Network Security Software Product List and Ranking from 4 Manufacturers, Suppliers and Companies

Network Security Software Product List

1~4 item / All 4 items

Displayed results

SASTIK III Network Isolation

Significant cost reduction! Achieving a simple and efficient network security system.

"SASTIK III Network Isolation" is a security solution that realizes the "α model" for municipal information security measures. It possesses only the necessary functions of "network separation" and "file sanitization," achieving a simple and efficient network security system. The file sanitization function can be performed with one click during data transfer to local storage, automatically processing the file sanitization. 【Features】 ■ Network separation ■ File sanitization ■ Developed in-house in 2016 ■ Adopted by 50 municipalities nationwide in Japan ■ Up to approximately 15,000 users can utilize a single system *For more details, please refer to the related link page or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Things to Address in 2022 [Security Measures]

We will introduce key points and security switches for matters that require strengthened measures!

In preparation for the day when measures to prevent the spread of viruses become even more essential, we would like to introduce the actions to be taken in 2022. Key points for strengthening measures include the "amendment of the Personal Information Protection Law," the "amendment of the Electronic Book Preservation Law," and "measures for telework PCs." Our security switch, 'SubGate,' allows for easy internal measures. It is suitable for preventing the spread of computer viruses, detecting and blocking harmful traffic, and preventing eavesdropping on internal IP phones and confidential data. [Key Points for Strengthening Measures] ■ Amendment of the Personal Information Protection Law Stricter reporting (mandatory), two types of reports (preliminary and final) ■ Amendment of the Electronic Book Preservation Law Changes in preservation methods, security of storage locations ■ Measures for Telework PCs Home cluster, censorship during internal connections *For more details, please refer to the PDF document or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cloud Blackbox

Detects enhanced threats and abnormal signs in real-time.

"Cloud Blackbox" is an advanced physical and virtual network security solution designed to accommodate the diverse cloud environment. By selecting the monitoring level that matches the system configuration, resources can be reduced, and packets can be selectively stored based on the environment and situation, allowing for operation at a reasonable cost. Additionally, through a highly generated database, cyber threats can be analyzed, and actual packets can be verified. 【Features】 ■ Accommodates diverse cloud environments ■ Capable of collecting network traffic in all directions ■ Selective cost reduction ■ Real-time reproduction of network packets *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration