List of Safety features products
- classification:Safety features
1501~1515 item / All 3712 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
A case of developing a port monitor for card authentication printing of CAD prints using a multifunction printer!
- Software (middle, driver, security, etc.)
- Encryption and authentication
- Other security
Contec's device security solutions that solve industry-specific challenges!
- Industrial PCs
- Virus software
- Software (middle, driver, security, etc.)
New release of the embedded PC "Box Computer® BX-T3000 Trellix model" equipped with ransomware protection software.
Contec has developed an embedded computer pre-installed with Trellix's endpoint security product, Trellix Application Control, a whitelist-type antivirus software for Microsoft Windows 10 IoT Enterprise, which is designed for embedded devices. We will start accepting orders for a new model of the "Box Computer® BX-T3000 Series" from July 9, 2024.
Free design, short delivery time, low cost. Comprehensive support from design development to manufacturing and after-sales service.
- Processing Contract
- Contract manufacturing
- Other security
This is a newly released smart lock for hinged doors.
- Other security
Case studies available for viewing in photos! EPIC Smart Lock / Lavish Electric Lock
We are introducing examples of our products, such as the retrofittable smart lock brand 'EPIC' and the electric lock security system 'Lavish' that meets a wide range of needs, along with photos of their actual implementation. If you are considering installation or have concerns about security around your doors, please take a look and feel free to contact us. 【Past Installation Achievements】 Entrance auto locks, apartments, condominiums, single-family homes, offices, stores, kindergartens/nurseries, short-term rentals, hotels, rental conference rooms, storage rooms, warehouses, pharmaceutical storage, lockers. 【Unlocking Methods】 Face recognition, QR codes, barcodes, cards (FeliCa, MIFARE, EM, proprietary standards), API, PIN codes, fingerprints, remote controls, apps, buttons, intercoms, business phones. Please check the related links below. ▼
No need for login or logout! Use the cloud safely and securely with "magical" authentication!
- Personal authentication
Easily and quickly automate the analysis of malware, making it useful in various scenarios such as initial investigations of damage and pre-shipment inspections for software products to check for malw...
- Virus software
We defend against targeted attacks that cannot be detected by conventional virus protection using progressive heuristic technology.
- Virus software
Thorough compliance enhancement! Prevention of human errors and reduction of work time are also possible.
- Entrance and exit control system
A white paper explaining the challenges and solutions related to the existence of legacy systems. Vulnerability assessment services are also provided by qualified personnel.
- Other security
Based on the inspection checklist under Article 25 of the Medical Care Act, challenges related to the application of security patches and presentations on Heimdal patches, etc.
- Other security
Security risk analysis 'V-sec' for implementing cost-effective cybersecurity measures!
- Other security
Achieving an unprecedentedly superior cost performance! The diagnostic speed is also overwhelmingly fast, and the price is overwhelmingly low.
- Other security
Reflecting the voices of on-site childcare teachers! Developed with an emphasis on simplicity and usability.
- Entrance and exit control system
We will achieve the digitization of time cards simply and at a low cost!
- Entrance and exit control system
Perfect palm-sized 100x25x20mm for management locks, cabinets, and industrial locks.
- Entrance and exit control system
- Other security and surveillance systems
- others