List of Safety features products
- classification:Safety features
1171~1215 item / All 3241 items
By sending training emails that simulate targeted attacks to employees and staff, we will develop the ability to respond to the increasingly concerning issue of targeted attacks!
- Other security
Search for and manage files containing personal information such as My Number and credit card numbers from PCs, file servers, and network drives!
- Encryption and authentication
- Data Erasing
It detects abnormal signals from various connected sensors and notifies abnormalities through sensor lights and external outputs. A reliable low-cost system.
- Other security
This is a new smart lock for sliding doors from the Flassa series.
- Other security
- Entrance and exit control system

【First EPIC Guide】Introducing the features and operation methods of smart locks!
The guide for the smart lock brand EPIC has been completed. In this issue, we introduce the battery-operated smart lock 'FACEY,' which features Japan's first facial recognition technology, as well as the functions and attractions of the popular high-functionality series 'Flassa,' and information about the convenient cloud feature 'Watchkey.' We also provide detailed proposals for various operational patterns and installation examples regarding the recently upgraded Flassa 1J. ◆What is Flassa 1J? Ideal for rental management Restorative to original condition Compatible with swinging and sliding doors If you have concerns about security or are considering introducing a smart lock, or even if you are not, we encourage you to take a look.
This is a newly released smart lock for swing doors that can be authenticated from indoors as well.
- Other security
- Entrance and exit control system

【First EPIC Guide】Introducing the features and operation methods of smart locks!
The guide for the smart lock brand EPIC has been completed. In this issue, we introduce the battery-operated smart lock 'FACEY,' which features Japan's first facial recognition technology, as well as the functions and attractions of the popular high-functionality series 'Flassa,' and information about the convenient cloud feature 'Watchkey.' We also provide detailed proposals for various operational patterns and installation examples regarding the recently upgraded Flassa 1J. ◆What is Flassa 1J? Ideal for rental management Restorative to original condition Compatible with swinging and sliding doors If you have concerns about security or are considering introducing a smart lock, or even if you are not, we encourage you to take a look.
Development of technologies to enhance regional disaster prevention capabilities through the utilization of earthquake information and the establishment of disaster prevention bases! Here is an introd...
- Other security
Comprehensive operational services to optimize your hybrid IT infrastructure environment.
- Other security
It is a device that supplies power to PCs and other equipment during power outages and other power failures, allowing for business continuity or providing time to safely shut down.
- Other security
Just a slight 10-degree angle of operation! With just a light touch, you can smoothly open and close the door.
- Other security
- Other safety and hygiene products
Simple and secure next-generation internal control tool.
- Encryption and authentication
Detects earthquake tremors and allows for quick retrieval of the key even in the absence of the keeper! It senses tremors equivalent to seismic intensity 5 weak to 6 weak and automatically unlocks the...
- Other security
A detailed explanation of the expected benefits of the collaboration between robots and facial recognition systems, as well as actual examples of their utilization [Free materials available].
- Personal authentication
Cloud-based cafeteria DX that allows ticketing via facial recognition and real-time viewing of meal management and statistics.
- Other operation management software
- Purchasing Management System
- Entrance and exit control system
Many companies implement "obfuscation" as a method of app protection. Can we say that obfuscation alone is sufficient for app security measures?
- Other security
- Virus software

