List of Security Assessment products
- classification:Security Assessment
181~225 item / All 279 items
You won't have time to evacuate from the earthquake to the tsunami's arrival! This is a "tsunami shelter" that dramatically increases survival rates against the tsunami approaching at a tremendous spe...
- Basement unit/disaster prevention shelter
Since the construction-generated soil will be recycled on-site, the disposal costs for leftover soil and the costs for new purchases will be significantly reduced. 【Disaster Prevention】
- Special Construction Method
The Noto Reconstruction Office of the Ministry of Land, Infrastructure, Transport and Tourism has featured our 3D printer in the Nikkei newspaper.
The official X account of the Noto Reconstruction Office of the Ministry of Land, Infrastructure, Transport and Tourism and the Nihon Keizai Shimbun have published that our 3D printer has been adopted for the reconstruction of Noto. The official X account of the Noto Reconstruction Office introduces the use of our products in the restoration work of the Noto Expressway. Additionally, the Nihon Keizai Shimbun mentions that structures made with our products are being used for the restoration of roads damaged by the Noto Peninsula earthquake, and that the construction period can be shortened by about two weeks, so please take a look.
We comprehensively understand the security risks inherent in the organization through seven items and visualize the current situation in numerical form.
- Security Assessment
We will bring the threat of standard phishing emails close to zero.
- Security Assessment
We visualize the overall picture and issues of the website through automated diagnosis using AI and RPA.
- Security Assessment
We will significantly automate and streamline processes using an automated diagnostic tool powered by AI and RPA.
- Security Assessment
As your company's IT representative, I will protect both software and hardware!
- Security Assessment
Continuous monitoring is possible with the cloud!
- Security Assessment
- Other Software
Data tampering detection and automatic recovery solution!
- Security Assessment
- Other Software
Just connect it safely without complicated settings, and it will start working immediately! Even in places without dedicated engineers, such as local bases and retail stores, we provide a secure netwo...
- Security Assessment
- Firewall
- IoT
Significantly reduced size, weight, and power consumption compared to a typical IFF transponder.
- Security Assessment
- Other security systems
We provide comprehensive security solutions centered around cutting-edge security technology!
- Security Assessment
- Other security systems
- others
General IT controls and compliance with PCI DSS, achieving implementation in as little as one month! A high-privilege ID (privileged ID) management product that protects critical systems from attacks.
- Security Assessment
- ERP (core system)
Any information system tasks can be requested easily and at low cost for half a day!
- Security Assessment
- BI Tools
- Database
We will diagnose your homepage for free!
- Security Assessment
- Internet Advertising
- Ad management and operations
Constantly monitor and visualize Wi-Fi usage! It can be implemented without changing the existing network.
- Security Assessment
Encrypt various data on a file-by-file basis, regardless of file format or storage location!
- Security Assessment
Strengthen identity verification with one-time passwords, multi-factor authentication, and multi-step authentication! Reduce the risk of unauthorized access!
- Security Assessment
Quickly search internal data to identify the location of data containing personal information! Execute necessary actions such as deletion!
- Security Assessment
By seriously considering information security, you can improve the organization's constitution.
- Security Assessment
We provide information security audits based on the Ministry of Economy, Trade and Industry's "Information Security Audit System."
- Security Assessment
Vulnerability assessment service using cloud service infrastructure!
- Security Assessment
A detailed explanation of brain-like (neuromorphic) computing, which is fundamental to the advancement of AI technology and the basis for neurochips!
- Other Software
- Security Assessment
Changing the common sense of telework device management and IT asset management! We can visualize work processes!
- Security Assessment
- Other Software
Equipped with various features such as log management and device restrictions! A case where centralization led to a reduction in man-hours.
- Security Assessment
- Other Software
A one-stop solution for corporate fraud prevention that is considerate of users and strict on attackers!
- Security Assessment
- Other Software
Evolving security measures made safer and simpler! We offer a variety of advanced features to meet diverse needs.
- Security Assessment
You can't just say you didn't know! Introducing solutions to prepare for the revised Personal Information Protection Law.
- Other security systems
- Other Software
- Security Assessment
A safe business environment on the web without the need to be aware of security. Web security with numerous implementation results.
- Security Assessment
Leave it to us for support with the "SECURITY ACTION" declaration!
- Security Assessment
- Other Software
We will support you in minimizing security damage!
- Other Software
- Security Assessment
Providing continuous operational services tailored to the customer's environment!
- Security Assessment
- Other Management Services
The first step in security measures is a security assessment!
- Security Assessment
Providing solutions for the collection and analysis of security logs, visualization of LAN communications, and risk response!
- Security Assessment
Significantly contributes to countermeasures against spoofed emails by combining DMARC/25 with diagnostic consulting services.
- Security Assessment
To prepare for the increasing risk of information leaks due to cyber attacks! Flexible responses are possible!
- Other Software
- Security Assessment
Large-scale user-oriented thin client system!
- Security Assessment
- Knowledge Sharing System
- Other Software
Supporting risk measures to protect the organization's critical data!
- Security Assessment
- Other Management Services
- Labor Management System
Utilize our personnel to reduce costs for SIRT collection!
- Security Assessment
- Firewall
This is a handheld thermal imaging camera specially designed for temperature measurement. It can quickly detect temperature anomalies and equipment abnormalities.
- Other measuring instruments
- Nursing care products
- Security Assessment
Specially designed for body temperature measurement with a measurement range of 30 to 45°C and an error of ±0.5°. AI features such as facial recognition prevent false detection. Most other products ar...
- Other measuring instruments
- Nursing care products
- Security Assessment
The introduction of temperature measurement using thermography in Hakusan City, Ishikawa Prefecture was featured on NHK News.
In Hakusan City, Ishikawa Prefecture, an article was featured on "NHK News" about the implementation of temperature checks for visitors at entrances using handheld thermal imaging devices sold by our company as a measure against the novel coronavirus in government buildings. Handheld thermal imaging devices are portable and can instantly measure high temperatures, making them ideal for temperature checks at the entrances of various facilities. As a measure against the novel coronavirus, the introduction of temperature checks using thermal imaging is increasing in schools, hospitals, and businesses.
Designed specifically for temperature measurement, with a measurement range of 30 to 45°C and an error margin of only ±0.5°. It can also prevent false detections using facial recognition AI.
- Other measuring instruments
- Nursing care products
- Security Assessment
Shall we visualize the "unnoticed risks" and "necessary measures" for the future?
- Security Assessment
Achieving security automation with AI!
- Other security systems
- Security Assessment
Mobile threat protection solution: It keeps personal and corporate data safe by protecting mobile devices across all attack vectors.
- Other security systems
- Security Assessment
Achieve the industry's best detection rate with CheckPoint's ThreatCloud, the most powerful threat intelligence in the world!
- Other security systems
- Security Assessment