List of Other security products

  • classification:Other security

46~90 item / All 1810 items

Displayed results

Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!

  • PRエリア.png
  • Other conveying machines

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A belt grinding machine that has been in use for about 50 years since 1973. In addition to trust and proven results, the lineup is also extensive.

  • Other machine tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
ベルト.png

Belt grinding machine "Veda Machine" has high durability and a wide range of service parts.

The "Bader Machine" is our belt grinder that boasts excellent polishing performance for each individual unit. By selecting models and types according to the shape and size of the workpiece, and by equipping it with a polishing belt suitable for the task, it can flexibly accommodate a wide variety of items across various fields. Please make extensive use of it for high-efficiency polishing and grinding, reduction of work time, labor-saving, and standardization of tasks. 【Lineup】 ■ Portable type BP-K (air motor type) ■ Made-to-order machine PC-1 (wheel centerless), BC (standard dust cover) ■ Installed type BM (basic type), SBA-1, BH-2 ■ Wheel type SBD-4S, SBD-7, BWd *For more details, please download the PDF or contact us.

Explaining the high probability of successful unauthorized access known as "trashing"!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

I will explain in detail the measures that cloud server administrators should take!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Points for maintaining a safe internet environment! An explanation of the types and risks when not used properly.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A detailed explanation of definitions, types, and countermeasures. This is useful information for those using IT equipment in the workplace.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Targeted attack emails are successful if they infect just one person. Let's conduct a participatory training exercise for everyone.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Would you like to prepare for compliance with the Cyber Resilience Act using 'Black Duck SCA', which supports OSS risk management and SBOM creation?

  • Software (middle, driver, security, etc.)
  • Other security
  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Solve high-risk backups, backup restoration, and inspection management by utilizing information system outsourcing services! From building backup systems to maintenance.

  • Storage Backup
  • Other contract services
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We will exhibit at the Kawasaki International Environmental Technology Exhibition 2024.

We will be exhibiting jointly with Vis Inc. at the 17th Kawasaki International Environmental Technology Exhibition. November 13 (Wednesday) - November 14 (Thursday), 2024: 2 days Kawasaki City Hall, 10:00 AM - 5:00 PM https://www.kawasaki-eco-tech.jp/ 【Planned Exhibits】 1. Information System Outsourcing Services - Kitting Services - Maintenance User Support Services - Backup Inspection and Construction Services - Industrial Waste, Used Goods Collection/Purchase, HDD Destruction/Data Erasure Services 2. Electronic Form Products for Obugyo/PCA 3. AI Image Detection and Support Services from U-IPath PoC 【Planned Products from Vis Inc.】 1. Electronic Form System "JoyCoMES RE" 2. Work Analysis and Improvement Tool "TimePrism" ★ We look forward to seeing you all.

A solution prepared for unexpected events! Introducing security and information management solutions.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The weather-resistant and waterproof permanent adhesive seal that can be used outdoors allows for the management of outdoor equipment, materials, and assets.

  • Other security
  • label
  • Packaging materials

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Achieving faster and smarter investigations: "CCL Digital Forensic Software"

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Monitoring the number of people in a specific area at low cost! What are the benefits of understanding the number of people?

  • screenshot.4859.jpg
  • screenshot.4856.jpg
  • screenshot.4857.jpg
  • screenshot.4858.jpg
  • ピープルカウント5.jpg
  • ピープルカウント6.png
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Eliminating the need for applying to take out digital cameras and transferring data to PCs increases work efficiency!

  • Other security
  • Image Transmission Equipment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Installing network infrastructure to support complex digital video transmission at each subway station!

  • Routers, Switches, and Hubs
  • Other security
  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We would like to introduce a case where the speed of information sharing within the company has significantly improved, allowing us to thoroughly implement the rules for handling shooting data!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Safe and secure to use even for telework! Prevents information leaks in advance and strengthens your business.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

No data is left on the device! Even if the device is lost, it can prevent the risk of information leakage.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

From security measures to disaster preparedness, we deliver "peace of mind" in any environment!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Manage all your locations, headquarters, and telework with iboss cloud! We solve the problems of small and medium-sized enterprises.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
webinar_bnr_security_date250916_common.png

[Tuesday, September 16] No more worries! Security measures for small and medium-sized enterprises practiced by a one-person IT department.

