I want to prevent information leaks.
I want to prevent information leaks.
The office is overflowing with confidential documents and important data. Therefore, measures are needed for internal education, physical security, and electronic file leak prevention for PCs and servers. While it is often thought that the cause of information leaks is external unauthorized access to the office or network systems, in reality, 80% of cases are due to internal actions. Our company can assist with measures ranging from physical security to computer system protections.
1~20 item / All 20 items
-

FeliCa-compatible access control system 'SCN Series'
Extensive achievements in financial institutions, compatible with various electric locks! Centralized management via server is possible.
last updated
-

PC Personal Authentication USB Token "SecureCore"
Easily manage passwords with USB token authentication!
last updated
-

USB dongle "ROCKEY" software usage restriction license management
Independent protection tool (envelope) enables a wide range of protection methods through the provision of APIs!
last updated
-

Keyless valuables management box "Flora Keep Box"
Available at various facilities! Immediate response during power outages with mechanical emergency unlocking.
last updated
-

[Materials] Documents for considering the introduction of entry and exit management; various entry and exit management systems.
Introducing security through access restrictions such as cards, RFID, biometric authentication, and temperature checks!
last updated
-

Materials for considering the introduction of entry and exit management (e.g., cards, RFID, biometric authentication, etc.)
Introducing products for door access control, entry and exit restrictions for each office room, and more! Flapper gates, electric lock doors, automatic doors, key management, etc.
last updated
-

Collection of examples and catalogs for physical and information management measures for crime prevention and disaster prevention *Free distribution!
A must-see for those considering the introduction of physical and information security! You can find products that suit your company. Preventing information leaks and theft, access permissions, key management, metal detectors.
last updated
-

Catalog of security measures case studies for factories, offices, facilities, and stores *available for free!
A must-see for those considering the introduction of physical and information security! You can find products that suit your company. Information leakage, theft prevention, access rights management, key management.
last updated
-

Web authentication system "SecureVisit" membership-based web system
We will add token authentication to the existing system, achieving significant security enhancement.
last updated
-

Compact Portable Metal Detector Set 'PD140N' _ Introduced at Airports and Customs
Strong resistance to external interference! A robust and ergonomically sophisticated design!
last updated
-

UHF Band RFID Outgoing Management System
Depending on the application, we also offer suggestions for the types of IC tags (metal-compatible, water-resistant, self-sounding, etc.)!
last updated
-

Learning Management System "Speed LMS"
We provide services on a cloud server, allowing for flexible operations!
last updated
-

Windows logon, single sign-on, SecureCore
You can also purchase additional features later! You can use the necessary features when you need them.
last updated
-

Backup system construction maintenance and inspection service _ Hybrid Rich
Solve high-risk backups, backup restoration, and inspection management by utilizing information system outsourcing services! From building backup systems to maintenance.
last updated
-

Information system outsourcing service: We will support your company's system personnel.
By utilizing information system outsourcing services, even without a dedicated system administrator, or by reducing the workload of the responsible personnel, we can ensure smooth daily operations while also mitigating risks.
last updated
-
PC security measures, log monitoring, application device control_Eye247
Asset information management, security inspection/monitoring, terminal control and monitoring! Prevent information leakage.
last updated
-

Server and PC backup system construction, maintenance, and inspection services.
Solve high-risk backups, backup restoration, and inspection management by utilizing information system outsourcing services! From building backup systems to maintenance.
last updated
-

PC migration service to Windows 11
With the end of maintenance support for Windows 10, we will assist you in the early transition to Windows 11.
last updated
-
RFID Solutions: Outgoing/Loan Management, Inventory Management, Performance Collection
Automation with RFID and IC tags improves productivity through automatic recognition. It supports management of item withdrawal/loan, inventory management, performance collection, and process management.
last updated
-

There is also a collection and purchase service for PCs, peripherals, and industrial waste.
We collect, assess, and purchase unwanted used home appliances, computers, and computer peripherals. We can also pick up metal products.
last updated