Access Control Software Product List and Ranking from 4 Manufacturers, Suppliers and Companies

Access Control Software Product List

1~4 item / All 4 items

Displayed results

[Case Study on High-Permission ID Management] Tokyu Card Co., Ltd.

An example of improving internal security awareness through the construction of a workflow for work approval.

We would like to introduce the case of Tokyu Card Co., Ltd., which implemented the high-privilege (privileged ID) management solution "SecureCube Access Check." In 2015, the company began efforts to comply with the PCI DSS security standards for credit card information protection in order to establish a more secure card usage environment. They introduced our product as their ID management tool, further strengthening their security management system and enhancing security awareness. 【Case Overview】 ■ Client: Tokyu Card Co., Ltd. ■ Product Implemented: SecureCube Access Check ■ Implementation Effects: - Achieved strong access control as required by PCI DSS - Significantly improved security awareness across the organization *For more details, please refer to the PDF document or feel free to contact us.

  • Other Management Services
  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Platform "Forescout eyeControl"

Implement policy-based controls and automate! Respond quickly to incidents.

"Forescout eyeControl" is a platform that proactively reduces the attack surface by implementing and automating policy-based controls, allowing for rapid response to incidents. Security teams can prioritize, implement, and automate policy-based controls effectively. Additionally, organizations can improve their security hygiene, reduce their attack surface, and accelerate response and remediation to quickly mitigate threats, security incidents, and compliance gaps. 【Features】 ■ Protects sensitive data from external threats ■ Prevents the spread of malware from infected, vulnerable, and non-compliant devices ■ Prevents data theft and network downtime caused by targeted attacks ■ Supports network access and availability for employees, contractors, and customers ■ Ensures compliance with internal policies and external regulations, etc. *For more details, please download the PDF or contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Access Control for USB Devices: 'LB USB Lock Plus'

Unauthorized USB memory - Shut out hard drives.

This is software to control the use of USB-connected storage such as USB flash memory. ■ Settings for "Allow Access," "Deny Access," and "Read-Only" are available ■ Access control via a whitelist ■ Easy setup in wizard format ■ Measures against information leakage for PCs handling personal information! There is also a higher-end product called 'LB USB Lock Pro.' 【Function Comparison】 https://www.lifeboat.jp/products/ulp1/index.php?hn=hikaku&t_no=1&ht=-130

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IPScan NAC

Compliance measures, security threat measures, internal fraud measures!

We would like to introduce 'IPScan NAC', handled by Viascope Inc. It provides centralized management from controlling LAN-connected devices through both agent and agentless integration, to collecting connection information and performing device integrity checks. Additionally, we also offer "IPScan XE," an internal connection device management solution that automatically detects and visualizes various devices such as PCs, tablets, and smartphones connected to the network. 【Features】 ■ Real-time visualization of various devices from the administrator's operational perspective via a web management interface ■ Enhanced internal security support through a three-stage authentication process ■ Checks the launch and installation status of software on computers ■ Regularly verifies the integrity of computers and checks compliance adherence and violations ■ Controls bypass communications such as unauthorized tethering that are not part of the business LAN ■ Improves safety concerning the usage environment of devices *For more details, please download the PDF or feel free to contact us.

  • Other Software
  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration