soft(Firewall) - List of Manufacturers, Suppliers, Companies and Products

soft Product List

1~2 item / All 2 items

Displayed results

Network security device "UTM-70E"

Achieve security management that requires no management or operational effort and no specialized knowledge!

The "UTM-70E" is a network security device that protects customers from increasingly complex security threats by providing comprehensive and timely security defenses at the network boundary. It adopts an integrated design of X86-based multi-core hardware architecture and software. It is high-performance, low-carbon, and eco-friendly, while also fully supporting various routing protocols, QoS, high availability (HA), log auditing, and more. 【Features】 ■ Equipped with various security functions ■ No management or operational hassle, no specialized knowledge required ■ Utilizes Kaspersky antivirus ■ Supports connections for up to 50 clients with a single unit *For more details, please download the PDF or feel free to contact us.

  • others
  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Vulnerability Diagnosis Service

The first step in security measures is a security assessment!

We offer a "Security Vulnerability Diagnosis Service." We have two diagnostic menus: "Web Application Diagnosis" and "Platform Diagnosis." Additionally, we have separate menus for native app diagnosis and IoT diagnosis (including technical compliance certification requirements and firmware, etc.). Please feel free to contact us first. 【Features】 ■ Web Application Diagnosis - The diagnostic tool is purely domestically produced and fully supports Japanese (multi-byte characters). - It allows for diagnoses that incorporate security trends in Japan. ■ Platform Diagnosis - Diagnoses are conducted by security engineers with advanced skills based on the know-how of operating a Security Operations Center (SOC) daily. - It achieves high coverage and accuracy in diagnosis while eliminating false positives commonly seen in tool-based diagnoses. *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration