List of Other security products
- classification:Other security
676~720 item / All 1807 items
The management of keys is dramatically improved by a high-functioning key box.
- Other security
- cabinet

Toraka Touch Pro has won the Red Dot Award.
The Traka Touch Pro series from Traka, a company based in the UK and part of the ASSA ABLOY Group, has won the Red Dot Product Design Award. Traka is a global leader in intelligent key management solutions, and the Traka Touch Pro series is one of its core products. The Traka Touch Pro series, an intelligent key cabinet system, features a sophisticated modern structure, and its sustainability-focused design establishes a new standard in the industry by creating robust, reliable, and secure solutions. The Red Dot Design Award, established in 1955, is one of the world's most prestigious design competitions, organized by the Design Center North Rhine-Westphalia in Germany. It consists of three categories: Product Design, Brand & Communication Design, and Design Concept, with over 18,000 entries from more than 60 countries worldwide.
If you are having trouble with RI law entry and exit management or access management, this is a key box that complies with the regulations concerning radioactive isotopes and similar substances.
- Other security
- cabinet
Warning of intrusion and unauthorized access
- Other security and surveillance systems
- Other measurement, recording and measuring instruments
- Other security
This explains "cracking," which is something you want to understand when considering security measures for your company's app.
- Other security
Instant measurement of surface temperature. Management of individuals through AI facial recognition is also possible.
- Other security
Authentication enhancement by combining two or more elements! Protecting business and data from security threats.
- Personal authentication
- Other security
Many domestic customers are using it! Introducing 'basic features', 'implementation benefits', and 'authentication methods'.
- Other security
Explaining the advantages and disadvantages of major authentication methods! Introducing 'Raku-nin,' which adopts a multi-authentication method.
- Personal authentication
- Encryption and authentication
- Other security
Strengthening security measures such as multi-factor authentication! Posting alerts from CISA.
- Encryption and authentication
- Other security
User operations are simple! Use a one-time password authentication token.
- Other security
Used like a physical key! No need to enter passwords or passcodes.
- Other security
This is an automatic reporting device that connects to general lines and PBX lines. It is equipped with 4 contact inputs for power failure reporting and power restoration reporting functions.
- Other security
Conduct attack analysis using AI and machine learning, score risk levels based on severity and credibility, and verify the normality of processes and abnormal communications.
- Other security
★Free webinar on cybersecurity measures to be held in April, now accepting reservations! An explanation of managed security services and vulnerability measures for network devices.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security

Regularly hold individual consultation sessions with network security professionals.
We will hold individual consultation sessions every Tuesday, where we will accept inquiries regarding issues and countermeasures related to network security. The target audience includes both end-user companies considering service implementation and companies considering sales partners. ■Overview of Individual Consultation Sessions Capacity: 1 group per week Target: ● Companies considering their own implementation and wishing to consult on issues and countermeasures related to network security ● Companies considering sales partners for security products
1CH H.264 4K (3840×2160/28fps) compatible video server
- Video Recorder
- Other security
- Other security and surveillance systems
We will prevent the loss or unauthorized removal of important documents and samples!
- Other security
- Entrance and exit control system
Introducing practical log management tips compiled by a SOC operator with 20 years of experience.
- Other security
- Integrated operation management
- Server monitoring and network management tools
Cyber attacks occur every 13 seconds! Here is a guide to a white paper explaining security measures that do not create operational gaps!
- Integrated operation management
- Server monitoring and network management tools
- Other security
Start immediately with SaaS! Visualize security risks and work conditions from Microsoft 365 logs!
- Other security
- Other operation management software
- Server monitoring and network management tools
Prevent information leakage! If you have a large number of domains to register, there is a bulk registration feature!
- Other services
- Other security
- Server monitoring and network management tools
Integrated monitoring and analysis! It will serve as a concrete aid in reducing phishing email countermeasures!
- Other services
- Other security
- Server monitoring and network management tools
A platform that can send emails! Introducing the reporting features.
- Other services
- Other security
- Server monitoring and network management tools
It is possible to set up triggers for alerts, such as changes to DNS resource records!
- Other services
- Other security
- Server monitoring and network management tools
It is also possible to output as a PDF file as a report. Introducing the features of PowerDMARC!
- Other services
- Other security
- Server monitoring and network management tools
Instead of directly setting it in DNS, centrally manage various settings on the PowerDMARC portal site!
- Other services
- Other security
- Other server related
Clearly indicate to users that measures against phishing emails are being taken by displaying the company logo!
- Other server related
- Other security
- Server monitoring and network management tools
Complete the encryption of the email delivery route along with SMTPS, POPS, and IMAPS!
- Other server related
- Other security
- Server monitoring and network management tools
Explicit processing notification and audit for SPF and DKIM authentication failures!
- Other server related
- Other security
- Server monitoring and network management tools
Guarantee of the sender's authenticity and the integrity of the message content using public key cryptography!
- Other server related
- Other security
- Server monitoring and network management tools
Register your legitimate email server for your own domain! Introducing examples of operation and limitations.
- Other server related
- Other security
- Server monitoring and network management tools
Ideal for IT security of manufacturing line management PC terminals! Standalone PC operation log management and device control software!
- Other security
Analyzing the logs of highly productive employees! Efficient shortcut settings and more become apparent.
- Other security
To build a better internet! Measuring and researching various CDNs throughout the year!
- Server monitoring and network management tools
- Other server related
- Other security
Performance, security, reliability, analysis! Covering the necessary features according to the scale of the site!
- Server monitoring and network management tools
- Other server related
- Other security
Determining the priority of Cloudflare's TTL with a chart! Explained in an easy-to-understand way!
- Server monitoring and network management tools
- Other server related
- Other security
Guaranteed 100% operation! Introducing the differences in SLA between the Business plan and the Enterprise plan!
- Server monitoring and network management tools
- Other server related
- Other security
High technical skills that maximize functionality! Expert in CDN, providing meticulous support!
- Server monitoring and network management tools
- Other server related
- Other security
Plans you can choose based on the scale of your site and growth stage! We will introduce the differences in contract types!
- Server monitoring and network management tools
- Other server related
- Other security
Multi-year contracts are also available! The more years you sign up for, the higher the discount rate, and with a 6-year contract, you get one year for free!
- Other security
- Other services
Municipal website's 'shield'! The number of accesses that can be handled during a disaster is limitless!
- Server monitoring and network management tools
- Other server related
- Other security
We provide services to facilitate smooth migration! We will ensure the success of your project!
- Server monitoring and network management tools
- Other server related
- Other security
Differences between the three types of certificates! Introducing the differences in roles of SSL certificates and the differences in verification procedures!
- Other security
- Other services
Smart lock with 3D facial recognition
- Personal authentication
- Encryption and authentication
- Other security
Mitigating cyber threats to the entire Moxa system! A detailed explanation of the methods used.
- Other security