List of Other security products
- classification:Other security
1306~1350 item / All 1828 items
The culmination of the proven Keylex, featuring the best functionality and a luxurious, dignified appearance. It offers a variety of options to accommodate various uses!
- Other security and surveillance systems
- Other security
Introduction of various car anti-theft devices such as "dedicated remote control models" and "genuine keyless compatible models"!
- Other security and surveillance systems
- Other security
High-grade model! Equipped with various sensor functions such as a two-stage impact sensor and door trigger.
- Other security and surveillance systems
- Other security
- Video Recorder
Protection against theft and burglary of company vehicles, leading to leaks of confidential information! We will safeguard the company's valuable assets.
- Other security and surveillance systems
- Other security
Supports Office365! Balancing usability and security with different policy settings.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Short-term construction is possible! A security platform with minimal burden on users from implementation to usage.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Operable with minimal burden! A lifestyle monitoring service that remains unobtrusive and tidy even after installation.
- Other information systems
- Other network tools
- Other security
The keyless and auto-lock features remain the same for sliding doors! With the Kilex 800, the functions are unchanged, and installation is easy because it is surface-mounted.
- Other security and surveillance systems
- Other security
Thermal detection for heat and verification of the site with visible light images! A revolutionary network camera equipped with both thermal and visible light sensors in a single housing.
- Other security
- Surveillance Camera System
- Surveillance Cameras
A secure gate that only certified individuals can pass through, suitable for entrances of customer attraction facilities and offices!
- Other security
For amusement facilities, event venues, museums, etc.! A turnstile gate with a simple structure.
- Other security
It can be installed in a small space! With IC card and QR code authentication, smooth entry and exit is possible.
- Other security
We respond to equipment development tailored to your requests! We support our customers in creating a "memorable welcome."
- Other security
Compact body and excellent cost performance! Can be installed in small spaces of various public facilities.
- Other security
Offers excellent flexibility and convenience! Genuine key cards and RFID carriers that create a safe and secure environment.
- Career
- Other security
- others
Close the door and it auto-locks! To open, just use the passcode! No power required, so it's safe to use even during power outages or disasters—maintenance-free button lock.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security

[Video Release Announcement] ♦ Learn with Keylexman ♦ 'Keylex 3100 Dual-Sided Button Specification Memory Number Change'
We have released a video on the official Nagasawa Seisakusho YouTube page titled "Keylex 3100 Dual-Sided Button Specification Memory Number Change." Unlike the single-sided button specification, it is necessary to remove the Keylex from the door for the change, but this video provides a clear explanation. The Keylex expert will share the key points of the operation! Please take a look! ▼▼ You can find the YouTube video through the related link below! ▼▼
AI technology patented analyzes malware at the DNA level!
- Software (middle, driver, security, etc.)
- Other security
Real-time implementation of global-scale DDoS attack countermeasures!
- Other security
Providing security and scalability in the transition to 5G mobile networks!
- Other security
- Firewall and intrusion prevention
Solving the challenges of introducing thin clients! Achieving fast booting with our unique OS.
- Other security
Simply connecting for telework is dangerous! We introduce products that can be implemented without changing the environment.
- Other security
Operate a large volume of email data ranging from thousands to tens of thousands in a safe and secure environment!
- Other security
- Internal Control and Operational Management
- Email/Fax transmission
A mechanism that automatically handles the "etiquette" of sending emails. Automatic processing for preventing mis-sending and managing attachments. It realizes the efficiency of email operations.
- Other security
- Email/Fax transmission
- filtering
Our company provides highly secure telework services that meet the security requirements tailored to the needs of different users.
- Other security
- Other information systems
ISO 26262 Compliant Security Threat Analysis Support Tool
- Development support tools (ICE, emulators, debuggers, etc.)
- Other security

G Cyber Channel is streaming daily!
Our esteemed engineering staff will provide the optimal solutions to your challenges through a live-streamed webinar. We will continuously add content and update it weekly to help resolve your concerns. We will also respond to Q&A in real-time, so please join us. Please note that the program content and broadcast schedule may change due to circumstances. *Registration for the webinar is available until 15 minutes before the scheduled broadcast time. Thank you for your understanding.
Dramatically improve your security environment! Targeted cyber attack countermeasure solution.
- Software (middle, driver, security, etc.)
- Other security and surveillance systems
- Other security
Equipped with 16 types of base programs! Easy to set up according to the usage environment.
- Other security
Providing relevant risk information! We anticipate your "needs" in business.
- Other services
- Other contract services
- Other security
We provide solutions for AML and KYC from DMG Corporation!
- Software (middle, driver, security, etc.)
- Other security
Simplifying data collection settings on the monitoring server!
- Other security
Temperature calibration device * Fever detection (body temperature measurement) accessory for thermal camera GJ-IP2617BF-THS/PA
- Other security
4 Megapixel Fever Detection (Body Temperature Measurement) Thermal Camera Series
- Other security
Maximize the effectiveness of existing tools and departmental output through orchestration and automation!
- Software (middle, driver, security, etc.)
- Other security
Web application vulnerabilities can be easily mitigated without specialized knowledge!
- Software (middle, driver, security, etc.)
- Other security
Automatically assess and understand the risks across the entire infrastructure.
- Software (middle, driver, security, etc.)
- Other security
Enables quicker and more accurate decision-making throughout the entire lifecycle of risk detection and response.
- Software (middle, driver, security, etc.)
- Other security
Car security linked type! Front + interior dual camera dashcam.
- Video Recorder
- Other security
You can definitely search and find it with a minimum error of 50 cm.
- Other security
Strong against picking! A security lock that achieves high theft prevention.
- Other security
Implementing internal risk measures such as information leakage and internal misconduct through behavioral analysis! A new corporate risk management approach to prevent risks before they occur.
- Server monitoring and network management tools
- Other security
- Entrance and exit control system
Image recognition AI solutions for achieving DX!
- Image analysis software
- Image Processing Equipment
- Other security
To prevent the unauthorized removal of equipment and for security measures! An alarm will notify with sound and light when equipment or products with RF tags are removed!
- Other security
- IC tag
- Other security and surveillance systems

No PC needed! Use RFID for asset management! Prevent unauthorized removal of equipment and enhance security measures! An alarm will notify you with sound and light when equipment or products with RFID tags are removed!
The "Equipment and Product Outgoing Detection Package" handled by Maspro Denkoh is a system that utilizes UHF band RFID to detect the outgoing of equipment and products. 【Issues】 - Managed with a handwritten ledger → Human errors such as omissions occur → Concerns about security, such as unauthorized removals - Managed using security tags → Uncertainty about when to replace the battery; battery replacement is cumbersome The "Equipment and Product Outgoing Detection Package" using UHF band RFID involves attaching tags to the items that need outgoing management. When the tag passes in front of the installed antenna, the antenna reads the tag, and an alarm notifies with sound and light. Additionally, RF tags do not require batteries and can be used semi-permanently. 【Features】 ■ Since all necessary components such as antennas, readers/writers, tags, and software are included in the package, you can easily start the RFID system without a PC as long as you have an AC100V power supply.
Enables safe external use of PCs. Data can be used securely even in locations without a network environment.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Prevent information leaks due to internal misconduct! Eliminate unauthorized use of privileges and rights to take out information to "nothing."
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Using secret dispersal technology to render data meaningless! Safe storage and management on the cloud is possible.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security