List of Safety features products
- classification:Safety features
2086~2100 item / All 3710 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
The fear of dangerous supply chain attacks! Use the ultimate technique of excellent behavior detection to contain the fierce attacks!
- Routers, Switches, and Hubs
- Other security
Terrifying News: A Truly Scary Story - Episode 1
In the horror news, we introduce truly scary stories. The first story is about "The Fear of Dangerous Supply Chain Attacks." "There were attacks targeting the supply chains of major Japanese manufacturers," and "a subsidiary's subcontractor messed up," leading to damage that spread from subcontractors to subsidiaries and then to parent companies. In such times, the security switch 'SubGate' protects the network. With its excellent behavior detection capabilities, it can block harmful traffic, prevent the spread of viruses, and stop data theft. *For more details, please refer to related products and catalogs, or feel free to contact us.*
The damage that occurred just from bringing the telework PC back to the company! Containing the cluster with a special move!
- Routers, Switches, and Hubs
- Other security
Terrifying News: A Truly Scary Story, Episode 2
In the horror news, we introduce truly scary stories. The second episode is about "Just bringing the telework PC back to the company...". There have been incidents such as "connecting the telework PC to the company's LAN," "the fear of home clusters," and "the emergence of corporate clusters from returned PCs." In such times, the security switch 'SubGate' protects the network. With its excellent behavior detection capabilities, it can block harmful traffic, prevent the spread of viruses, and stop data theft. *For more details, please refer to the related products and catalog, or feel free to contact us.
We are introducing how to prevent sophisticated cyber attacks and what should be done!
- Routers, Switches, and Hubs
- Other security
[Data] Security Measures in 2022
This document introduces security measures for 2022 on how to address increasingly sophisticated cyber attacks such as EMOTET, ransomware, and supply chain attacks. It includes sections on "What is EMOTET," "Attack Methods," and "Examples of Attacks on Major Manufacturing Supply Chains." Additionally, it introduces 'SubGate,' which helps prevent the spread of viruses. Please make use of this information for your countermeasures. *For more details, please refer to related products and catalogs, or feel free to contact us.
This is a card reader dedicated to the entry and exit management system ACsmart/ACsmart2.
- Entrance and exit control system
This is a card reader specifically for the entry and exit management system ACsmart/ACsmart2.
- Entrance and exit control system
Investigating major vulnerabilities that are easily exploited and have a significant impact!
- Other security
With the single-camera 2D authentication method, high-speed walkthrough authentication of approximately 30 people per minute is possible.
- Entrance and exit control system
With the single-camera 2D authentication method, high-speed walkthrough authentication of approximately 30 people per minute is possible.
- Entrance and exit control system
Sophisticated design, feature-rich card reader. Smart design that allows for immediate operation with simple setup.
- Entrance and exit control system
Detection of attempts to misuse! Visualization of vulnerabilities in layers lower than the OS (i.e., firmware).
- Software (middle, driver, security, etc.)
- Server monitoring and network management tools
- Other security
Matrix Corporation (Chuo Ward, Osaka City) is pleased to announce that it has begun development of a safety device (tentative) to support the prevention of leaving passengers behind on buses.
- Other security
- Safety Sensors
- Other safety equipment
We propose a high-precision and affordable hybrid location information solution that takes the best of BLE and UWB! The setup is really easy as well.
- IC tag
- Entrance and exit control system
- Other information systems
This is a face recognition module suitable for embedded development in various devices. By integrating it into machine tools and factory equipment, it is also possible to restrict the operations of wo...
- Personal authentication
- Other embedded systems (software and hardware)
- Other electronic parts
Achieve strong two-factor authentication with simple operations! You can choose a product that suits your needs. *Free trial version available.
- Other security
- Encryption and authentication
Easily eliminate the frustration of waiting times! A queue management system to assist with reception tasks.
- Entrance and exit control system