List of Firewall products
- classification:Firewall
1~45 item / All 223 items
What is the reason a long-established painting company in Atsugi City chose "AppGuard" for ransomware countermeasures!?
- Firewall

[Case Study] Social Insurance Labor Consultant Corporation Deguchi Office AppGuard Small Business Edition
In response to an incident that shook the industry, measures have been strengthened by switching to "AppGuard Small Business Edition." A case study from Deguchi Office, which aims to elevate the entire social insurance labor consultant industry, has been published! Please read it through the link.
Equipped with antivirus, firewall, and IPS in a palm-sized chassis. Protects the internet gateway with powerful security features.
- Firewall

[Notice of Start of Handling] Palm-sized All-in-One Security "SG-ONE"
We are pleased to announce that Aisel Co., Ltd. has started handling the palm-sized and reliable UTM (Unified Threat Management) device, "OCH SG-ONE," which is perfect for customers who want to quickly secure their internet gateway but have an unknown number of devices to manage. **Features of SG-ONE** Compact design: No trouble finding a place to install it even in small environments! Create a secure environment on the go! Super easy setup and installation: Just connect it to your router and it’s ready in 5 minutes! Suitable for companies without an IT administrator! All-in-one security that protects various aspects: Equipped with multiple powerful security features including antivirus, firewall, and IPS! Are you still worried about your internal internet environment? With this one device, you can eliminate all remaining concerns at once!
User's "oversights" cannot be completely eliminated. That's why, why not create a system that prevents outbreaks even if ransomware is accidentally activated?
- Firewall

[Case Study] Social Insurance Labor Consultant Corporation Deguchi Office AppGuard Small Business Edition
In response to an incident that shook the industry, measures have been strengthened by switching to "AppGuard Small Business Edition." A case study from Deguchi Office, which aims to elevate the entire social insurance labor consultant industry, has been published! Please read it through the link.
A new concept in cybersecurity products called "AppGuard" that prevents malicious software such as ransomware from "activating even if it intrudes."
- Firewall

[Case Study] Social Insurance Labor Consultant Corporation Deguchi Office AppGuard Small Business Edition
In response to an incident that shook the industry, measures have been strengthened by switching to "AppGuard Small Business Edition." A case study from Deguchi Office, which aims to elevate the entire social insurance labor consultant industry, has been published! Please read it through the link.
Implementation of a cloud-based network device management service to provide Wi-Fi services at exhibition venues and improve operational efficiency.
- Firewall
- Wi-Fi router
- Internet System
VPN can operate on all devices (Windows, macOS, Android, iOS, etc.)!
- Firewall
Prevent unauthorized access and abuse of APIs with a web application firewall!
- WAF
- Firewall
If you're wondering what measures to take for information security, this is a must-read!
- Security Assessment
- Firewall
- WAF
We provide one-stop services for the introduction, construction, and operation of network, server, and cloud environments to support the strengthening of corporate IT infrastructure.
- Groupware
- Video conferencing system
- Firewall
Achieve the same access environment as the office even during telework, balancing enhanced security and improved operational efficiency!
- Firewall
We will achieve the highest level of security even during telework and accelerate digital transformation!
- Firewall

