List of Safety features products
- classification:Safety features
211~240 item / All 3378 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
The "Safety-board" allows for remote management of the current "entry and exit records" for work inside the tank, and it is also easy to install on-site.
- IC tag reader/writer
- Entrance and exit control system
- Personal authentication
Entry and exit management system "Safety-board" that improves the safety and efficiency of in-trough operations.
- Other security and surveillance systems
- Entrance and exit control system
- Personal authentication
The "Safety-board" allows for remote management of "entry and exit records" for work inside the tank, improving safety and efficiency.
- Other security and surveillance systems
- Entrance and exit control system
- Personal authentication
Just touch the IC card to the tablet installed at the entrance; it's easy to set up even in locations without a Wi-Fi environment thanks to SIM communication!
- IC tag reader/writer
- Other security and surveillance systems
- Entrance and exit control system
Providing support for authentication, testing, verification, planning, advisory, etc.
- Other security
- Other contract services
- Public Testing/Laboratory
I want to know about this! Cybersecurity standards for medical devices IEC 81001-5-1.
- Public Testing/Laboratory
- Other security
- Contract Inspection
From participant registration to the issuance of the QR code! Both printed codes on paper and codes displayed on smartphones are possible.
- 2D Code Reader
- Entrance and exit control system
The only hardware you need is your smartphone! It will be used as a QR code reader for reception.
- 2D Code Reader
- Entrance and exit control system
- Personal authentication
It is an attack technique to discover vulnerabilities in Japanese language DNN models.
- Other security
Physically restrict Ethernet communication to one direction! Simple and clear security.
- Other security
Upper Collision Warning System for Unic Vehicles
- Other safety and hygiene products
- Other safety equipment
- Other security
Seamless security, simultaneous management with weight and IC tags! Reducing workload by 1/5.
- Cabinets and Boxes
- cabinet
- Other security
High security! Automation of inventory management and integration with existing systems.
- Cabinets and Boxes
- cabinet
- Other security
Data erasure software for computers that anyone can easily use.
- Data Erasing
Disk Shredder 7 Product Introduction Seminar to be held on February 22 (Wednesday)
Invitation to the Product Introduction Seminar (Free) This is a product introduction seminar for the data erasure software "Disk Shredder 7." We will provide an explanation of the product while demonstrating actual erasure operations using the real device. ○ Target Audience - Customers considering measures against information leakage for recycled or discarded computers - Customers currently evaluating information leakage measures in IT asset management - Customers thinking about switching from other erasure software or services - Customers currently using Disk Shredder * Participation for educational or training purposes related to information security is also welcome. * Participation from competitors may be declined. ○ Main Content - What is Disk Shredder (Why is data erasure necessary?) - Comparison with previous versions - Comparison with other companies' data erasure software - Case studies - Product demonstration using actual devices (we will erase SSDs/HDDs) - Q&A session ○ Participation Benefits - We will provide a working verification disk for Disk Shredder 7.
It is a bidirectional proximity warning system that detects the approach of heavy machinery and workers using "ultrasonic" and "radio waves."
- Other security
- Laser Components
- Other safety and hygiene products
For those who want to reduce communication volume and achieve stable video surveillance, or for those who want to reduce the load on IP cameras! Achieve high-quality and stable video transmission.
- Surveillance Camera System
- Other security and surveillance systems
- Other security
The smallest and safest smart lock "tedee".
- Other PCs and OA equipment
- Other security
[Presentation of Materials] What is Barrier-Free? An Explanation of the Basics of Accommodations for Wheelchair Users
- Other security
- Safety Sensors
- Area Sensor
AI facial recognition, employee management solution, attendance and labor management, entry and exit management, strengthening internal controls, reliable construction and maintenance system, retail i...
- Entrance and exit control system
- Personal authentication
Improving system stability through OSS management, also compliant with the Cyber Resilience Act.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Manage OSS vulnerability risks in game development and create safe games.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Reduce copyright risks of entertainment content through OSS/SBOM management.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
OSS/SBOM management tool to enhance personal information protection.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
An OSS/SBOM management tool that supports the secure management of customer data.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Supporting compliance for financial institutions through OSS management and SBOM creation.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
We support risk management of OSS and the creation of SBOM, protecting communication infrastructure.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Support risk management of OSS and creation of SBOM to enhance security.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Support OSS management and SBOM creation to reduce supply chain risks.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
A tool for managing OSS/SBOM that protects patient information security.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses