List of Safety features products

  • classification:Safety features

766~780 item / All 3694 items

Displayed results

Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.

  • small-mistcollector.png
  • air conditioning

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

For those who want to reduce communication volume and achieve stable video surveillance, or for those who want to reduce the load on IP cameras! Achieve high-quality and stable video transmission.

  • Surveillance Camera System
  • Other security and surveillance systems
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The smallest and safest smart lock "tedee".

  • Other PCs and OA equipment
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Presentation of Materials] What is Barrier-Free? An Explanation of the Basics of Accommodations for Wheelchair Users

  • 車椅子の人のための工夫とは?バリアフリー例を解説2.png
  • 車椅子の人のための工夫とは?バリアフリー例を解説3.png
  • 車椅子の人のための工夫とは?バリアフリー例を解説4.png
  • 車椅子の人のための工夫とは?バリアフリー例を解説5.png
  • 車椅子の人のための工夫とは?バリアフリー例を解説6.png
  • 車椅子の人のための工夫とは?バリアフリー例を解説7.png
  • 車椅子の人のための工夫とは?バリアフリー例を解説8.png
  • 車椅子の人のための工夫とは?バリアフリー例を解説9.png
  • 車椅子の人のための工夫とは?バリアフリー例を解説10.png
  • Other security
  • Safety Sensors
  • Area Sensor

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI facial recognition, employee management solution, attendance and labor management, entry and exit management, strengthening internal controls, reliable construction and maintenance system, retail i...

  • Entrance and exit control system
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

From project management to tool management, readable across a wide range! For efficient and accurate production line construction.

  • 平面アンテナ用途.jpg
  • 電波暗室2.jpg
  • antenna
  • Document and Data Management
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
技適マーク.jpg

A clear explanation of how to obtain a technical standards conformity certification!

To sell and use products that utilize wireless technology in Japan, it is necessary to obtain a national certification called "Technical Standards Conformity Certification (Giteki)." So, "how do you obtain Giteki?" 【Step 1】 What products require Giteki? Devices that communicate using wireless technology that emits radio waves are subject to this requirement, such as smartphones, Wi-Fi routers, Bluetooth earphones, wireless mice, wireless transceivers, IoT devices, etc. 【Step 2】 Where can you get the assessment done? The assessment for Giteki is conducted by a third-party organization recognized by the government, called a "Registered Certification Body." Examples include the Telecommunications Engineering Center (TELEC) and the Japan Maritime Bureau (JCI). 【Step 3】 What do you need to submit? For the assessment, you need to submit documents and samples such as the following, to check for "signal strength," "frequency accuracy," and "radio interference": Product technical specifications (such as frequency and output), circuit diagrams or design drawings, and the actual product (or prototype). 【Step 4】 If you pass the test, you will receive the "Giteki mark"! 【Step 5】 After that, you can freely sell and use the product!

This seminar will provide the latest information on cybersecurity and compare the mainstream security standards and frameworks.

  • Consumer-Products-Container-295x200-Cybersecurity-Webinar.jpg
  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introducing a system for managing entry and exit to management locations using a touch panel display!

  • 20 (2).png
  • 20 (3).png
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Achieve hands-free and smooth entry and exit management! Real-time monitoring is possible even from a distance.

  • image_02.png
  • image_03.png
  • image_04.png
  • image_05.png
  • image_06.png
  • image_07.png
  • image_08.png
  • image_09.png
  • image_10.png
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

You can safely share information while protecting important manufacturing know-how such as technical documents and drawings!

  • Other security
  • Document and Data Management

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
スクリーンショット 2025-12-11 094559.png

[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -

We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)

We will introduce a case study that successfully improved convenience while maintaining security in the distribution of e-books for paid members!

  • Document and Data Management
  • Encryption and authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
スクリーンショット 2025-12-11 094559.png

[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -

We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)

We will introduce a case where we successfully achieved efficient information sharing while maintaining security through the sharing of technical documents with overseas bases!

  • Document and Data Management
  • Encryption and authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
スクリーンショット 2025-12-11 094559.png

[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -

We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)

Innovation in information sharing within the manufacturing industry! Approaching the optimal solution for a security system that balances the reduction of information leakage risks and convenience.

  • Other security
  • Document and Data Management

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
スクリーンショット 2025-12-11 094559.png

[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -

We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)

While preventing the leakage of confidential document information, important manufacturing know-how such as technical materials and drawings can be safely shared!

  • Other security
  • Document and Data Management

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
スクリーンショット 2025-12-11 094559.png

[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -

We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)

Introducing a case study that successfully shared quality-related documents at domestic and international locations while maintaining security efficiently!

  • Document and Data Management
  • Encryption and authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
スクリーンショット 2025-12-11 094559.png

[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -

We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)

Filter

classification
Delivery Time
Location