List of Safety features products
- classification:Safety features
496~540 item / All 3246 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Compatible with narrow frames that cannot be handled by other products! With a stylish design and high performance, it supports operations tailored to various scenes.
- Entrance and exit control system
We will introduce essential safety measures to prevent accidental information leaks!
- Other security
Introducing safety management measures related to information systems that serve as the business infrastructure of companies!
- Other security
We also introduce cases where individuals are excluded from personal information handling businesses!
- Other security
Many businesses are required to properly protect personal information!
- Other security
We will also introduce information to which "rights regarding personal information" do not apply!
- Other security
Shut out the entry of unrelated vehicles and suspicious vehicles, as well as the leakage of sensitive information!
- Other security
Cardless and online for easy management! Managing and aggregating clock-in and clock-out times is simple.
- Other operation management software
- Entrance and exit control system
- Mobile phones, PHS, data communication cards
Next-Generation Forensics Pioneered by the SQLite Forensic Toolkit
- Virus software
Don't miss "companionship" with AI! Achieving high-performance entry and exit management.
- Entrance and exit control system
Achieve vehicle entry and exit management for factories and facilities!
- Entrance and exit control system
Shutting out unauthorized vehicle access to buildings and factories.
- Entrance and exit control system
From entry to exit. Both vehicles and people are managed with a single IC card for integrated security within the factory!
- Entrance and exit control system
Amano's authentication service business "e-timing," which uses "time" as its key, provides trust and safety in the IT society.
- Encryption and authentication
Added automatic timestamping function to the intellectual property management system "CyberPatent Topam."
NRI Cyber Patent Co., Ltd. (Headquarters: Chiyoda-ku, Tokyo, President: Seiji Takano, hereinafter referred to as "NRI Cyber Patent") and Amano Secure Japan Co., Ltd. (Headquarters: Yokohama City, Kanagawa Prefecture, President: Aki Moriguchi, hereinafter referred to as "Amano Secure Japan") will integrate the timestamp service "Amano Timestamp Service 3161," provided by Amano Co., Ltd., the parent company of Amano Secure Japan, into NRI Cyber Patent's intellectual property management system "CyberPatent Topam" (hereinafter referred to as "Topam"). This will enable the automatic application of timestamps to files stored in "Topam." - Automatic application of timestamps is now possible. - Management and extension of the validity period of timestamps are made easy. We will introduce this service at the "2018 Patent and Information Fair & Conference," which will be held for three days from November 7 (Wednesday) to November 9 (Friday), 2018, at the Science and Technology Museum in Chiyoda-ku, Tokyo. Event Dates: November 7 (Wednesday) to November 9 (Friday), 2016, 10:00 AM to 5:00 PM Venue: Science and Technology Museum (Tokyo, Kitanomaru Park), 2-1 Kitanomaru Park, Chiyoda-ku, Tokyo URL: http://www.pifc.jp/
Amano Products Comprehensive Catalog. Time & Air
- Entrance and exit control system
Introducing a highly scalable multifunctional type of video intercom that meets the diverse communication needs of various facilities!
- Color camera
- Other security
This is a collection of case studies on the implementation of the "IX System," which has overcome distance and equipment limitations to enable communication between remote locations and the introducti...
- Other security
Wouldn't you like to reduce the hassle of security and visitor management? Improve your operations with the 'IX System' for monitoring, crime prevention, and remote communication.
- Entrance and exit control system
- Other security
- Other operation management software
A RADIUS server that allows you to build an advanced authentication system with an easy-to-use setup screen!
- Encryption and authentication
Compliant with the NDAA (National Defense Authorization Act). Definitely for government agencies and bidding projects!
- Surveillance Camera System
- Surveillance Cameras
- Other security
Automatically recognizes faces and enables real-time mosaic processing. While capturing clear footage with surveillance cameras, privacy is well protected!
- Other security
- Other PCs and OA equipment
- Surveillance Camera System
Remote monitoring is possible even without LAN wiring or network environment.
- Surveillance Camera System
- Other security
- Other PCs and OA equipment
Latest network cameras (AI cameras, etc.), coaxial cameras, recorders, surveillance monitors, and more are featured!
- Other security
- Other PCs and OA equipment
- Surveillance Camera System
The number of remote workers using connected safety solutions will reach 2.3 million in 2024.
- Other security
- others
Information leakage countermeasures and IT asset management. Are you able to manage everything centrally with cloud services?
- Other security
- Other operation management software
Are you able to manage information leak prevention and IT asset management in a centralized manner?
- Other operation management software
- Other security
Smart security testing. PenTest.WS automates everything from diagnosis to report creation!
- Other security
NG USB Guard | USB security for factories and industries! Achieve safe operations with data protection and virus prevention, and prevent unauthorized access.
- Other security
- Virus software
Smart locks, which can be used starting from tens of thousands of yen, are rapidly being adopted by major manufacturers (automotive, chemical, steel, etc.)!
- Entrance and exit control system
On February 21, 2025, at the National Strategic Special Zone Conference Joint Meeting, a proposal regarding Keys Lock Service was made in relation to the deregulation proposal from Fukuoka City!
**Proposal Summary** 1. Regulatory relaxation for enhanced security Current situation: In various fields, digital transformation (DX) is being promoted, yet the keys to chemical storage locations are still managed through paper logs. Issue: Despite the potential for safe key management and improved efficiency through the use of IoT-enabled "smart locks," digital logs are not permitted. Proposal: Allow digital management of keys to enable safer and more efficient operations. 2. Proposing regulatory relaxation to facilitate the use of digital technology on-site! Current situation: In facilities handling flammable hazardous materials, the entry of IoT devices such as smartphones and tablets is uniformly prohibited, regardless of the level of danger. Issue: This restriction hinders the digital transformation of verification and inspection tasks on-site, even in low-risk areas, thus obstructing operational efficiency. Proposal: Allow the use of IoT devices in low-risk areas only if certain requirements (such as dust and water resistance certification) are met.
【Many case studies available!】Achieve labor-saving in operations with the IoT system (RFID/LPWA) proposed by Masspro! #IoT #RFID
- Entrance and exit control system
- Environmental Test Equipment
- Production Management System
*Case study published!! Detecting enclosed spaces with CO2 sensors and notifying! Providing reassurance to users #CO2Sensor #LPWA #CaseStudy
The MORITO CO2 Watcher, which uses the Maspro Denko CO2 temperature and humidity sensor terminal (SGTHA-CO2), has been implemented at the residential elderly home "Rian Ichinomiya Ushino-dori" in Ichinomiya City, Aichi Prefecture, and is being used for "sealed" measures within the elderly home. The PDF document introduces everything from the background of the implementation to its effects, so please take a look. 【Document Contents】 - Background of Implementation - System Overview - Implementation Effects - Proposed Products *For more details, please refer to the PDF document or feel free to contact us.
Utilizing cutting-edge evasion techniques, Brute Ratel C4 leads a new security validation.
- Other security
Frontegg provides industry-leading customer ID management solutions (SSO/CIAM).
- Other security
No annual contract required! A must-have product for companies with a privacy mark!
- Software (middle, driver, security, etc.)
- Other security
A printing log collection solution that enhances security and prevents information leakage by saving images of printed materials.
- Printer
- Ink/Toner
- Other security
Protecting industrial control systems from cyber threats.
- Firewall and intrusion prevention
- Other safety equipment
Minimize operational burdens! We can contribute to the efficiency and advancement of aviation obstruction light maintenance operations.
- Other security
Monitoring of aviation obstruction lights: Minimizing operational burden! We can contribute to the efficiency and advancement of aviation obstruction light maintenance operations.
- Other security
Utilizing tokenbase as the foundational system for STO! Developing an STO platform.
- Software (middle, driver, security, etc.)
- Other security
- others
Notice of Participation in "NexTech Week 2025" from April 15 (Tuesday) to April 17 (Thursday), 2025.
Number One Solutions Co., Ltd. will be exhibiting at "NexTech Week 2025" held at Tokyo Big Sight. This exhibition is an event where companies looking to promote DX and individuals from various industries seeking the latest technologies will gather. We look forward to your visit.
In small companies, the personal information protection manager may check everything!
- Other security
Considering that information may flow between group companies, it is necessary to take measures to prevent the leakage of personal information!
- Other security
Explanation of who, when, to whom, and how it is done! Recommended qualifications for security personnel will also be introduced.
- Other security