List of Safety features products
- classification:Safety features
1951~1965 item / All 3710 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
Optimization of management resources is also possible! Introducing cashless solutions with IoT devices in our blog.
- Other security
You can keep track of the expiration date! An effective way to prevent license violations is introduced in the blog.
- Other security
Equipped with a facial recognition engine that can recognize faces even with masks on!
- Personal authentication
Authentication credentials are available! Introducing security keys in our blog.
- Other security
Achieving a robust security network! Introducing Zero Trust in our blog.
- Encryption and authentication
Prevent unauthorized login by impersonation! Introducing appropriate MFA devices in our blog.
- Encryption and authentication
To ensure that "it's already too late by the time you realize it!" is definitely prevented! We will significantly reduce operational burdens and operational costs.
- Virus software
Campaign extension decided! Until December 31, 2022. Strong support for vulnerability assessments and incident response training! Take advantage of this special package to combat increasingly malicious cyber attacks.
Allied Telesis, Inc. (Headquarters: Shinagawa-ku, Tokyo; Chairman: Akira Oshima) announces the extension of its ongoing "Pentest Campaign," which targets web server diagnostic services and phishing email training services, until December 31, 2022 (for orders received). As digital transformation (DX) progresses across various markets, cyberattacks such as "targeted attacks" primarily using email and "website tampering" exploiting network vulnerabilities are becoming increasingly malicious, and the expansion of their damage has become a global issue. In the event of an attack, not only could business and services be halted, but there is also the potential for significant damage that threatens business continuity due to the leakage of confidential information and loss of trust. To protect organizations from these threats, it is essential to conduct vulnerability assessments to prevent damage in advance, improve employees' security literacy through training, and provide incident response education to appropriately handle emergencies. *For more details, please refer to the PDF materials or related links.*
We propose a suitable plan! Security measures advanced through "diagnosis and investigation" and "countermeasures and strengthening."
- Software (middle, driver, security, etc.)
- Other security
News 2023/2/14: A new outdoor security camera system to prevent frequent thefts and vandalism.
- Surveillance Cameras
- Surveillance Camera System
- Other security
1CH H.265 4K (3840×2160/60fps) compatible video server
- Video Recorder
- Other security
- Other security and surveillance systems
We will introduce numerous examples of how standardization and efficiency improvements have significantly increased work efficiency! You can create IC cards easily and cheaply.
- Entrance and exit control system
- Personal authentication
- Personnel and Labor
Identity verification using IC card + fingerprint without a dedicated authentication server or fingerprint authentication device.
- Dedicated IC
- Personal authentication
- Encryption and authentication
Reduction of key management burden / Improvement of information and safety management / Measures for personal information protection law
- Encryption and authentication
- Entrance and exit control system
- Personal authentication
Touch panel LCD integrated with entry and exit controller non-contact IC card reader.
- Entrance and exit control system
- Personal authentication
- Encryption and authentication
A fingerprint authentication IC card that realizes two-factor authentication with "ownership authentication via IC card" and "biometric authentication via fingerprint" on a single card.
- Dedicated IC
- Personal authentication
- Encryption and authentication