Security Switch - List of Manufacturers, Suppliers, Companies and Products

Security Switch Product List

1~5 item / All 5 items

Displayed results

Security Switch "TiFRONT (Cloud Management Model)"

Just connect it safely without complicated settings, and it will start working immediately! Even in places without dedicated engineers, such as local bases and retail stores, we provide a secure network!

The security switch "TiFRONT" is a cloud-managed model security switch. This product can be easily connected by simply taking it out of the box, plugging in the power cable, and connecting the Ethernet. It can provide a secure network even in locations without dedicated engineers, such as regional offices and retail stores. No management server is required, and it can be used immediately after the decision to implement it. Additionally, it features automatic security report generation, real-time creation, and the ability to manage schedules (daily, weekly, monthly, hourly), allowing for efficient reporting tasks. 【Features】 ■ Easy and safe to use, no dedicated engineers required ■ Automatic port blocking to prevent loops ■ Cloud management with no need for management or labor ■ L2 switch-based network security ■ Automatically blocks only unauthorized communications *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment
  • Firewall
  • IoT

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Switch "LG1000"

Prevent the spread of malware infections and provide a safe and secure internal network environment!

The "LG1000" detects and blocks unauthorized communication within the internal network, and in conjunction with the Saksa UTM "SS Series," it also detects unauthorized access from external sources and blocks the devices. When you log into the LG Portal, a dashboard is displayed as the start screen, providing a comprehensive view of real-time analysis information. Since the logs of this product are collected in the cloud, you can gain "peace of mind during implementation" and "speed during troubleshooting." Additionally, it notifies administrators of detected information in real-time and displays warnings on the browser screens of dangerous devices. 【Features】 ■ Blocking unauthorized communication ■ LG Portal (remote maintenance, security report generation) ■ Alert function ■ Blocking virus-infected PCs (integration with Saksa UTM) ■ Scheduling function *For more details, please refer to the PDF document or feel free to contact us.

  • image_12.png
  • image_13.png
  • image_14.png
  • Other security systems
  • Security Assessment
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The savior of supply chain attack countermeasures! Highly effective security measures!

In recent times, it has become impossible to completely prevent infections from Emotet ransomware. Stopping the spread and minimizing secondary damage with 【SubGate】 is an effective measure!

The high-performance security switch SubGate series and SubGateX series are equipped with the internationally patented proprietary security ASIC known as the MDS engine across all models. At the same time, it reports to the administrator via email from the management software VNM, allowing for awareness of infections and enabling proactive measures upstream. In today's world, where infections from Emotet and ransomware cannot be completely prevented, it has become difficult to protect the internal network from clusters of infections solely through individual management efforts. Simple actions like connecting an infected PC from a telework location to the internal LAN without realizing it can pose significant risks. By merely replacing the currently used HUB with a SubGate, you can prevent the spread of viruses, block harmful traffic such as internal DoS attacks, and protect against eavesdropping on IP phone conversations and theft of confidential data. For wireless LAN environments, there are security access points SubGate AP and WiFi6 compatible security access points SubGateAPX available. Additionally, SubGateX supports multi-gigabit connections. With the highly effective SubGate series, you can strengthen internal measures based on the premise of potential infections.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Switch TiFRONT

You can achieve "internal measures" that are possible because of the security switch.

The security switch TiFRONT can implement three internal measures: "threat prevention," "spread prevention," and "network visualization." It detects and prevents suspicious activities, such as a malware-infected PC being used as a stepping stone for unauthorized access to other PCs or file servers connected to the network, or being scanned by the network. Additionally, it identifies terminals infected with malware that have become zombie PCs, raises alerts for suspicious activities, and prevents the spread of infection by isolating them from the network. 【Features】 - Can be implemented without changing the layout - Detects, blocks, and releases attacks on the access network - Immediate blocking upon detection through integration with entrance and exit measures - Visualization of the internal network - Streamlining of operational management For more details, please contact us or download the catalog.

  • Internet System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Case Study of Security Switch TiFRONT - Toei Densan Co., Ltd.

Replace the L2 switch with TiFRONT to enhance network security.

Tohkei Densan Co., Ltd. provides specialized solutions tailored to various industries and business types, as well as outsourcing services for information systems utilizing data centers. The company's challenge was how to ensure the security of Windows XP, which reached the end of support in 2014. We will introduce a case study on the implementation of the security switch "TiFRONT," which established a security system not reliant on definition files or the operating system. [Contents] - Windows XP terminals that cannot be migrated due to compatibility issues with business applications. - Features that detect behavior and prevent spread, as well as the ability to implement in a short period, were key selection points. - The construction method is adjusted according to the size of the department or location. - TiFRONT is also proposed to customers, creating new business opportunities. For more details, please contact us or download the catalog.

  • Internet System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration