List of Other security products
- classification:Other security
46~90 item / All 2149 items
It won't break even after 1 million repetitions! A mat switch with reliable operation, high durability, and low price. Suitable for options in machine tools as well. Please consult us about delivery t...
- Sensors
<Column demonstration in progress> Analyzing aggregate and drug-antibody ratio (DAR) using SEC column and HIC column.
- Chromatographic resins and packing materials
We have launched a video distribution site for pharmaceutical companies.
We are distributing topics that are particularly noteworthy in the biopharmaceutical industry in an on-demand video format. We will regularly update the latest videos, so please take this opportunity to watch them. 【Register to view here】 *Please copy the URL and watch it in your browser. https://portal.stream.jp/eqk212ojxt
A security strategy tailored to your environment, realized with the support of an SE!
- Other security
Easily understand and reduce the "hard-to-see risks" in the OT field!
- Virus software
- Other security
Support for the development of short-term, high-quality OT security policies and guidelines through the use of AI.
- Other security
Utilizing various OT network devices, we are building an OT system based on the concept of multi-layered defense!
- Other security and surveillance systems
- Other security
It is a highly reliable solution for businesses that supports everything from document verification to facial recognition and API utilization at Keesing Technologies.
- Other security
Damage from ransomware infections is still on the rise. A slight improvement in convenience can lead to unexpected risks. Let's be mindful of implementing multi-layered intrusion prevention and inform...
- Firewall and intrusion prevention
- filtering
- Other security
Installed at the network exit! Detects and automatically blocks unauthorized communication to the attacker's command server.
- Other security
- Firewall and intrusion prevention
A case where C2 communication, which is likely to occur after an intrusion, was detected and blocked to prevent data exfiltration!
- Other security
- Firewall and intrusion prevention
Summarize and reinforce the "external communication control, logs, reporting, and emergency response" required for client checks!
- Other security
- Firewall and intrusion prevention
Automatically block C2 communications! Simplify operations with notifications and monthly reports, supporting accountability.
- Other security
- Firewall and intrusion prevention
Examples of exit strategies to meet security requirements as a business partner or contractor!
- Other security
- Firewall and intrusion prevention
Block C2 communications that could lead to the exfiltration of design data! Strengthen the ability to respond to security demands from business partners.
- Other security
- Firewall and intrusion prevention
Detection of C2 server communication through a blacklist and automatic blocking! A case where explanations during client audits became easier.
- Other security
- Firewall and intrusion prevention
Preventing the risk of information leakage and exploitation after infection with export measures! Simplifying operations with notifications and monthly reports.
- Other security
- Firewall and intrusion prevention
Detect and automatically block C2 communications! Visualize the situation even for companies with multiple locations through notification emails and monthly reports.
- Other security
- Firewall and intrusion prevention
Prevent the expansion of damage that leads to factory shutdowns! Operations with notifications and monthly reports even in environments with thin information systems.
- Other security
- Firewall and intrusion prevention
Monitor and block C2 communications at the exit! Operations include automatic blocking, notifications, and monthly reports, allowing for management by a small team.
- Other security
- Firewall and intrusion prevention
Prevent information leaks and business interruption risks! Utilize notifications and monthly reports for audit and reporting responses.
- Other security
- Firewall and intrusion prevention
Automatically block C2 communications in logistics sites where operations cannot be halted! Accelerate initial response with notifications and understand operational status through monthly reports.
- Other security
- Firewall and intrusion prevention
A case where measures that can be "explained" were established not only for our own company but also as a position handling customer information!
- Other security
- Firewall and intrusion prevention
Prevent the leakage of confidential information! With notifications and monthly reports, it's easier to maintain operations even in environments with thin IT resources.
- Other security
- Firewall and intrusion prevention
Added exit strategies for industries with strict supply chain demands! Mitigating risks of platformization and information leakage.
- Other security
- Firewall and intrusion prevention
Upper Collision Warning System for Unic Vehicles
- Other safety and hygiene products
- Other safety equipment
- Other security
It is a bidirectional proximity warning system that detects the approach of heavy machinery and workers using "ultrasonic" and "radio waves."
- Other security
- Laser Components
- Other safety and hygiene products
A security strategy that does not stop factory operations! An explanation of the 24-hour monitoring and response service.
- Other security
- Firewall and intrusion prevention
Introducing the management of PCs and storage media, data backup management, and the management of user IDs and passwords!
- Other security
Introducing helpful information about malware threats and their countermeasures!
- Other security
Introducing the security and security risks associated with the use of email!
- Email/Fax transmission
- Other security
Introduction to external and internal factors, and the initiatives that should be undertaken!
- Other security
Introduction to the basics of business management, information assets, and information security measures!
- Other security
Supports Japanese yen payments and invoice payments! One-stop support from implementation to operation.
- Other services
- Other security
While it is impossible to completely prevent the intrusion of information-gathering malware, let's effectively use data diodes (OWCD) as a communication restriction to protect ourselves from reconnais...
- Firewall and intrusion prevention
- Other security
- filtering
Experienced professionals leverage their management skills to solve customers' problems!
- Other security
To securely obtain information in the supply chain, there are methods like this that can strengthen cybersecurity even with partners at different levels of response.
- Firewall and intrusion prevention
- filtering
- Other security
Comprehensive operational services to optimize your hybrid IT infrastructure environment.
- Other security
Preventing the leakage of intellectual property and illegal copying with software protection. Contributing to the monetization of software with a flexible licensing model.
- Other security
The compatibility of Zero Trust and data diodes is actually outstanding! The number of adoption cases is steadily increasing. Let's make visible progress!
- Other security
- Firewall and intrusion prevention
- filtering
Visualizing cyber risks in contract management! Strengthening measures against information leaks.
- Other security
We support copyright protection and safe software development.
- Other security
Cyber resilience law measures mandated in 2027! Supporting OSS vulnerability assessments.
- Other security