List of Security Assessment products
- classification:Security Assessment
226~270 item / All 298 items
You can't just say you didn't know! Introducing solutions to prepare for the revised Personal Information Protection Law.
- Other security systems
- Other Software
- Security Assessment
A safe business environment on the web without the need to be aware of security. Web security with numerous implementation results.
- Security Assessment
Leave it to us for support with the "SECURITY ACTION" declaration!
- Security Assessment
- Other Software
We will support you in minimizing security damage!
- Other Software
- Security Assessment
Providing continuous operational services tailored to the customer's environment!
- Security Assessment
- Other Management Services
The first step in security measures is a security assessment!
- Security Assessment
Providing solutions for the collection and analysis of security logs, visualization of LAN communications, and risk response!
- Security Assessment
Significantly contributes to countermeasures against spoofed emails by combining DMARC/25 with diagnostic consulting services.
- Security Assessment
To prepare for the increasing risk of information leaks due to cyber attacks! Flexible responses are possible!
- Other Software
- Security Assessment
Large-scale user-oriented thin client system!
- Security Assessment
- Knowledge Sharing System
- Other Software
Supporting risk measures to protect the organization's critical data!
- Security Assessment
- Other Management Services
- Labor Management System
Utilize our personnel to reduce costs for SIRT collection!
- Security Assessment
- Firewall
This is a handheld thermal imaging camera specially designed for temperature measurement. It can quickly detect temperature anomalies and equipment abnormalities.
- Other measuring instruments
- Nursing care products
- Security Assessment
Specially designed for body temperature measurement with a measurement range of 30 to 45°C and an error of ±0.5°. AI features such as facial recognition prevent false detection. Most other products ar...
- Other measuring instruments
- Nursing care products
- Security Assessment

The introduction of temperature measurement using thermography in Hakusan City, Ishikawa Prefecture was featured on NHK News.
In Hakusan City, Ishikawa Prefecture, an article was featured on "NHK News" about the implementation of temperature checks for visitors at entrances using handheld thermal imaging devices sold by our company as a measure against the novel coronavirus in government buildings. Handheld thermal imaging devices are portable and can instantly measure high temperatures, making them ideal for temperature checks at the entrances of various facilities. As a measure against the novel coronavirus, the introduction of temperature checks using thermal imaging is increasing in schools, hospitals, and businesses.
Designed specifically for temperature measurement, with a measurement range of 30 to 45°C and an error margin of only ±0.5°. It can also prevent false detections using facial recognition AI.
- Other measuring instruments
- Nursing care products
- Security Assessment
Shall we visualize the "unnoticed risks" and "necessary measures" for the future?
- Security Assessment
Achieving security automation with AI!
- Other security systems
- Security Assessment
Mobile threat protection solution: It keeps personal and corporate data safe by protecting mobile devices across all attack vectors.
- Other security systems
- Security Assessment
Achieve the industry's best detection rate with CheckPoint's ThreatCloud, the most powerful threat intelligence in the world!
- Other security systems
- Security Assessment
What happens if you don't take security measures? "It's too late once you've been attacked!" "Take measures before you're attacked!"
- Other security systems
- Security Assessment
Achieve high reliability in security while keeping operational costs down!
- Other security systems
- Security Assessment
We regularly diagnose the security level of AWS and propose configurations that comply with best practices.
- Security Assessment
Zero trust security that anyone can easily use, regardless of device or application!
- Other PCs and OA equipment
- Security Assessment
Detection of unauthorized use of our domain! By being able to grasp the existence and content of phishing emails, we can also prevent damage to customers and partners.
- Security Assessment

TwoFive signs agency agreement with DigiCert Japan and starts selling BIMI-compliant certification mark certificates.
TwoFive Inc. has entered into a sales agency agreement with DigiCert Japan LLC for the Verified Mark Certificates (VMC), which comply with the new email authentication technology known as the BIMI standard. Additionally, we provide a cloud service called "DMARC / 25 Analyze" that aggregates and visualizes DMARC reports, making it easy to understand the authentication results on the email receiving side after implementing DMARC, so that organizations can reflect the results in their security measures. We support all companies and organizations that send emails in properly utilizing DMARC and BIMI without requiring special expertise.
Block targeted attack emails before they arrive! You can start using it shortly after the decision to implement it.
- Security Assessment
Realize QR code conversion of large data such as videos and audio! Eliminates the risk of information leakage and forgery.
- Ad management and operations
- Security Assessment
Unlimited automatic generation of variable codes! Color design QR codes that make the content visually understandable.
- Ad management and operations
- Security Assessment
We will address the damage caused by the frequent vulnerabilities of websites!
- Security Assessment
A security solution for PCs that enables operations that do not lead to information leaks!
- Security Assessment
- WAF
Security solution to protect the database from internal and external attacks. It monitors, records, and detects/defends against all SQL statements.
- Security Assessment
- WAF
- Firewall
We will centrally manage all logs to investigate the causes of failures and detect threats.
- Security Assessment
Achieving the only "correct decontamination." Electronic file "decontamination and sterilization" solution. No. 1 in implementation results in local governments. Beware of similar products.
- Firewall
- Security Assessment
- WAF
A certification platform that has been widely adopted across various industries and scales for many years as a certification infrastructure!
- Security Assessment
- Other Software
Expert share for executives troubled by security investigations from business partners.
- Security Assessment
Timely provision of OSS vulnerability information! You can maintain the security level of your system.
- Security Assessment
The Linux kernel operates in a constantly updated state! Automatically applies vulnerability patches without rebooting.
- Security Assessment
A cloud-based service that can accommodate flexible schedules such as spot diagnoses and regular check-ups.
- Security Assessment
Affordable simple inspections for diagnosis! You can check the condition of the equipment and the appropriate maintenance program.
- Security Assessment
Already available password lists and leaked information on the dark web can be investigated!
- Security Assessment
- Other Software
It is a device for protection against ransomware for NAS with a completely new concept.
- Security Assessment
To customers who cannot avoid the labor of security risk analysis: We can significantly reduce the hassle by automating the tedious report creation for security risk analysis.
- Security Assessment
The risk analysis results are clearer with our original four-level evaluation method!
- Security Assessment
It will be a powerful tool for starting the management of cybersecurity for overseas bases and business partners of the company.
- Security Assessment
An English version of the tool based on IPA's "Security Risk Analysis of Control Systems" for strengthening cybersecurity at overseas bases and business partners.
- Security Assessment