Providing solutions that comprehensively address labor and security issues utilizing AI to businesses and government agencies.
Initial Point Co., Ltd. and TIGEREYE Co., Ltd. have concluded an agency agreement. ■ Background and Purpose With the spread of DX and remote work, building a system that balances security and labor management has become an important management issue for companies. Initial Point has been providing a secure remote work environment for a wide range of customers, from government agencies and medical institutions to educational institutions and small and medium-sized enterprises, through its quarantine-type multi-factor authentication service "JinCreek." TIGEREYE offers AI solutions that support corporate human resource management, such as "FacePass Attendance" and "FacePass Stress Checker," which utilize facial recognition. ■ Provided Solutions - FacePass Attendance: A facial recognition-based attendance management system that can be implemented without the need for dedicated terminals, preventing clock-in errors and fraudulent clock-ins. - FacePass Stress Checker: Captures facial emotion data at the time of clocking in, visualizing employees' mental states. - FacePass Key & Access Control: A cloud-based, contactless authentication access control management system. - AI Avatar / AI Agent: Next-generation conversational AI solutions that support dialogue and customer service operations for municipalities and businesses.
You can quickly, easily, and reliably create a management environment for "FFRI yarai"! The hassle of building a management server is eliminated.
- Firewall
- Other office supplies
- others
Review building control to optimize convenience, compatibility, and cybersecurity measures.
- Firewall
- Facility Management System
- Other security systems
A shredder that can crush all types of media including 3.5-inch HDDs, 2.5-inch HDDs, SSDs, smartphones, USBs, and credit cards.
- others
- Firewall
Even with legacy infrastructure, internet-based integrated control is placed at the center of the building's operational strategy.
- Firewall
- Facility Management System
- Other security systems
A shredder equipped with two crushing blades that can destroy all types of media, including 3.5-inch HDDs, 2.5-inch HDDs, SSDs, and smartphones.
- others
- Firewall

New release: A shredder equipped with two cutting heads that can shred all types of media, including 3.5-inch HDDs, 2.5-inch HDDs, SSDs, smartphones, USBs, and credit cards.
The granulator is a shredder equipped with two cutting heads that can crush all types of media, including 3.5-inch HDDs, 2.5-inch HDDs, SSDs, smartphones, USBs, and credit cards. The specially designed cutting heads automatically reverse and repeat the process until the inserted device is completely shredded if there are any hard parts. Server HDDs and SSDs can be shredded without removing the mount. For HDD shredding, you can choose from three sizes: 14mm, 12mm, and 8mm, while for SSDs, you can select from screens without a screen, 5mm, and 3.5mm, allowing you to change the particle size, processing speed, and security level. The 130-liter large-capacity mobile bucket makes waste disposal easy. Thanks to the technology of the renowned German shredder manufacturer Intimus, it has received very high praise for its outstanding durability and performance.
NIST-compliant SSD shredder PDS-88 that completely prevents information leakage by crushing server and PC SSDs and smartphone IC chips into extremely small pieces.
- others
- Firewall
SSD Shredder Flash EX completely prevents information leakage by crushing SSDs and smartphone IC chips into extremely small pieces.
- others
- Firewall

Safe disposal of servers and computers. Numerous achievements in data center implementation, with perfect customer satisfaction! On-site services for data erasure, data destruction, and dismantling removal of HDDs and SSDs from data centers, companies, research institutes, hospitals, schools, etc.
Our staff will visit your location to perform data erasure and destruction on-site. We handle everything from extracting hard drives from computers and servers, disassembly, collection and disposal after erasure/destruction, to issuing certificates. We destroy and erase data from all types of storage media, including HDDs, SSDs, smartphones, magnetic tapes like LTO and DLT, USB drives, and SD cards. Our data erasure/destruction service prices are very reasonable! The reason is that we are a sales company for data erasure and destruction equipment, allowing us to use multiple operational devices. We have a proven track record of visiting many data centers and clients, providing a safe and reliable service. After the work is completed, we will issue a data erasure certificate or destruction certificate. We also offer a buyback service for unwanted computers and servers. Please provide the following four points, and our representative will contact you: 1. Location 2. Types and quantities of storage media from computers/servers 3. Preferred method of data destruction/erasure 4. Whether you need a certificate or not As a bonus for our users, we will also give away a one-year license for the cyber attack response solution App Guard SOLO.
Introduced on approximately 900 iPads! A case study that achieved secure access to in-house systems.
- Firewall
Implemented on all smartphones provided to bank employees! Strengthening measures against information leaks has also been achieved.
- Firewall
Achieving efficiency in administrative tasks for entrusted asset operations! Utilizing voice data as more effective evidence.
- Firewall
Easily handle very complex and time-consuming tasks! Introducing tools like RF site survey tools.
- Firewall
With 12 tons of hydraulic power, it can physically destroy HDDs and SSDs, and even if the cutting bits are damaged or worn, they can be easily replaced. It is also capable of destroying magnetic tapes...
- Security Assessment
- Firewall
- Other security systems