This voice is often heard in many small and medium-sized enterprises: "We don't have enough manpower," "We don't have a dedicated IT department," "We're worried about the burden of operations." For companies struggling with such concerns, it is crucial not to make mistakes with the "first step." In this webinar, we will clearly explain the features of the low-cost, fully managed service provided by the cloud-based security platform "iboss," aimed at IT personnel in small and medium-sized enterprises who are interested in Zero Trust but have not yet taken the plunge. Additionally, this webinar is co-sponsored by iboss Japan LLC and SB C&S Corporation, and will include a demo of the iboss dashboard, case studies, and the latest update information. We encourage those who are managing IT operations alone and executives to participate. We sincerely look forward to your attendance.

An electric destruction device capable of physically destroying HDDs and SSDs with 12 tons of hydraulic power. By simply changing the tool, it can also destroy magnetic tapes with one unit.

  • Data Erasing
  • Other security
  • Other server related

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
カッティングエッジ ストレージパンチャー STPN-30 square.jpg

The most recommended and ideal data destruction device right now is the physical destruction device, Storage Puncher STPN-30.

Methods for data erasure of unnecessary HDDs, SSDs, magnetic tapes, etc. are as follows: 1. Erasure software, 2. Electrical shock to erase magnetic data, 3. Physical destruction Pros and cons: 1. Erasure software Licensing fees are incurred each time data is erased, resulting in significant costs. 2. Electrical shock magnetic erasure Magnetic erasure devices are very heavy, making it difficult to reuse HDDs. It is also cumbersome to check again by re-inserting into a PC after processing. 3. Physical destruction The easiest, fastest, and cheapest method for erasing data on HDDs is to drill holes in the platters. The currently most recommended device is the physical destruction device Storage Puncher STPN30. What’s good about it: 1. Destruction power of up to 12 tons 2. Processing time of about 10 seconds 3. Hydraulic high-power destruction 4. Various destruction tools can be exchanged on one main unit, allowing for the destruction of HDDs, SSDs, and magnetic tapes. This is a world first. 5. Drills four holes in the HDD to destroy the platter 6. Even if the destruction bit is damaged, it can be easily replaced 7. Function to prevent the destruction shaft from coming out after destruction 8. SSDs are bent at 5mm intervals in a wavy pattern to break the circuit board and destroy the IC chips 9. Battery operation is possible even in places without power, enabling on-site work 10. Weight of about 18 kg

An electric device that physically destroys HDDs with 12 tons of hydraulic power and 4 destruction bits. By swapping the destruction tool, it can also destroy SSDs and magnetic tapes.

  • Data Erasing
  • Other security
  • Other server related

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
カッティングエッジ ストレージパンチャー STPN-30 square.jpg

The most recommended and ideal data destruction device right now is the physical destruction device, Storage Puncher STPN-30.

Methods for data erasure of unnecessary HDDs, SSDs, magnetic tapes, etc. are as follows: 1. Erasure software, 2. Electrical shock to erase magnetic data, 3. Physical destruction Pros and cons: 1. Erasure software Licensing fees are incurred each time data is erased, resulting in significant costs. 2. Electrical shock magnetic erasure Magnetic erasure devices are very heavy, making it difficult to reuse HDDs. It is also cumbersome to check again by re-inserting into a PC after processing. 3. Physical destruction The easiest, fastest, and cheapest method for erasing data on HDDs is to drill holes in the platters. The currently most recommended device is the physical destruction device Storage Puncher STPN30. What’s good about it: 1. Destruction power of up to 12 tons 2. Processing time of about 10 seconds 3. Hydraulic high-power destruction 4. Various destruction tools can be exchanged on one main unit, allowing for the destruction of HDDs, SSDs, and magnetic tapes. This is a world first. 5. Drills four holes in the HDD to destroy the platter 6. Even if the destruction bit is damaged, it can be easily replaced 7. Function to prevent the destruction shaft from coming out after destruction 8. SSDs are bent at 5mm intervals in a wavy pattern to break the circuit board and destroy the IC chips 9. Battery operation is possible even in places without power, enabling on-site work 10. Weight of about 18 kg

An electric physical destruction device that cuts LTO and other magnetic tapes with 12 tons of hydraulic power and cutting blades. By replacing the destruction tool, it is also possible to destroy HDD...

