We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Entrance and exit control system.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Entrance and exit control system Product List and Ranking from 62 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Oct 15, 2025~Nov 11, 2025
This ranking is based on the number of page views on our site.

Entrance and exit control system Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Oct 15, 2025~Nov 11, 2025
This ranking is based on the number of page views on our site.

  1. パーソナル Gunma//Trading company/Wholesale
  2. アライドテレシス 本社 Tokyo//IT/Telecommunications
  3. ジャパンコンピューターサービス 本社、大阪事業所、LCMセンター Tokyo//IT/Telecommunications
  4. 4 サノテック Okayama//software
  5. 5 エヌケーシー Aichi//Industrial Electrical Equipment

Entrance and exit control system Product ranking

Last Updated: Aggregation Period:Oct 15, 2025~Nov 11, 2025
This ranking is based on the number of page views on our site.

  1. Case Study of Personal Armor 1: Ritsumeikan University, Kinugasa パーソナル
  2. Case Study of Personal Armor 1: Ritsumeikan University Biwako-Kusatsu Campus パーソナル
  3. Case Study: March 2019, Musashino Art University, Takadanobaba Campus パーソナル
  4. "Fingerprint Authentication Locker" *Case Study Collection Giveaway! パーソナル
  5. 4 Layer 3 Switch CentreCOM x950 Series アライドテレシス 本社

Entrance and exit control system Product List

136~149 item / All 149 items

Displayed results

Multi-functional Entry and Exit Management System GG-1

Next-generation access control system

■Main Features ●Up to 98 secure panels can be connected via LAN for controlling 8 gates, enabling global security management. (Supports control of up to 784 gates) ●One secure panel can connect up to 8 gates, with 48 identification terminals connected via LON, 56 external input/output control signals each, a history of 50,000 entries, and expansion according to design requirements. ●Depending on the security level, up to three types of identification terminals can be freely combined and installed at one gate, including keypad, scrambled keypad, magnetic cards, contactless cards, and fingerprint verification. ●Users can register up to 50,000 individuals as standard. ●Most of the advanced management functions required for access control systems are equipped as standard.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Akerun Entry and Exit Management System

Manage your keys online anytime! A system that allows you to easily set up access control to specific locations!

Our company offers the "Akerun Access Control System," which can be unlocked using IC cards such as employee IDs, transportation IC cards, or smartphones. It can be used simply by sticking it on existing doors. It accurately manages entry and exit, and through API integration with external services, it can also automatically handle attendance management. It has been implemented in a variety of companies, including offices of all sizes, coworking spaces, and research facilities. 【Features】 ■ Simply stick it on existing doors ■ Initial costs and restoration costs are zero ■ Manage keys anytime on the web ■ Accurately manage entry and exit ■ Unlock with IC cards such as employee IDs, transportation IC cards, or smartphones ■ 24/7 reliable support *For more details, please refer to the PDF document or feel free to contact us.

  • Server monitoring and network management tools
  • Other operation management software
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Use Case] Utilizing RFID for Access Control Management

By using RFID tags as employee IDs, we can accurately record who entered and exited which room and when!

We would like to introduce an example of utilizing RFID for access control management. For companies, strict access control is essential to protect important assets from risks such as information leaks and theft. Traditional management methods using keys or ID cards have various challenges, including the risk of loss or theft and the hassle of management. Access control systems utilizing RFID are gaining attention as an effective means to solve these issues and enhance security levels. [Challenges] ■ Knowing who used the room and when ■ Concerns about security measures against unauthorized intrusions ■ Wanting to track employees' access times *For more details, please refer to the related links or feel free to contact us.

  • RFID related products and IC tag services
  • RFID/IC tags

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Layer 2 switch with 16-port management function "FXC5218"

A high-performance gigabit switch that achieves a full gigabit Ethernet environment in a compact chassis.

The "FXC5218" is equipped with 16 ports of 10/100/1000Mbps and can be used as a core switch for gigabit servers and gigabit switches. It has 2 SFP slots, allowing simultaneous use with 10BASE-T/100BASE-TX/1000BASE-T ports. 【Features】 ○ Full gigabit configuration with 16 ports of 10/100/1000BASE-T ○ Equipped with SFP slots. Allows simultaneous use with 10BASE-T/100BASE-TX/1000BASE-T ports ○ Fanless design for quiet operation, creating a comfortable environment ○ Energy-saving support with IEEE802.3az (EEE) and power control features ○ Compliant with IEEE802.1d (STP) and IEEE802.1w (RSTP) ● For more details, please contact us or download the catalog.

  • Company:FXC
  • Price:10,000 yen-100,000 yen
  • Other network tools
  • Integrated operation management
  • Routers, Switches, and Hubs

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introducing the new option: Entry and Exit Management System 'ISC System'

A highly reliable and secure security system! Semi-customized system upgrade!

The "ISC System" is an access control management system that can centrally manage a wide range of needs, including security gates, key management devices, security cabinets, crime prevention monitoring systems, network cameras, and PC security. A new option has been added to the "ISC System." It is possible to semi-customize the system to enhance security and understand work conditions according to specific needs. 【New Options】 ■ ISC Face Monitor - Identity verification function ■ ISC Human Resources and Card Issuance Data Reading Software ■ ISC Presence Time Display Software ■ ISC-Web *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Entrance and exit control system
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Business Achievements: Access Control System Using IC Cards

If you are having trouble with the development of an entry and exit management system, please feel free to contact us.

【Business Achievements】 We have a track record of developing access control systems using IC cards. - Large office buildings - Access management gates for trucks in logistics warehouses - Hospitals - Access control for large factories <About Acquesty> We support everything from proposals, development, design, and adjustments for Factory Automation (FA) to Building Automation (BA). You can rely on us for software development and design for computers/DCS/PLC/touch panels, as well as control panel design and equipment selection for building FA and BA.

