List of Safety features products
- classification:Safety features
1126~1170 item / All 3244 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
If you are building a new one, it's recommended. It can be unlocked with facial recognition.
- Entrance and exit control system
This is a digital locker lock ideal for delivery boxes. It uses a passcode for locking and unlocking.
- Other security
Introduced with a variety of diverse options! Non-touch frames and semi-self-checkout systems, etc.
- Dedicated IC
- Entrance and exit control system
It is possible to set location restrictions that can be opened individually or by group even without an IC card! It is also suitable for storing important documents such as My Number!
- Other security
The wanderer should report the still images to the caregivers and administrators via email!
- Personal authentication
- Other security and surveillance systems
This is Lavish's new card reader that can be customized for free.
- Other security
- Entrance and exit control system
It is a card reader with a dedicated specification.
- Other security
- Entrance and exit control system
A card reader with a display that supports NFC has arrived!
- Entrance and exit control system
Explosion-proof network IP camera that has passed domestic explosion-proof certification, obtained international explosion-proof standard (IECEx), and can be used in Class 1 hazardous locations (Zone ...
- Other network tools
- Surveillance Cameras
- Other security
We will introduce the benefits of implementing CrackProof and its background.
- Other security
[Product Information Update] Reasons Why CrackProof is Chosen for App Security Measures
We have updated the product information. While introducing the points that have received high praise from our customers, we explained the benefits of implementing CrackProof and the background behind it. Please take a look.
Four different encryption algorithms are supported, including RC4, AES-128 in OFB mode, and AES-128 in CCM mode.
- Other security
We provide a safe business environment with "m-FILTER," which only receives secure emails.
- Email/Fax transmission
- Other security
We provide a safe work environment with "i-FILTER," which allows access only to secure websites.
- filtering
- Virus software
- Other security
Easily implementable AI-equipped systems. Solutions for detecting people, objects, and work conditions. Support available from proof of concept to commercialization.
- Personal authentication
Before Windows apps are affected, various protective features are added to prevent attacks and strengthen security!
- Other security
Before iOS apps are affected, various protective features are added to prevent attacks and strengthen security!
- Other security
Before Android apps are affected, various protective features are added to prevent attacks and strengthen security!
- Other security
Security software that protects applications from cracking (unauthorized analysis and tampering).
- Other security
We will introduce a case where cracking prevention was achieved through actual use!
- Other security
Introducing the security solution product "CrackProof" that protects apps from unauthorized attacks in a manga format!
- Other security
Before Android apps are affected, various protective features are added to prevent attacks and strengthen security!
- Other security
Usable in standalone mode or on a network, a compact and easy-to-use NFC card reader.
- Other security
Utilizing our proprietary know-how! Supporting your product business from cybersecurity.
- Other security
- Other services
Introduction to FIPS 140-2 Level Certified Smart Card-Based Authentication Devices
- Other security
I will explain the comprehensive support system of the app security measure tool "CrackProof."
- Other security
Product Information Update: Follow-up with Customers After the Introduction of 【CrackProof】
We have updated the product information. When selecting security products, many companies place great importance on whether there is a sufficient follow-up system after implementation. We have explained the follow-up system for CrackProof after implementation. Please take a look.
Are you worried or troubled about your company's response to app security? "CrackProof" will solve it!
- Other security
【Product Information Update】Resolving concerns about in-house app security! "CrackProof"
We have updated our product information. Do you have any concerns or worries about your company's handling of app security? We compared the advantages and disadvantages of having an in-house app security system and partnering with a specialized company that has app protection technology to implement measures. Please take a look.
Preparing for security threats starts with "monitoring the health of your IT environment." Are you aware of your company's IT health status?
- Other security
- Server monitoring and network management tools
- Integrated operation management
For everyone using multiple SaaS, why not manage your "SaaS" in a centralized way?
- Integrated operation management
- Other information systems
- Encryption and authentication
After implementation, security information will be automatically updated! A package of security measures necessary for small and medium-sized enterprises.
- Other security
Multi-layered defense measures against information leakage suitable for small and medium-sized enterprises! Protecting a company's information assets from external and internal threats.
- Other security
Solving issues such as missed detections and over-detections through the use of AI! Visualizing various communications.
- Other security
Covering the lifecycle of security measures with a single agent!
- Other security
It's easy to consider how to advance measures toward realization! Providing specific examples of measures based on risks.
- Other security
Leave the operation to us for a reduced burden! Please leave the management after implementation to our company as well.
- Other security
Achieving low prices through the use of cloud platforms! A high-quality automated cyber attack analysis system.
- Other security
Providing a trusted and secure developer experience for businesses! We protect your business.
- Virus software
New iPad 11-inch, compatible with 12.9-inch and various iPads!! This stylish and simple stand is the most popular at exhibitions and receptions!
- Other security
Continuous charging is possible by passing the cable through the back! Comfortable even in spaces with limited room.
- Other security
Compatible with our security wire! All functions of the iPad can be used even when locked.
- Other security
Fixed to the desk with a theft prevention clamp! Easy adjustment with smooth sliding action.
- Other security
Compatible with various Surface Pro and Surface Go models! Designed to allow full functionality even when locked.
- Other security
The arm length is a maximum of 25 cm with two joints! Tilt, pan, and swing to your preferred angle.
- Other security
The tilt angle is a user-friendly 60°! When the enclosure is locked, the keyboard is fixed.
- Other security