List of Safety features products
- classification:Safety features
3376~3390 item / All 3693 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
A must-read for those concerned about the leakage of technical information! How can file encryption prevent information leaks such as CAD and drawings? Measures in China are also included.
- Other security and surveillance systems
- Other security
- Encryption and authentication
Unified management of PCs worldwide on a common platform! Global information security management solution.
- Software (middle, driver, security, etc.)
- Other security
Security management for 20 blocks of private areas and 5 areas of common areas is possible!
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
A site where you cannot afford to mistake the opponent! A facial recognition-based identity verification system.
- Personal authentication
- Entrance and exit control system
- Circuit board design and manufacturing
A wandering monitoring system using RFID technology! Preventing missing persons and traffic accidents before they happen!
- Entrance and exit control system
No worries about key management, loss, theft, or duplication. Fingerprint authentication mailbox.
- Personal authentication
- Encryption and authentication
Visualize dispersed information! A software solution for data leak prevention that enables automatic detection and protection of confidential data.
- filtering
- Encryption and authentication
- Other security
One device can connect up to 50 clients! By simply connecting to the existing network, it protects your internal IT equipment and information from cyber attacks!
- Firewall and intrusion prevention
No special operations are required for encryption! The file size does not increase and does not become heavy even when encrypted. Achieve stress-free without any hassle.
- Encryption and authentication
Compatible with various Windows applications, including CAD/CAM systems!
- Encryption and authentication
Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leak prevention through powerful violation control and logging at the kernel level.
- Other security
Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leakage prevention through powerful violation control and logging performed at the kern...
- Other security
Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leakage prevention through powerful violation control and logging at the kernel level.
- Other security
Automatically encrypt files and manage the entire process from creation and sending to deletion! This product can be used in China without the need to apply for local usage permits.
- Encryption and authentication
Thorough control, perfect recording, and meticulous auditing! Information security endpoint management system.
- Software (middle, driver, security, etc.)
- Other security