  • Other FA equipment
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Face recognition & fingerprint recognition automatic door opening and closing system

It detects facial recognition, fingerprint recognition, IC cards, and passwords to unlock the front door and indoor doors.

This product is a system that can be easily installed at home entrances, apartment entrances, and doors of rooms that require safety and privacy, unlike conventional expensive automatic door systems, and at a low price. By using this product along with the automatic door opening and closing unit and the electromagnetic lock unit, it enables management of entry. It prevents unauthorized access and accidents caused by forgetting to lock the door. 【Features】 - By using the automatic door unit, the door can automatically open and close after detection. - It prevents losing keys or forgetting to lock the door, achieving high security. - The automatic opening door unit is available in two types: for outward opening and for inward opening. *For more details, please download the PDF or contact us.

  • Company:PM&PM
  • Price:Other
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Sophos Firewall <Features Beyond the Firewall>

Rated by G2 users as the top-level firewall solution!

The 'Sophos Firewall' and XGS series appliances equipped with a dedicated Xstream Flow Processor form the core of a world-class network security platform. They integrate network protection with a scalable platform to safeguard the world of hybrid networks. Please feel free to contact us when needed. 【Use Cases (Excerpt)】 ■ Powerful Protection and Performance - Expected Outcome: Prevent encrypted zero-day threats without compromising performance. ■ Automated Response to Threats - Expected Outcome: Automatically identify active threats and swiftly block them on the spot. *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Sophos MDR <Expert-led Threat Defense>

Act quickly to neutralize threats before disruptions to business operations or breaches of confidential data occur!

"Sophos MDR (Managed Detection and Response)" is a fully managed service where experts detect and respond to cyber attacks targeting computers, servers, networks, cloud workloads, email accounts, and more, 24/7 year-round. By using this service, Sophos's expert team swiftly takes action to neutralize threats before disruptions to business operations or breaches of confidential data occur, effectively blocking human-led advanced attacks. Please feel free to contact us when you need assistance. 【Use Cases (Excerpt)】 ■ 24/7 Threat Monitoring - Expected Outcome: Experts capable of responding to threats extend your IT and security teams on your behalf. ■ Rapid Response to Threats - Expected Outcome: Improvement in the average time to respond to confirmed threats (MTTR). *For more details, please download the PDF or feel free to contact us.

  • Other contract services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Layer 2 switch "FXC5210" with 8-port management functionality

A high-performance gigabit switch that achieves a full gigabit Ethernet environment in a compact chassis.

The "FXC5210" is equipped with 8 ports of 10/100/1000Mbps and can be used as a core switch for gigabit servers and gigabit switches. It has 2 SFP slots, allowing simultaneous use with 10BASE-T/100BASE-TX/1000BASE-T ports. 【Features】 ○ Full gigabit configuration with 8 ports of 10/100/1000BASE-T ○ Equipped with SFP slots. Simultaneous use with 10BASE-T/100BASE-TX/1000BASE-T ports is possible ○ Fanless design for quiet operation, creating a comfortable environment ○ Energy-saving support with IEEE802.3az (EEE) and power control features ○ Compliant with IEEE802.1d (STP) and IEEE802.1w (RSTP) ● For more details, please contact us or download the catalog.

  • Company:FXC
  • Price:10,000 yen-100,000 yen
  • Other network tools
  • Integrated operation management
  • Routers, Switches, and Hubs

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Is it tough after implementation? A special feature on solving problems with entrance and exit management systems!

Introducing three common concerns and features that often arise after the implementation of an entry and exit management system!

While S-TEKT is working on the construction of an access control system, we actually receive inquiries from customers considering replacing their existing systems just as much as from those looking to implement a new system. Today, we will introduce the concerns of those who have already implemented an access control system but have reached out to us, along with potential solutions. To address security-related issues, operational burdens, and cost-related concerns, it is essential to clarify the purpose of your company's access control management and to proceed with the implementation while understanding the characteristics of the access control system. *For more detailed information, please refer to the related links. Feel free to contact us for more details.*

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Outdoor installation is also possible! Access control system using facial recognition.

Companies with multiple offices can manage entry and exit at the headquarters all at once! It can also be implemented at construction sites with limited time!

Are you having trouble managing entry and exit at multiple sales offices, offices, and outdoor locations? We can propose not only the permanent installation of facial recognition devices but also temporary installations at construction sites outdoors for a specified period! We can manage not just one door but also centralized management at the headquarters. Our company can offer entry and exit management systems from multiple manufacturers, allowing us to provide solutions tailored to your needs. We handle devices that operate with facial recognition, cards, PIN codes, and iris recognition. If you are struggling with entry and exit management, please feel free to consult with us. We can guide you from equipment proposals to construction.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[ZENMU Implementation Case] PSC Co., Ltd.

Adopted for mobile work information leakage countermeasures! An important piece supporting the security business.

We would like to introduce a case study on the implementation of "ZENMU Virtual Desktop" at PSC Corporation. The company had taken measures such as disk encryption to prevent information leakage from portable PCs, but the risk of data being accessed due to theft or loss of PCs could not be reduced to zero. After the introduction of our product, they were freed from the anxiety of information leakage from portable PCs. Even when transitioning partially to a remote work system, they were able to allow employees to carry PCs without hastily implementing special measures. 【Case Overview】 ■Challenges - A significant reduction in the risk of information leakage from portable PCs was required. - The goal was to reduce the risk of information leakage from portable PCs to as close to zero as possible. ■Effects - Mobile work and remote work can be promoted without worrying about the risk of information leakage. - Expansion and strengthening of the portfolio for customer endpoint security solutions. *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration