List of Other security products
- classification:Other security
1036~1080 item / All 1807 items
Many facilities that prioritize security have adopted it! Promises reliable operation even in harsh environments.
- Other security
- Other security and surveillance systems
Easy! Reduce the risk of information leakage! Prevent screen captures, screenshots, and unauthorized printing. Mitigate the risk of information leakage from PC screens and printed materials.
- Other security
2 million pixel auto-focus IP bullet camera with 10x optical zoom
- Other security
Easily manage your software supply chain with "HERCULES SecSAM."
- Software (middle, driver, security, etc.)
- Other security
Can be mounted on various devices and equipment! Reference model for information terminals for embedded devices.
- Other information systems
- Other security
We offer a service that detects, notifies, and shares information about illegally parked vehicles using "AI + security cameras" at a low price!
- Other security
This is an essential tool for white hat hackers, featuring a palm-sized Raspberry Pi 4B equipped with the well-known vulnerability testing tool Kali.
- Other security
Access is not allowed until all workers on the project remove the padlock!
- Other security and surveillance systems
- Other security
- Other safety and hygiene products
Provides maximum security when used in combination with the 312 series padlock!
- Other security
- Other security and surveillance systems
- Other safety and hygiene products
Achieve a discreet and smart installation with embedded design! Up to 2000 users can be registered!!
- Other security
- Entrance and exit control system
Achieve a discreet and smart installation with embedded setup! Up to 3000 users can be registered!!
- Other security
- Entrance and exit control system
Just issue and register your own QR code! A popular QR code reader that can scan codes.
- Other security
- Entrance and exit control system
Just issue and register the QR code yourself! A popular QR code reader that can read QR codes.
- Other security
- Entrance and exit control system
Compact design handle lock! Easy to use during installation and storage!!
- Other security
Assisted GPS with over 1,000 continuous position searches and no need for charging for one month.
- Other security
IoT solution for safe remote maintenance of industrial PCs in factories.
- Other security
- Other network tools
[White Paper Available!] An analysis of the extent to which DMARC (Domain-based Message Authentication, Reporting & Conformance), a countermeasure against spoofing and security, is being adopted by in...
- Other security
Tamper-evident label that clearly shows whether it has been opened or not.
- Other security
- Other consumables
- label
Close the door and it auto-locks! To open it, just use the passcode! No power needed, so it's safe to use even during power outages or disasters—maintenance-free button lock.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
A lineup of distinctive technologies, including intrusion detection used in ship radar monitoring systems.
- Other security
The domestically produced cloud-based WAF Aegis, which requires no complicated setup or operation, supports the healthy growth of your company's web business.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Detect unauthorized use of your own domain! By understanding the existence and content of phishing emails, you can also prevent damage to customers and partners.
- Other security

TwoFive signs agency contract with DigiCert Japan and starts selling BIMI-compliant certification mark certificates.
TwoFive Inc. has entered into a sales agency agreement with DigiCert Japan LLC for the Verified Mark Certificates (VMC), which comply with the new email authentication technology known as the BIMI standard. Additionally, to enable the reflection of results in security measures after implementing DMARC, we provide a cloud service called "DMARC / 25 Analyze" that aggregates and visualizes DMARC reports, which report the authentication results on the email receiving side in an easy-to-understand manner. We support all companies and organizations that send emails to appropriately utilize DMARC and BIMI without requiring special expertise.
We detect and block cyber attacks on websites at a low cost. Equipped with an AI engine, it automatically responds to the latest attacks, eliminating the need for manual operation.
- Firewall and intrusion prevention
- Other security
- Software (middle, driver, security, etc.)
Recruiting agents and distributors! IT solution "NinjaConnect ISM" for the manufacturing industry that enables remote maintenance of industrial PCs.
- Other security
- Other network tools
Log in from your computer or mobile device! You can easily view it anytime, anywhere.
- Other information systems
- Internal Control and Operational Management
- Other security
It has been implemented in multiple factories of Wipro, one of the four major IT companies in India. A free trial is also currently available!
- Server monitoring and network management tools
- Other security
- Other network tools

We will be exhibiting at ITmedia Virtual EXPO 2021 in the fall!
e-Jan Networks will participate in the online exhibition "ITmedia Virtual EXPO 2021 Autumn" to be held in September 2021. At our online booth, you can view our remote maintenance solutions for factories. Since it is an online exhibition, anyone is welcome to join. ■ Exhibition Overview - Dates: September 1, 2021 (Wed) - September 30, 2021 (Thu) - Venue: Online - Participation Fee: Free - Organizer: ITmedia Inc. ■ What is NinjaConnect ISM? NinjaConnect ISM is a solution for remote maintenance of industrial PCs connected to factory networks. By installing a dedicated connector in the factory network, it enables remote maintenance without directly connecting the industrial PCs to the internet. It supports file transfers and log file storage, reducing costs associated with on-site maintenance, improving operational efficiency, and promoting digital transformation in the manufacturing industry.
Securely integrate information technology (IT) and operational technology (OT) to protect factory networks from cyber attacks.
- Other security

We will be exhibiting at ITmedia Virtual EXPO 2021 in the fall!
e-Jan Networks will participate in the online exhibition "ITmedia Virtual EXPO 2021 Autumn" to be held in September 2021. At our online booth, you can view our remote maintenance solutions for factories. Since it is an online exhibition, anyone is welcome to join. ■ Exhibition Overview - Dates: September 1, 2021 (Wed) - September 30, 2021 (Thu) - Venue: Online - Participation Fee: Free - Organizer: ITmedia Inc. ■ What is NinjaConnect ISM? NinjaConnect ISM is a solution for remote maintenance of industrial PCs connected to factory networks. By installing a dedicated connector in the factory network, it enables remote maintenance without directly connecting the industrial PCs to the internet. It supports file transfers and log file storage, reducing costs associated with on-site maintenance, improving operational efficiency, and promoting digital transformation in the manufacturing industry.
Advancing DX, how to protect OT/IoT? Special edition of the Critical Infrastructure Cybersecurity Conference Report.
- Internal Control and Operational Management
- Other information systems
- Other security
[Indoor Type] Monitors your home in real-time with smartphone management, ensuring safety and security through crime prevention measures!
- Other security
A printing service that provides security for important printed materials such as gift certificates and securities!
- Printing/Publishing
- Other security
Flexible system! We offer a lineup of software utilizing new technologies.
- Other security and surveillance systems
- Other security
- Personal authentication
[COMODO Product] Eliminate damage from unknown threats! "AutoContainment" technology with U.S. patent.
- Virus software
- filtering
- Other security
Enhanced security measures. Cutting-edge surveillance systems for home and business use.
- Other security
- Color camera
Are you still going to continue handling complicated and troublesome IT security measures in-house?
- Other security
Application protection from memory to the web! Detect fileless attacks and memory corruption attacks within milliseconds.
- Other network tools
- Server monitoring and network management tools
- Other security
Protect your assets from "Zero-Day" attacks! All-in-one "SaaS-type" vulnerability management tool!
- Other network tools
- Server monitoring and network management tools
- Other security
Save time and costs! Providing an open and scalable threat intelligence platform.
- Other network tools
- Server monitoring and network management tools
- Other security