Safe disposal of servers and computers. Numerous achievements in data center implementation, with perfect customer satisfaction! On-site services for data erasure, data destruction, and dismantling removal of HDDs and SSDs from data centers, companies, research institutes, hospitals, schools, etc.
Our staff will visit your location to perform data erasure and destruction on-site. We handle everything from extracting hard drives from computers and servers, disassembly, collection and disposal after erasure/destruction, to issuing certificates. We destroy and erase data from all types of storage media, including HDDs, SSDs, smartphones, magnetic tapes like LTO and DLT, USB drives, and SD cards. Our data erasure/destruction service prices are very reasonable! The reason is that we are a sales company for data erasure and destruction equipment, allowing us to use multiple operational devices. We have a proven track record of visiting many data centers and clients, providing a safe and reliable service. After the work is completed, we will issue a data erasure certificate or destruction certificate. We also offer a buyback service for unwanted computers and servers. Please provide the following four points, and our representative will contact you: 1. Location 2. Types and quantities of storage media from computers/servers 3. Preferred method of data destruction/erasure 4. Whether you need a certificate or not As a bonus for our users, we will also give away a one-year license for the cyber attack response solution App Guard SOLO.
A remote maintenance tool using a completely different method from conventional approaches. No internet connection is required; you can securely connect remotely with just this one device.
- Firewall
Placed before important endpoints! Protection against misuse, prohibited operations, and hijacking.
- Firewall
A valuable resource for stakeholders who want to understand the competitive situation of the financial fraud market!
- Firewall
The rapidly growing network security market.
- Firewall
A detailed ranking of 7 industrial firewall providers is published.
- Firewall
Simply connect the sensor to the existing LAN for installation! It can also be used in a wireless LAN environment.
- Firewall
Providing anti-fraud connection measures in the cloud! Reducing implementation costs for efficient service use.
- Firewall
No need for login or logout! Safe and secure cloud usage with "magical" authentication!
- Firewall
It has been decided that from 2025, all hospitals will be required to implement measures against cyber attacks. The strongest cyber attack prevention tool to protect medical devices and patient data f...
- Other Software
- Security Assessment
- Firewall
It has been decided that from 2025, all companies will be required to implement measures against cyber attacks. The strongest cyber attack prevention tools to protect high-tech technology, data assets...
- Other Software
- Security Assessment
- Firewall

Safe disposal of servers and computers. Numerous achievements in data center implementation, with perfect customer satisfaction! On-site services for data erasure, data destruction, and dismantling removal of HDDs and SSDs from data centers, companies, research institutes, hospitals, schools, etc.
Our staff will visit your location to perform data erasure and destruction on-site. We handle everything from extracting hard drives from computers and servers, disassembly, collection and disposal after erasure/destruction, to issuing certificates. We destroy and erase data from all types of storage media, including HDDs, SSDs, smartphones, magnetic tapes like LTO and DLT, USB drives, and SD cards. Our data erasure/destruction service prices are very reasonable! The reason is that we are a sales company for data erasure and destruction equipment, allowing us to use multiple operational devices. We have a proven track record of visiting many data centers and clients, providing a safe and reliable service. After the work is completed, we will issue a data erasure certificate or destruction certificate. We also offer a buyback service for unwanted computers and servers. Please provide the following four points, and our representative will contact you: 1. Location 2. Types and quantities of storage media from computers/servers 3. Preferred method of data destruction/erasure 4. Whether you need a certificate or not As a bonus for our users, we will also give away a one-year license for the cyber attack response solution App Guard SOLO.
Google's AI-powered threat intelligence, one of the largest in the world, includes malicious judgment information such as files, IPs, and domains.
- Firewall
OWCD3, which comes bundled with a data conversion and decoding computer for OWCD2, has a model that is packaged in a 1U rack mount case!
- Firewall
We have implemented OPC UA, which is being utilized in production equipment communication. It is beneficial for strengthening security measures by line. Let's protect critical infrastructure!
- Firewall
Supporting safe business operations! A specialized team provides centralized monitoring of all networks.
- Firewall
We protect information assets with authentication via IC cards and encryption technology!
- Firewall