List of Other security products
- classification:Other security
811~855 item / All 1807 items
Touchless operation! It is possible to read all at once without touching with IC cards or entry permits.
- Entrance and exit control system
- Other security
- Personal authentication
It prevents lightning damage to equipment such as power conditioning units (PCUs) in solar power generation systems.
- EMC countermeasure products
- Control Panel
- Other security
Optimal infrared sensor for human detection at entrances, exits, and passageways.
- Other security and surveillance systems
- Other security
Achieving top-class ultra high cost performance in the industry! A human detection alarm system with high detection accuracy.
- Other security and surveillance systems
- Other security
- Other safety equipment
Trial registration and usage pack that eliminates the need for expensive capital investment.
- Other security
- Personal authentication
- Entrance and exit control system
The fingerprint authentication device has been incorporated into the IC card!
- Other security
All pages are SSL-enabled! It benefits both users and website operators.
- Other contract services
- Encryption and authentication
- Other security
EMV test card for brand certification!
- Testing Equipment and Devices
- Other security
Made-to-order product. Equipped with solar panels. This is a low-cost type of solar power device that does not require commercial power supply. Security cameras are optional.
- Other security
Made-to-order product. No commercial power supply required. It is a low-cost type of mobile solar power device. Security cameras are optional.
- Other security
Identify security vulnerabilities in source code! Reduce the risk of data leaks.
- Software (middle, driver, security, etc.)
- Other security
- Other services
We will identify vulnerabilities lurking in access management, authentication controls, and known configuration mistakes!
- Software (middle, driver, security, etc.)
- Other security
- Other services
Attempt to attack the target application and uncover hidden vulnerabilities!
- Software (middle, driver, security, etc.)
- Other security
- Other services
Identifying vulnerabilities that have a significant impact on business! We deliver high-value test results.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Two depths are available! You can choose the appropriate test level according to your risk profile.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Reduce the risk of data leaks! We have resources that can quickly respond to changes in scale.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Support for compliance with security and regulations! Experience immersive continuous learning.
- Software (middle, driver, security, etc.)
- Other security
- Distance learning/E-learning
Addressing software risks lurking in various places! Accelerating the delivery of secure and high-quality code.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Total support for application security from development to deployment!
- Software (middle, driver, security, etc.)
- Other security
Manage all test execution, policy application, prioritization of issues, and filtering!
- Software (middle, driver, security, etc.)
- Other security
Establish security and compliance as part of the normal business process!
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
You can quickly identify and fix critical security and quality issues while coding!
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Introducing a solution to detect and fix security vulnerabilities during coding!
- Software (middle, driver, security, etc.)
- Other security
Diagnosing software risks throughout the SDLC with a single record system for AppSec data!
- Software (middle, driver, security, etc.)
- Other security
We enable comprehensive open-source risk management regardless of your company's size or budget!
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Identify software security vulnerabilities! This enables informed and reliable decision-making based on information.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Manage risks related to security, licensing, and code quality! Introduction to SCA solutions.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Identify and exploit critical vulnerabilities for business to reduce the risk of leaks!
- Software (middle, driver, security, etc.)
- Other security
Accurately identify and verify vulnerabilities! You can grasp the URL detection and coverage of web applications at a glance.
- Other security
- Software (middle, driver, security, etc.)
- Other security and surveillance systems
Protecting logon to PC terminals with enhanced security! Reducing operational burden when using USB keys.
- Encryption and authentication
- Other security
Prevent information leaks caused by human error! This is a product that achieves cost performance.
- Encryption and authentication
- Other security
A USB dongle that achieves overwhelming cost performance!
- Other security
Static analysis (SAST) solutions by industry leaders. Quickly identify and fix security and quality issues during coding.
- Other security
When not in use, disconnect it! Simply turn the key to cut off the connection, making it easy to manage the LAN cable connection!
- Other security
Protect your laptop with a U-shaped bracket! You can use it in its normal form by removing the bracket!
- Other security
Close the ports for DVD and USB connections! It is also effective in maintaining a defensive posture when in use!
- Other security
Eliminate the anxiety of an unmanned factory at night! In case of fire, illegal intrusion, or abnormalities in important equipment, we will issue an emergency alert! LINE integration is now possible!
- Other security and surveillance systems
- Other security
By centrally managing vehicle entry and exit, including passengers, as well as pedestrian entry and exit, we will enhance security, simplify reception duties, and alleviate congestion.
- Other security
Deterrence and prevention through restraint! Differences from the actual item can be judged for authenticity with the naked eye or simple devices.
- Other security
- Printing/Publishing
- others
Reasonable price and durability! Lockout is possible in a wide range of scenes! It is expected to have a significant effect on improving safety in the work environment.
- Other security
- Other security and surveillance systems
- Other safety and hygiene products
Since it is a resin-made padlock, it ensures a safer working environment without the worry of sparks or electrical conduction. It is an OSHA-compliant product with excellent corrosion resistance and n...
- Other security
- Other security and surveillance systems
- Other safety and hygiene products
Windows login enters the passwordless era! Protected with advanced security.
- Encryption and authentication
- Other security