List of Safety features products

  • classification:Safety features

2566~2580 item / All 3712 items

Displayed results

Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.

  • small-mistcollector.png
  • air conditioning

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[White Paper Available!] An analysis of the extent to which DMARC (Domain-based Message Authentication, Reporting & Conformance), a countermeasure against spoofing and security, is being adopted by in...

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Next-generation firewall-equipped, high-performance secure VPN center router suitable for large-scale networks.

  • Routers, Switches, and Hubs
  • VPN/Wide Area Ethernet
  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
0210_img1.jpg

- Strengthening of security measures - Upgrading of UTM-enabled "NFV-APL series" and "AT-AR4000S-Cloud"

Allied Telesis, Inc. (Headquarters: Shinagawa-ku, Tokyo; Chairman: Sachie Oshima) has upgraded its NFV-APL series of products, which support gigabit connectivity, UTM, firewalls, and routers, as well as the virtual appliance product "AT-AR4000S-Cloud," which enables VPN functionality to be provided from virtual and cloud environments. The download service from our website has started on February 10. Cyber attacks targeting vulnerabilities in networks, systems, and people continue unabated, and urgent solutions are required across all industries. However, implementing security solutions that can address viruses and malware leads to extremely complicated individual operational management. Unified Threat Management (UTM) allows for the consolidation of various security functions, enabling a reduction in operational management burdens and centralized management, rather than deploying individual devices or solutions. *For more details, please refer to the PDF document or related links.

Tamper-evident label that clearly shows whether it has been opened or not.

  • Other security
  • Other consumables
  • label

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Face recognition image quality check and correction library! Customization supported.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Close the door and it auto-locks! To open it, just use the passcode! No power needed, so it's safe to use even during power outages or disasters—maintenance-free button lock.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

"Let's get a great deal together with the target products!" Advantech is currently offering Acronis at a special price! Check the link below!

  • AcronisActiveProtection_imgjp.jpg
  • KeyFeature_3Box_img1.jpg
  • KeyFeature_3Box_img2.jpg
  • KeyFeature_3Box_img3.jpg
  • Firewall and intrusion prevention
  • Encryption and authentication
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
Connect-H2-2_jp.jpg

[10/15 Webinar] The Utilization and Security of IoT that Japanese Companies Struggle With

This webinar will share the challenges faced by companies and engineers in Japan regarding the implementation of industrial IoT, along with examples of countermeasures. We will condense and share how to quickly implement remote management and security measures in a 40-minute session. Participants will have a chance to win gifts such as Amazon gift cards and FireSticks through a lottery, as well as receive an eBook covering IoT case studies from around the world. ★Highlights★ IoT situation in Japan We will share analysis data on IoT adoption trends in Japan based on Advantech's unique research, along with implementation challenges and corresponding case studies. Implementing remote management "Visualization" of IoT systems: With guest speakers, we will discuss the implementation of remote management functions and how to proceed efficiently. Implementing IoT security We will have guest speakers discuss the realization of extensive industrial IoT security features. ▶Guest Speakers◀ Soliton Systems, Market Development Promotion Headquarters Manager: Tomoo Kinoshita Tokyo Electron Device, Cloud IoT Company Deputy General Manager, Embedded Solutions Department: Toshiyuki Taniwaki

A lineup of distinctive technologies, including intrusion detection used in ship radar monitoring systems.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The domestically produced cloud-based WAF Aegis, which requires no complicated setup or operation, supports the healthy growth of your company's web business.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Detect unauthorized use of your own domain! By understanding the existence and content of phishing emails, you can also prevent damage to customers and partners.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
image-bimi25.png

TwoFive signs agency contract with DigiCert Japan and starts selling BIMI-compliant certification mark certificates.

TwoFive Inc. has entered into a sales agency agreement with DigiCert Japan LLC for the Verified Mark Certificates (VMC), which comply with the new email authentication technology known as the BIMI standard. Additionally, to enable the reflection of results in security measures after implementing DMARC, we provide a cloud service called "DMARC / 25 Analyze" that aggregates and visualizes DMARC reports, which report the authentication results on the email receiving side in an easy-to-understand manner. We support all companies and organizations that send emails to appropriately utilize DMARC and BIMI without requiring special expertise.

We detect and block cyber attacks on websites at a low cost. Equipped with an AI engine, it automatically responds to the latest attacks, eliminating the need for manual operation.

  • Firewall and intrusion prevention
  • Other security
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Recruiting agents and distributors! IT solution "NinjaConnect ISM" for the manufacturing industry that enables remote maintenance of industrial PCs.

  • Other security
  • Other network tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Log in from your computer or mobile device! You can easily view it anytime, anywhere.

  • Other information systems
  • Internal Control and Operational Management
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Block targeted attack emails before they arrive! You can start using it shortly after the decision to implement it.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

It has been implemented in multiple factories of Wipro, one of the four major IT companies in India. A free trial is also currently available!

  • Server monitoring and network management tools
  • Other security
  • Other network tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
banner_square_384x384.png

We will be exhibiting at ITmedia Virtual EXPO 2021 in the fall!

e-Jan Networks will participate in the online exhibition "ITmedia Virtual EXPO 2021 Autumn" to be held in September 2021. At our online booth, you can view our remote maintenance solutions for factories. Since it is an online exhibition, anyone is welcome to join. ■ Exhibition Overview - Dates: September 1, 2021 (Wed) - September 30, 2021 (Thu) - Venue: Online - Participation Fee: Free - Organizer: ITmedia Inc. ■ What is NinjaConnect ISM? NinjaConnect ISM is a solution for remote maintenance of industrial PCs connected to factory networks. By installing a dedicated connector in the factory network, it enables remote maintenance without directly connecting the industrial PCs to the internet. It supports file transfers and log file storage, reducing costs associated with on-site maintenance, improving operational efficiency, and promoting digital transformation in the manufacturing industry.

Filter

classification
Delivery Time
Location