  • Data Erasing
  • Other security
  • Other information systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
カッティングエッジ ストレージパンチャー STPN-30 square.jpg

The most recommended and ideal data destruction device right now is the physical destruction device, Storage Puncher STPN-30.

Methods for data erasure of unnecessary HDDs, SSDs, magnetic tapes, etc. are as follows: 1. Erasure software, 2. Electrical shock to erase magnetic data, 3. Physical destruction Pros and cons: 1. Erasure software Licensing fees are incurred each time data is erased, resulting in significant costs. 2. Electrical shock magnetic erasure Magnetic erasure devices are very heavy, making it difficult to reuse HDDs. It is also cumbersome to check again by re-inserting into a PC after processing. 3. Physical destruction The easiest, fastest, and cheapest method for erasing data on HDDs is to drill holes in the platters. The currently most recommended device is the physical destruction device Storage Puncher STPN30. What’s good about it: 1. Destruction power of up to 12 tons 2. Processing time of about 10 seconds 3. Hydraulic high-power destruction 4. Various destruction tools can be exchanged on one main unit, allowing for the destruction of HDDs, SSDs, and magnetic tapes. This is a world first. 5. Drills four holes in the HDD to destroy the platter 6. Even if the destruction bit is damaged, it can be easily replaced 7. Function to prevent the destruction shaft from coming out after destruction 8. SSDs are bent at 5mm intervals in a wavy pattern to break the circuit board and destroy the IC chips 9. Battery operation is possible even in places without power, enabling on-site work 10. Weight of about 18 kg

Digital Forensic Suite "Arsenal Recon"

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Physically isolate cyber attacks on critical industrial control systems such as electricity, gas, and water supply.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
昭電.png

Notice of Participation in the Exhibition "Crisis Management Industry Exhibition 2017"

Showa Denko will exhibit at the "Crisis Management Industry Exhibition 2017" held at Tokyo Big Sight from Wednesday, October 11 to Friday, October 13, 2017. In the 【Security Corner】, we will showcase CMS and data diodes, while in the 【Disaster Prevention Corner】, we will introduce products and services for earthquake and lightning damage countermeasures. We also plan to hold presentations within the booth. <Exhibited Products> 【Security Corner】 CMS, data diodes, access control systems, etc. 【Disaster Prevention Corner】 Seismic isolation devices, earthquake-resistant goods, lightning risk assessment services, various SPDs, etc. <Special Website> Special content "Crisis Management Industry Exhibition Special Site" www.sdn.co.jp/special/riscon2017/ We invite you to visit and see our latest products and services.

A trap-type fence sensor that quickly detects and reports acts of climbing over fences and similar obstacles!

  • image_14.jpg
  • image_15.jpg
  • image_16.jpg
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
bnr_sg.gif

Notice of Participation in the 8th Smart Grid EXPO Exhibition

Showden will exhibit at the "8th Smart Grid EXPO" held at Tokyo Big Sight from February 28 (Wednesday) to March 2 (Friday), 2018. At this exhibition, we plan to showcase and introduce various related products, including battery system enclosures and shelters, as well as surge protective devices (SPDs) and connection boxes for photovoltaic (PV) systems designed to protect power conditioners (PCS) and various measuring instruments from lightning damage, along with trap-type fence sensors. Additionally, we will also have a presentation on PV solutions at the Showden booth. <Exhibited Products> ◯ Battery System Enclosure (Shelter) ◯ SPD for PV ◯ SPD for Power Supply ◯ SPD for Temperature and Solar Radiation Meter ◯ Connection Box for PV ◯ Trap-type Fence Sensor We invite you to visit us and see our latest products and services.

Safely and reliably protect important equipment from harsh external environments. We offer shelters boasting lightweight, high airtightness, high thermal insulation, and weather resistance, along with...

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Autonomous security operations & GRC platform "Simbian AI" for 24-hour cyber defense

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Improve the significant security vulnerability of "people"! Protect employees and the business.

  • Sophos Phish Threat2.png
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Filter

classification
Delivery Time
Location