1~12 item / All 12 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~12 item / All 12 items
"Rocket.Chat" is an on-premises (closed network) chat and video conferencing tool. It has high security and enhances features that can be immediately utilized, including video conferencing, task management, global search, file management, and calendar integration. Additionally, it automatically translates real-time messages between users and can be used anywhere via web, desktop, mobile apps, live chat clients, and SDKs. 【Features】 ■ High security ■ Flexible customization ■ Live chat ■ Real-time translation ■ Accessible from various devices *For more details, please refer to the related links or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce our "VBOS Countermeasure Solution," which visualizes signs of firmware vulnerabilities and tampering. It is possible to detect whether there has been any tampering or changes to the firmware (Integrity). Additionally, if there are vulnerabilities that need to be addressed, you can check the details of the vulnerabilities and apply patches. 【Features】 <Visualization> ■ Visualizes vulnerabilities (Risk) present in the firmware ■ Allows centralized management on a single dashboard ■ Visualizes vulnerabilities present in the firmware ■ Capable of presenting an overview of vulnerabilities, attack cases, and remediation methods *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationOur company offers the "SCT SECURE OSINT Service." We utilize OSINT (Open Source Intelligence) techniques such as Google Hacking, Shodan searches, deep web and dark web investigations, and research on anonymous bulletin boards and social media. We provide a comprehensive report on risk information relevant to our clients in an easy-to-understand format, even for those without prior experience. 【Detection Items】 ■ Investigation of phishing and smishing sites ■ Research on anonymous bulletin boards and social media ■ Information leakage investigation using Google Hacking ■ Information leakage investigation using Shodan ■ Deep web and dark web investigations *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis document introduces the "OSINT/SCT SECURE OSINT Service." It includes an overview of our company, as well as sections on [What is OSINT?], [What is the SCT SECURE OSINT Service?], and [Campaign Information]. Additionally, it describes the [Features of the SCT SECURE OSINT Service], so please take a moment to read through it. 【Contents】 ■ What is OSINT? ■ What can be done with OSINT? ■ What is the SCT SECURE OSINT Service? ■ Campaign Information *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe offer the "SCT SECURE OSINT Service." Using OSINT (Open Source Intelligence) methods, we provide risk information related to our clients, including "authentication information leakage investigations based on email addresses," "notifications of phishing site information," and "the status of unintended disclosure of confidential documents." We will provide individual estimates based on the combinations of investigation targets. Please feel free to contact us when you need our services. [Contents] ■ Authentication information leakage investigations based on email addresses ■ Notifications of phishing site information ■ Status of unintended disclosure of confidential documents ■ Brand card information dark web leakage investigations, etc. *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"SCT SECURE Cloud Scan" is a cloud-based security service that regularly diagnoses whether there are vulnerabilities that could serve as footholds for cyber attacks, based on new security information. With this product, sites diagnosed as having no vulnerabilities and secure websites are issued a safety certification mark. Additionally, we offer a manual diagnostic service called "SCT SECURE Manual Web Application Diagnosis" to complement the cloud-based automated vulnerability diagnosis. 【Features of SCT SECURE Cloud Scan】 ■ Promote security strength with a date-stamped safety certification mark ■ Diagnosis based on always updated vulnerability information ■ Diagnostic tool with PCI DSS ASV qualification ■ User-friendly management console and support for various report outputs *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"SECUDRIVE File Server" is a security software that protects Windows file servers with powerful DLP (Data Loss Prevention) features and can isolate confidential data within the file server from ransomware. It only requires installing the software on the file server or client PCs currently in use, eliminating the need for new capital investment. You can utilize standard Windows features such as user permissions, folder sharing, file management, and Active Directory as they are. 【Features】 ■ Data leakage prevention ■ Ransomware blocking ■ Integration with standard Windows features ■ File operation log management ■ Support for cloud server environments (EC2, Azure) ■ Easy to implement and operate without additional servers *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"SCT SECURE SWAT" is a monitoring-type annual diagnostic service for web applications that thoroughly diagnoses using the characteristics of both automated and manual diagnostics. It balances the comprehensiveness of automated diagnostics with the flexibility of manual diagnostics. Frequent modifications and updates are automatically detected and diagnosed. Additionally, we also offer the "SCT SECURE Mobile App Diagnostic Service," a vulnerability diagnostic service for smartphone applications. 【Features of SCT SECURE SWAT】 ■ Thorough diagnosis of web applications utilizing the characteristics of both automated and manual diagnostics ■ Balances the comprehensiveness of automated diagnostics with the flexibility of manual diagnostics ■ Automatically detects and diagnoses frequent modifications and updates ■ Suitable for continuous vulnerability monitoring of critical web applications ■ Diagnostic results can be checked in real-time from a dedicated portal *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"Secudrive Drive Eraser" is a USB-based data erasure solution that can completely and safely erase not only the HDD (hard disk drive) within a PC but also external HDDs easily. By connecting a USB memory stick to the PC that needs data erasure, you can completely erase the data within the PC. There is no need to physically destroy the PC or HDD, allowing for secure erasure of the HDD and preventing potential information leaks. 【Features】 ■ Easy deletion operations due to USB type erasure solution ■ Can delete multiple PCs simultaneously ■ Capable of erasing HDD data not only on Windows but also in Mac (MacOS) and Linux environments ■ Adopts over 20 internationally recognized data erasure methods ■ Can be executed with only an EXE program, no need to change BIOS or UEFI settings *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis catalog introduces the security solutions handled by our company. It features a rich lineup, including the cloud-based automatic vulnerability assessment service "SCT SECURE Cloud Scan" and "netsparker," which diagnoses web applications from cloud environments. Please use this for selecting products. [Contents (partial)] ■ SCT SECURE Cloud Scan ■ SCT SECURE Manual Web Application Assessment ■ netsparker ■ Gred Security Services ■ McAfee SECURE *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"ARGOS DFAS" is a device that can analyze whether personal and confidential information is improperly held simply by connecting it to a PC via USB. It prevents information leaks and internal misconduct before they occur. One unit can inspect any number of PCs. It is also possible to investigate the disks of PCs that have stopped booting. 【Features】 ■ No installation required ■ Investigate any number of PCs ■ Regular surprise inspections ■ Detects My Number and credit card numbers ■ Investigate the disks of PCs that have stopped booting *For more details, please request materials or view the PDF data from the download.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationSCT SECURE Internal Scan is a network vulnerability assessment appliance. It scans the network to identify security holes and provides information for countermeasures. By conducting regular scans, it detects vulnerabilities and changes in the network, offering information to prevent security incidents before they occur. 【Features】 - Automatic detection of target devices for comprehensive assessment - Easy and user-friendly operation - Clear and understandable portal interface - Automatic updates of the vulnerability database - PCI DSS compliance For more details, please contact us or download the catalog.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration