
Install UTM (gateway security) at the network entrance for malware protection!
- Other security
- Other information systems
- Software (middle, driver, security, etc.)
We provide services for responding to ransomware infections, including incident response and breach diagnosis investigation services. We also handle responses for overseas locations and in short timef...
- Other security
- Virus software