【Product Information Update】For attacks that cannot be prevented by obfuscation alone! App protection tool CrackProof.
We have updated the product information. One of the security measures applied to apps is "obfuscation." In the manufacturing industry, some companies are implementing it as a method of app protection. However, is obfuscation alone sufficient for app security measures? We would like to introduce our security tool, CrackProof, which protects apps from attacks that cannot be fully defended against by obfuscation alone, providing multi-faceted protection. If you are concerned about security measures for your app, including obfuscation, please take a look.
This is a basic model that emphasizes cost performance through combinations with stands, designed for budget-conscious projects and as a more affordable version of the K1TA70MI.
- Other security
Examples of implementation by major valve manufacturers, taxi associations in various prefectures, and major building material manufacturers are published!
- Other security
Non-contact and speedy entry and exit authentication. Free licenses available for use.
- Entrance and exit control system
An intelligent terminal that supports a variety of authentication methods, from mobile access cards to RFID cards, QR codes, and barcodes.
- Entrance and exit control system
- Personal authentication
In stock! The perfect product for you looking for a card reader due to the semiconductor shortage! OSDP compatible!
- Other Code Readers
- Personal authentication
- Entrance and exit control system
Equipped with an NPU, it achieves high-precision and high-speed facial recognition. Personal information is also strictly protected. Demo kits are available for loan.
- Entrance and exit control system
Starting with invoices and compliance with PCI DSS 4.0. It is related to phishing emails.
- Other security
Introducing the recommended measures announced by the Cabinet Office and the National Police Agency!
- Other security
It's the same as not having antivirus software installed! The impersonated party will bear liability for damages.
- Other security
Reselling of trade secrets and personal information of customers. Various things are being targeted.
- Other security
The methods are becoming more sophisticated! If a business partner is impersonated, will the employees notice?
- Other security
It is a low-cost, high-security embedded card reader.
- Other security
- Entrance and exit control system
Integrated management of documents, images, drawings, and videos! Ideal for record management compliant with the Electronic Bookkeeping Preservation Law and the Invoice System.
- Encryption and authentication
Centralized management of necessary related information such as drawing management, technical information management, document management, revision history management, and parts deployment information...
- Encryption and authentication
Streamline operations with cloud management and complete entry and exit management in one stop! Customization options such as function expansion are also available.
- Other security
Achieving cost reduction for management companies and ensuring safety and convenience for residents in two modes!
- Entrance and exit control system
- Other security
There are also cases where the employee's workload was reduced by "233 hours per month."
- Entrance and exit control system
- Other office supplies
- Other information systems
Consistent support system! Endpoint measures and cloud management are completely resolved with SDT!
- Other services
- Other security
This is a recommended document for those who feel uneasy about the security measures tools currently being implemented!
- Other security
- Other services
Achieve high security with comprehensive basic features! Introducing a shredder that protects your privacy.
- Other security
- Other office supplies
Slim body high cost-performance model
- Other security
- Other PCs and OA equipment
Flexible access control! Face recognition can be performed while walking without stopping, thanks to behavior detection functionality.
- Entrance and exit control system
Generate a one-time disposable password! It enables stronger authentication than a fixed password.
- Encryption and authentication
A dedicated device for OTP token authentication as an alternative to smartphone apps.
- Personal authentication
It is a dedicated card standard reader for embedded use.
- Other security
- Entrance and exit control system
Just by connecting, your monitor or TV transforms into a viewer for IP camera surveillance! It can display video from up to 32 cameras and supports 4K display.
- Surveillance Camera System
- Other security and surveillance systems
- Other security

Use Case Introduction: Distribution of Materials - Strong Support for Remote Monitoring of Production Lines!
EIZO Corporation proposes "IP Solutions" to support the efficiency of monitoring production lines. We have published a PDF introducing use cases. Please take a look. ◆ Do you have any of these concerns? ◆ - When an anomaly occurs on the production line, it is necessary to go to the site each time to check the situation. - In an office away from the production line, it is difficult to notice when an anomaly occurs in the production line equipment, making immediate response challenging. We propose products and solutions to solve these issues. Please feel free to contact us after reviewing the materials.
An IP monitor/decoding box that can directly connect up to 32 surveillance cameras and display them simultaneously. It can interact with IoT devices for actionable responses!
- Surveillance Camera System
- Other security and surveillance systems
- Other security

We will exhibit at the Crisis Management Industry Exhibition (RISCON TOKYO) 2023 from October 11 to 13, 2023.
EIZO's booth theme is "Infrastructure monitoring solutions ideal for disaster prevention and security!" Below are three proposed solutions: 1. Disaster and nighttime monitoring using ultra-sensitive cameras 2. Stabilization and efficiency of IP camera video transmission in narrow bandwidth 3. Improved management and inspection efficiency and early detection of problem areas through video and image clarification ★ For more detailed exhibition information, please visit the EIZO website.
This is a newly released smart lock for hinged doors.
- Other security
- Entrance and exit control system

【First EPIC Guide】Introducing the features and operation methods of smart locks!
The guide for the smart lock brand EPIC has been completed. In this issue, we introduce the battery-operated smart lock 'FACEY,' which features Japan's first facial recognition technology, as well as the functions and attractions of the popular high-functionality series 'Flassa,' and information about the convenient cloud feature 'Watchkey.' We also provide detailed proposals for various operational patterns and installation examples regarding the recently upgraded Flassa 1J. ◆What is Flassa 1J? Ideal for rental management Restorative to original condition Compatible with swinging and sliding doors If you have concerns about security or are considering introducing a smart lock, or even if you are not, we encourage you to take a look.