List of Firewall products
- classification:Firewall
16~30 item / All 224 items
Since the construction-generated soil will be recycled on-site, the disposal costs for leftover soil and the costs for new purchases will be significantly reduced. 【Disaster Prevention】
- Special Construction Method
The Noto Reconstruction Office of the Ministry of Land, Infrastructure, Transport and Tourism has featured our 3D printer in the Nikkei newspaper.
The official X account of the Noto Reconstruction Office of the Ministry of Land, Infrastructure, Transport and Tourism and the Nihon Keizai Shimbun have published that our 3D printer has been adopted for the reconstruction of Noto. The official X account of the Noto Reconstruction Office introduces the use of our products in the restoration work of the Noto Expressway. Additionally, the Nihon Keizai Shimbun mentions that structures made with our products are being used for the restoration of roads damaged by the Noto Peninsula earthquake, and that the construction period can be shortened by about two weeks, so please take a look.
Contributing to the second stage of public infrastructure! Bringing public infrastructure development to the ground. A robust outdoor storage tank for hazardous materials capable of responding to the ...
- Water Treatment
If you're wondering what measures to take for information security, this is a must-read!
- Security Assessment
- Firewall
- WAF
We provide one-stop services for the introduction, construction, and operation of network, server, and cloud environments to support the strengthening of corporate IT infrastructure.
- Groupware
- Video conferencing system
- Firewall
Achieve the same access environment as the office even during telework, balancing enhanced security and improved operational efficiency!
- Firewall
We will achieve the highest level of security even during telework and accelerate digital transformation!
- Firewall
Providing solutions that comprehensively address labor and security issues utilizing AI to businesses and government agencies.
Initial Point Co., Ltd. and TIGEREYE Co., Ltd. have concluded an agency agreement. ■ Background and Purpose With the spread of DX and remote work, building a system that balances security and labor management has become an important management issue for companies. Initial Point has been providing a secure remote work environment for a wide range of customers, from government agencies and medical institutions to educational institutions and small and medium-sized enterprises, through its quarantine-type multi-factor authentication service "JinCreek." TIGEREYE offers AI solutions that support corporate human resource management, such as "FacePass Attendance" and "FacePass Stress Checker," which utilize facial recognition. ■ Provided Solutions - FacePass Attendance: A facial recognition-based attendance management system that can be implemented without the need for dedicated terminals, preventing clock-in errors and fraudulent clock-ins. - FacePass Stress Checker: Captures facial emotion data at the time of clocking in, visualizing employees' mental states. - FacePass Key & Access Control: A cloud-based, contactless authentication access control management system. - AI Avatar / AI Agent: Next-generation conversational AI solutions that support dialogue and customer service operations for municipalities and businesses.
You can quickly, easily, and reliably create a management environment for "FFRI yarai"! The hassle of building a management server is eliminated.
- Firewall
- Other office supplies
- others
Review building control to optimize convenience, compatibility, and cybersecurity measures.
- Firewall
- Facility Management System
- Other security systems
A shredder that can crush all types of media including 3.5-inch HDDs, 2.5-inch HDDs, SSDs, smartphones, USBs, and credit cards.
- others
- Firewall
Even with legacy infrastructure, internet-based integrated control is placed at the center of the building's operational strategy.
- Firewall
- Facility Management System
- Other security systems
A shredder equipped with two crushing blades that can destroy all types of media, including 3.5-inch HDDs, 2.5-inch HDDs, SSDs, and smartphones.
- others
- Firewall
New release: A shredder equipped with two cutting heads that can shred all types of media, including 3.5-inch HDDs, 2.5-inch HDDs, SSDs, smartphones, USBs, and credit cards.
The granulator is a shredder equipped with two cutting heads that can crush all types of media, including 3.5-inch HDDs, 2.5-inch HDDs, SSDs, smartphones, USBs, and credit cards. The specially designed cutting heads automatically reverse and repeat the process until the inserted device is completely shredded if there are any hard parts. Server HDDs and SSDs can be shredded without removing the mount. For HDD shredding, you can choose from three sizes: 14mm, 12mm, and 8mm, while for SSDs, you can select from screens without a screen, 5mm, and 3.5mm, allowing you to change the particle size, processing speed, and security level. The 130-liter large-capacity mobile bucket makes waste disposal easy. Thanks to the technology of the renowned German shredder manufacturer Intimus, it has received very high praise for its outstanding durability and performance.
NIST-compliant SSD shredder PDS-88 that completely prevents information leakage by crushing server and PC SSDs and smartphone IC chips into extremely small pieces.
- others
- Firewall
SSD Shredder Flash EX completely prevents information leakage by crushing SSDs and smartphone IC chips into extremely small pieces.
- others
- Firewall
Safe disposal of servers and computers. Numerous achievements in data center implementation, with perfect customer satisfaction! On-site services for data erasure, data destruction, and dismantling removal of HDDs and SSDs from data centers, companies, research institutes, hospitals, schools, etc.
Our staff will visit your location to perform data erasure and destruction on-site. We handle everything from extracting hard drives from computers and servers, disassembly, collection and disposal after erasure/destruction, to issuing certificates. We destroy and erase data from all types of storage media, including HDDs, SSDs, smartphones, magnetic tapes like LTO and DLT, USB drives, and SD cards. Our data erasure/destruction service prices are very reasonable! The reason is that we are a sales company for data erasure and destruction equipment, allowing us to use multiple operational devices. We have a proven track record of visiting many data centers and clients, providing a safe and reliable service. After the work is completed, we will issue a data erasure certificate or destruction certificate. We also offer a buyback service for unwanted computers and servers. Please provide the following four points, and our representative will contact you: 1. Location 2. Types and quantities of storage media from computers/servers 3. Preferred method of data destruction/erasure 4. Whether you need a certificate or not As a bonus for our users, we will also give away a one-year license for the cyber attack response solution App Guard SOLO.
Introduced on approximately 900 iPads! A case study that achieved secure access to in-house systems.
- Firewall
Implemented on all smartphones provided to bank employees! Strengthening measures against information leaks has also been achieved.
- Firewall