Safety features×デジタルアーツ - List of Manufacturers, Suppliers, Companies and Products

Safety features Product List

1~3 item / All 3 items

Displayed results

Web Security "i-FILTER"

We provide a safe work environment with "i-FILTER," which allows access only to secure websites.

**"White Operation of i-FILTER"** Unlike the conventional method of categorizing URLs that could be blocked, we achieve a "world where access is allowed only to safe websites" by registering the URLs of domestic websites that hit search engines, including content URLs, in the database through a method that categorizes all URLs. **"Measures Against Information Leakage from Within"** Over 2,700 domestic and international web services can be controlled for operations such as "login, writing, and uploading." Flexible policies can be set and applied according to departments and positions, enabling filtering that aligns with the organization's web access operational rules. **"New Feature: AI Chat Filter"** By flexibly controlling access to generative AI and visualizing and analyzing usage conditions, we create a safe usage environment. Additionally, by utilizing the function to display usage precautions, it is also possible to inform employees of the usage rules. *For more details, please download the PDF or feel free to contact us.*

  • Big Data
  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email Security "m-FILTER"

We provide a secure business environment with "m-FILTER," which only receives safe emails.

**"White Operation of m-FILTER"** The database of "m-FILTER" stores "IP addresses" and "email domains" of safe senders with over 99.90% reliability. Emails from safe senders registered in the database are received with minimal false positives, while emails from senders not registered in the database are assessed based on factors such as "macro presence" and "file extensions," allowing for accurate detection without oversight. **"Robust External Attack Countermeasures"** In addition to sender spoofing detection in white operations, it supports "SPF/DKIM/DAMRC" authentication, addressing email attacks with sophisticated sender spoofing. For attachment spoofing detection, it can assess files with macros and identify dangerous file extensions. It can also inspect the contents of password-protected ZIP files, which are frequently used in attacks. In category and content spoofing detection, it evaluates the URLs listed within the emails. **"Diverse Measures Against Misdelivery"** For outgoing emails, it is possible to flexibly set filtering rules tailored to the organization's operations based on criteria such as "what," "under what conditions," and "how."

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

File Security "FinalCode"

"FinalCode" protects all files handled in business without being aware of them.

"FinalCode" automatically protects files from the moment they are created. Only the individuals or groups specified by the file creator via email address can view the files, and access and operation histories can be checked in real-time, with the ability to change permissions even after sharing.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration