- Publication year : 2022
1~9 item / All 9 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~9 item / All 9 items
There has been a rapid increase in supply chain attacks that target the group companies, contractors, and suppliers of a target, using them as a foothold to infiltrate the target company. Since it is difficult to breach large corporations with strong security measures, attackers often aim for smaller companies that have less comprehensive security measures. Therefore, we recommend 'SubGate' for countermeasures against supply chain attacks. *For more details, please refer to the related products and catalog, or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn the horror news, we introduce truly scary stories. The second episode is about "Just bringing the telework PC back to the company...". There were incidents such as "connecting the telework PC to the company's LAN," "the fear of a household cluster," and "the emergence of an internal corporate cluster from a returned PC." In such times, the security switch 'SubGate' protects the network. With its excellent behavior detection capabilities, it can block harmful traffic, prevent the spread of viruses, and stop data theft. *For more details, please refer to the related products and catalog, or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn the horror news, we introduce real scary stories. The first story is about "The Fear of Dangerous Supply Chain Attacks." There have been incidents such as "Japan's major manufacturing industry's supply chain being targeted," "a subsidiary's subcontractor causing issues," and "damage spreading from subcontractors to subsidiaries and then to parent companies." In such times, the security switch 'SubGate' protects the network. With its excellent behavior detection capabilities, it can block harmful traffic, prevent the spread of viruses, and stop data theft. *For more details, please refer to related products and catalogs, or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"SubGate" is a network internal security solution that evolves the stabilization of network services and the convenience of operations by automatically detecting and blocking security threats that occur within the network. It protects the network with patented technology from Special Application 2011-523822 "Access Level Security Devices and Security Systems." The MDS engine performs traffic analysis based on behavior patterns, automatically detecting and blocking harmful traffic without degrading switch performance. *For more details, please refer to related products and catalogs, or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationOur company has simultaneously announced two models: the WiFi6 compatible security access point 'SubGateAPX', which is a higher-end model of the "SubGate series," and the multi-gigabit security switch 'SubGateX'. The 'SubGateAPX', equipped with our proprietary security engine "MDS Engine," features roaming capabilities and is a high-spec security access point that supports the construction of flexible wireless LAN environments, capable of connecting to 128 devices. Additionally, the newly introduced multi-gigabit security switch 'SubGateX' compensates for the inability to utilize the performance of WiFi6 (logical value of 9.6Gbps) due to switch performance (logical value of 1Gbps)! With PoE functionality compliant with IEEE802.3bt, it achieves 60W power supply, enabling the creation of a more secure high-speed wireless LAN environment through the collaboration of the two models. *For more details, please refer to the related products and catalog, or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn preparation for the day when measures to prevent the spread of viruses become even more essential, we would like to introduce the actions to be taken in 2022. Key points for strengthening measures include the "amendment of the Personal Information Protection Law," the "amendment of the Electronic Bookkeeping Law," and "measures for telework PCs." Our security switch, 'SubGate,' allows for easy internal measures. It is suitable for preventing the spread of computer viruses, detecting and blocking harmful traffic, and preventing eavesdropping on internal IP phones and confidential data. *For more details, please refer to related products and catalogs, or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis document introduces security measures for 2022 on how to address increasingly sophisticated cyber attacks such as EMOTET, ransomware, and supply chain attacks. It includes sections on "What is EMOTET?", "Attack methods", and "Examples of attacks on the supply chains of major manufacturing companies". Additionally, it introduces 'SubGate', a solution to prevent the spread of viruses. Please make use of this information for your countermeasures. *For more details, please refer to related products and catalogs, or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe are offering a document summarizing the security measures implemented by SubGate Co., Ltd. It includes "Things to Address in 2022," "Security Measures for 2022," and "Necessary Measures Against Supply Chain Attacks," among other virus prevention strategies. Our security switch, 'SubGate,' protects your network. [Offered Document] ■ Things to Address in 2022 ■ Security Measures for 2022 ■ Necessary Measures Against Supply Chain Attacks ■ [Fear Newspaper] True Scary Stories, Episode 1 ■ [Fear Newspaper] True Scary Stories, Episode 2 *For more details, please refer to the related products and catalog, or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn recent times, it has become impossible to completely prevent infections from Emotet ransomware. 'SubGate,' which stops the spread and minimizes secondary damage, is an effective countermeasure. The high-performance security switch SubGate series and SubGateX series are equipped with the "MDS engine," a uniquely developed security ASIC that has obtained international patents, in all models. At the same time, it reports to administrators via email from the management software "VNM," allowing for awareness of the infection itself and enabling upstream responses. By simply replacing the HUB currently in use with SubGate, you can prevent the spread of viruses, block harmful traffic such as DoS attacks within the network, and prevent eavesdropping on IP phone conversations and the theft of confidential data. *For more details, please refer to related products and catalogs, or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration