List of Safety features products
- classification:Safety features
991~1035 item / All 3693 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
We will also introduce the purpose of entrance and exit management, the role of entrance and exit management systems, and their main benefits!
- Entrance and exit control system
We will also introduce common cases of being together and measures to prevent being together!
- Entrance and exit control system
Enhancing peace of mind for guardians! Introducing the purpose of the entry and exit management system and the needs of guardians.
- Entrance and exit control system
We will also introduce the mechanism of facial recognition, the authentication methods, and the benefits!
- Entrance and exit control system
Introducing the advantages and disadvantages of a cloud-based access control management system!
- Entrance and exit control system
We will also introduce common inquiries we receive from customers who have implemented the entrance and exit management system!
- Entrance and exit control system
We will introduce examples where there is no longer a need to carry keys, eliminating the fear of losing them and the hassle of managing them!
- Entrance and exit control system
Introducing three common concerns and features that often arise after the implementation of an entry and exit management system!
- Entrance and exit control system
We would like to introduce a case where facial recognition devices were installed at four office entrance doors!
- Personal authentication
By outputting the information from the read card directly as Wiegand, it can be used with controllers and readers compatible with controller modes!
- Personal authentication
From the detection of authentication data to the authentication decision takes about 1 second! It is possible to prevent impersonation using photo images and other means.
- Personal authentication
Encrypt user data! Advanced hardware and software optimized for facial recognition.
- Personal authentication
Modern threats that cannot be prevented by perimeter defense alone! The importance of internal network monitoring.
- Firewall and intrusion prevention
Autonomous security operations & GRC platform "Simbian AI" for 24-hour cyber defense
- Other security
Improve the significant security vulnerability of "people"! Protect employees and the business.
- Software (middle, driver, security, etc.)
- Other security
Improve productivity with simple integrated endpoint management! Protection from mobile threats.
- Software (middle, driver, security, etc.)
- Integrated operation management
- Other security
Introducing a system that allows you to easily create, apply for, approve, and manage work schedules!
- Entrance and exit control system
Leave My Number management within your company to Critem. [Agents wanted]
- Entrance and exit control system
- Surveillance Camera System
- Other security and surveillance systems
Make it easier to lead to Oasis! A new color 'Black' has been added to the panel colors [Agents Wanted].
- Entrance and exit control system
Cybersecurity Solutions - NDR, CTI, and SOC Automation for Advanced Threat Detection 'Gatewatcher'
- Other security
Security measures for OT networks. Dynamically prevent malicious cyber threat activities with IPS/IDS.
- Firewall and intrusion prevention
Introducing the relationship between the Privacy Mark and My Number, along with two points to note and guidelines for safety management measures!
- Other security
We will also introduce the benefits of obtaining a P mark and the personal information held by web production companies and how it is handled!
- Other security
We will also explain the methods of robocalls, the risks for companies, and key countermeasures!
- Other security
I will also explain the advantages and disadvantages of obtaining ISMS!
- Other security
It will also explain how the business size classification for the P mark is determined.
- Other security
Construction and maintenance support for communication and network components! You can leave it to us.
- Other network tools
- Other security
- Communications
You can rely on us for internet connection/VPN setup and maintenance support! No need to worry even without a dedicated person.
- Wireless LAN
- Other security
- Communications
The threat of impersonation: Don't overlook it! The significant risks posed by Active Directory's permission management. Reliable defense achieved by ASM.
- Other security
Interpretation of the Ministry Ordinance establishing technical standards for electrical appliances (R06.05.31) corresponds to Appendix 12!
- Encryption and authentication
- LED fluorescent lamp
Prevent unauthorized access and information leaks! Reliable low-cost support for both setup and maintenance.
- Other contract services
- Other security
DNS monitoring to prevent hacking! If you're new to implementing a WAF, you can trust us to handle it with ease.
- Other security
- Other network tools
A network that can withstand large-scale DDoS attacks! It has a proven track record of defending against 100 Gbps attacks for 9 hours.
- Other security
- Other network tools
For home medical support services and IoT systems like chatting robots, leave it to us!
- Entrance and exit control system
- Production Management System
- Other core systems