I want to prevent information leaks.
I want to prevent information leaks.
The office is overflowing with confidential documents and important data. Therefore, measures are needed for internal education, physical security, and electronic file leak prevention for PCs and servers. While it is often thought that the cause of information leaks is external unauthorized access to the office or network systems, in reality, 80% of cases are due to internal actions. Our company can assist with measures ranging from physical security to computer system protections.
1~30 item / All 33 items
-
Security Archive System "Digital @ IC Series"
The office is full of information that needs to be protected! A system suitable for managing the removal of items!
last updated
-
FeliCa-compatible access control system 'SCN Series'
Extensive achievements in financial institutions, compatible with various electric locks! Centralized management via server is possible.
last updated
-
PC Personal Authentication USB Token "SecureCore"
Easily manage passwords with USB token authentication!
last updated
-
USB dongle "ROCKEY" software usage restriction license management
Independent protection tool (envelope) enables a wide range of protection methods through the provision of APIs!
last updated
-
Digital @ IC Key System
A new solution for key management! Real-time log collection on network PCs.
last updated
-
Keyless valuables management box "Flora Keep Box"
Available at various facilities! Immediate response during power outages with mechanical emergency unlocking.
last updated
-
Various flapper gates - Access control systems, card/biometric authentication, etc.
Accessible for wheelchair users! The door is located in the center and can move a total of 180 degrees to the left and right.
last updated
-
Flapper Gate: Like a ticket gate at a station! _Access Control System
Access control management with IC cards, QR codes, and biometric authentication. Flapper gates can enhance security and ensure smooth passage.
last updated
-
PC and peripheral equipment unwanted item pickup service
Re-challenge for resale! Contributing to cost reduction by sliding into free disposal and purchase disposal.
last updated
-
[Materials] Documents for considering the introduction of entry and exit management; various entry and exit management systems.
Introducing security through access restrictions such as cards, RFID, biometric authentication, and temperature checks!
last updated
-
IC card solution - Access control and PC management using IC cards.
Attendance, entry and exit, security gates, etc., can all be managed with a single card for multiple purposes!
last updated
-
Web Application Firewall "WAPPLES"
Updates are infrequent, about three times a year! Proven technical reliability in all detection and defense!
last updated
-
Materials for considering the introduction of entry and exit management (e.g., cards, RFID, biometric authentication, etc.)
Introducing products for door access control, entry and exit restrictions for each office room, and more! Flapper gates, electric lock doors, automatic doors, key management, etc.
last updated
-
Collection of examples and catalogs for physical and information management measures for crime prevention and disaster prevention *Free distribution!
A must-see for those considering the introduction of physical and information security! You can find products that suit your company. Preventing information leaks and theft, access permissions, key management, metal detectors.
last updated
-
Catalog of security measures case studies for factories, offices, facilities, and stores *available for free!
A must-see for those considering the introduction of physical and information security! You can find products that suit your company. Information leakage, theft prevention, access rights management, key management.
last updated
-
Web authentication system "SecureVisit" membership-based web system
We will add token authentication to the existing system, achieving significant security enhancement.
last updated
-
Easy installation and affordable access control system 'Smart Rim Lock'
Can be used in conjunction with user passwords! Comes with a free management application.
last updated
-
A booklet that clearly explains information management and security measures.
Divided into physical security and information security.
last updated
-
PC login authentication management one-time password token 'C100'
Compatible with various applications! Portable design that's easy to carry.
last updated
-
Compact Portable Metal Detector Set 'PD140N' _ Introduced at Airports and Customs
Strong resistance to external interference! A robust and ergonomically sophisticated design!
last updated
-
UHF Band RFID Outgoing Management System
Depending on the application, we also offer suggestions for the types of IC tags (metal-compatible, water-resistant, self-sounding, etc.)!
last updated
-
Learning Management System "Speed LMS"
We provide services on a cloud server, allowing for flexible operations!
last updated
-
Windows logon, single sign-on, SecureCore
You can also purchase additional features later! You can use the necessary features when you need them.
last updated
-
Database encryption package "D'Amo"
Tightly guard your information assets! It is possible to manage the company's database in an integrated manner from a security perspective.
last updated
-
PC, HDD disposal, destruction, and data erasure service
Purchase and disposal of unused PCs, servers, and HDDs, HDD destruction, and data deletion services. On-site collection and local data destruction are also available.
last updated
-
Backup system construction maintenance and inspection service _ Hybrid Rich
Solve high-risk backups, backup restoration, and inspection management by utilizing information system outsourcing services! From building backup systems to maintenance.
last updated
-
Information system outsourcing service: We will support your company's system personnel.
By utilizing information system outsourcing services, even without a dedicated system administrator, or by reducing the workload of the responsible personnel, we can ensure smooth daily operations while also mitigating risks.
last updated
-
PC kitting, cloning, and PC/monitor purchase service
By utilizing information system outsourcing services, even without a dedicated system administrator, or by alleviating the workload of the responsible personnel, daily operations can be conducted smoothly while also reducing risks.
last updated
-
PC security measures, log monitoring, application device control_Eye247
Asset information management, security inspection/monitoring, terminal control and monitoring! Prevent information leakage.
last updated
-
Industrial waste and unwanted item collection service
Purchase and disposal of unused home appliances, computers, and peripherals, HDD destruction, and data deletion services. On-site collection and local data destruction are also available.
last updated