Select introduction example by scene

Please take a look at our ideal security solutions for 10 different scenes/facilities.

Perspective view


We suggest a security system that features image, authentication and detection functions suitable for each area ranging from the perimeter of the site to the production line.

Perspective view

Distribution Warehouse

We suggest a security system that features image, authentication and detection functions suitable for each area ranging from the perimeter of the site to the picking location.

Perspective view

Financial Institution

We suggest a system construction in a storage with a high-capacity for long-term recording in accordance with the guidelines of the financial institution.

Perspective view


We suggest a security system that not only offers a variety of {i>security<i} applications, but also the benefit of {i>customer service improvement<i} and {i>smooth business performance<i}.

Perspective view


We suggest a reliable and effective theft prevention for important goods of hospitals including chemicals, injection needles, medical records, and PCs (important data).

Perspective view

Educational Institution

We suggest a surveillance camera and access control system focusing on identity theft prevention in libraries, PC rooms, archives, laboratories, chemical storages, etc..

Perspective view

Data Center

We suggest a system with an emphasis on thorough access control to the most important areas e.g. access by IC card and biometric authentication.

Perspective view


We suggest a surveillance camera system not only as a means of solving crimes and pranks, but to create a comfortable living environment by complying with rules and preventing crimes and pranks.

Perspective view


We suggest a surveillance camera system with the main purpose to give clear instructions to employees and as a measure against corruption.

Perspective view

Convenience Store

We suggest a surveillance camera system that has a wide range of applications including theft prevention and video evidence, as well as inventory management and prevention of trouble with customers.

Introduction Examples

Company Profile

ISMS Basic Policy (Information Security Basic Policy)

We try to always take the appropriate measures to completely protect the personal and confidential information entrusted to us, hoping to earn the trust and appreciation of society. And for this to become permanently part of our universal business culture, it was specifically stipulated in our {i>ISMS Basic Policy<i}. We will comply with this policy and continue to strive to maintain an advanced information management system.

Information Security Management System

We strive to protect all “information assets” held by the Company, and by complying with the laws and regulations relating to information security, we hope to earn the trust of society and continue to create management systems that always are aware of their information security.

Establishment of Our Information Security Management Office and Administration Officers

In order to implement information security measures, we have established an information security administration office under the management system with the representative director as the responsible officer. We also established an information security officer in each Department, clarified his role, and created an appropriate environment to enable the management of information.

Protection of Information Assets and Establishment of Internal Regulations

In order to completely protect our information assets from threats against the confidentiality, integrity and availability of those assets, we have formulated the ISMS Manual explicitly telling our employees how to behave, to make them thoroughly aware of our clear and specific policies.

Information Security Education and Training

To ensure our employees are well informed about information security management, we continuously conduct education and training raising our employees’ awareness and achieving a thorough understanding of all information security-related regulations.

Improvement of Our Audit System

We strive to implement appropriate information management by improving our internal audit system for information security management, regularly examining and evaluating our compliance with all regulations relating to information security management based on the ISMS manual, and then reviewing our information security management measures.

For inquiries about natural environment policy and information security policy, please contact here.
Second Edition: established February 1, 2010
Nature Corporation
Representative Director and President Nakamura Shinichiro