List of Safety features products
- classification:Safety features
1306~1350 item / All 3241 items
Integrated monitoring and analysis! It will serve as a concrete aid in reducing phishing email countermeasures!
- Other services
- Other security
- Server monitoring and network management tools
A platform that can send emails! Introducing the reporting features.
- Other services
- Other security
- Server monitoring and network management tools
It is possible to set up triggers for alerts, such as changes to DNS resource records!
- Other services
- Other security
- Server monitoring and network management tools
It is also possible to output as a PDF file as a report. Introducing the features of PowerDMARC!
- Other services
- Other security
- Server monitoring and network management tools
Instead of directly setting it in DNS, centrally manage various settings on the PowerDMARC portal site!
- Other services
- Other security
- Other server related
Clearly indicate to users that measures against phishing emails are being taken by displaying the company logo!
- Other server related
- Other security
- Server monitoring and network management tools
Complete the encryption of the email delivery route along with SMTPS, POPS, and IMAPS!
- Other server related
- Other security
- Server monitoring and network management tools
Explicit processing notification and audit for SPF and DKIM authentication failures!
- Other server related
- Other security
- Server monitoring and network management tools
Guarantee of the sender's authenticity and the integrity of the message content using public key cryptography!
- Other server related
- Other security
- Server monitoring and network management tools
Register your legitimate email server for your own domain! Introducing examples of operation and limitations.
- Other server related
- Other security
- Server monitoring and network management tools
Ideal for IT security of manufacturing line management PC terminals! Standalone PC operation log management and device control software!
- Other security
Analyzing the logs of highly productive employees! Efficient shortcut settings and more become apparent.
- Other security
To build a better internet! Measuring and researching various CDNs throughout the year!
- Server monitoring and network management tools
- Other server related
- Other security
Performance, security, reliability, analysis! Covering the necessary features according to the scale of the site!
- Server monitoring and network management tools
- Other server related
- Other security
Determining the priority of Cloudflare's TTL with a chart! Explained in an easy-to-understand way!
- Server monitoring and network management tools
- Other server related
- Other security
Guaranteed 100% operation! Introducing the differences in SLA between the Business plan and the Enterprise plan!
- Server monitoring and network management tools
- Other server related
- Other security
High technical skills that maximize functionality! Expert in CDN, providing meticulous support!
- Server monitoring and network management tools
- Other server related
- Other security
Plans you can choose based on the scale of your site and growth stage! We will introduce the differences in contract types!
- Server monitoring and network management tools
- Other server related
- Other security
Multi-year contracts are also available! The more years you sign up for, the higher the discount rate, and with a 6-year contract, you get one year for free!
- Other security
- Other services
Municipal website's 'shield'! The number of accesses that can be handled during a disaster is limitless!
- Server monitoring and network management tools
- Other server related
- Other security
We provide services to facilitate smooth migration! We will ensure the success of your project!
- Server monitoring and network management tools
- Other server related
- Other security
Differences between the three types of certificates! Introducing the differences in roles of SSL certificates and the differences in verification procedures!
- Other security
- Other services
Smart lock with 3D facial recognition
- Personal authentication
- Encryption and authentication
- Other security
Attendance management is conducted using facial recognition to prevent fraudulent attendance. It eliminates the "impersonation" weakness associated with IC card systems and roll call methods.
- Other core systems
- Entrance and exit control system
To manage attendance using facial recognition, which is becoming more widespread, it can be easily implemented on a low budget. There is no need for card updates or issuance, which also helps reduce o...
- Other core systems
- Entrance and exit control system

Sweden, an advanced IT country, is moving away from digital textbooks, and the use of ICT devices should be "appropriate."
In Sweden, an advanced IT country, the movement away from digital textbooks is progressing, and in the new school term starting in August 2023, more emphasis is being placed on reading time and handwriting practice, while the time spent using computers and tablets is being reduced. Additionally, Sweden's Minister of Education, Lotta Edholm, has announced the government's intention to overturn the National Agency for Education's decision to mandate the use of digital devices in kindergartens, and reports indicate that the government plans to completely abolish digital learning for children under six years old. The international assessment of reading comprehension for fourth graders, known as the Progress in International Reading Literacy Study (PIRLS), has revealed that between 2016 and 2021, the reading skills of Swedish students have declined. Politicians and experts have raised concerns that the highly digitized education system may have contributed to this decline in foundational skills, and it seems that Minister Lotta Edholm has responded by initiating a move towards de-digitalization. For more details, click here: https://t-lenon.com/info/education/9031/
Mitigating cyber threats to the entire Moxa system! A detailed explanation of the methods used.
- Other security
"Who? When? What?" Things that must not be lost by the company. Why not manage them with TAGMATCH?
- Storage
- Other security
- Other operation management software
Further acceleration of authentication speed! Utilize the iris and facial recognition system with a 64-bit CPU for efficient, smooth, and accurate access control and attendance management!
- Entrance and exit control system
Is the management information for the facial recognition terminal user-friendly? SmileOkay-MU allows for the registration of names in kanji and notifications via images and audio.
- Entrance and exit control system
Not only can it be installed outdoors, but it also achieves fast and high-precision facial recognition using deep learning algorithms.
- Entrance and exit control system

Product information for the outdoor-installable facial recognition terminal "SmileOkay-HO" has been registered. *Demo/loan available.
The "SmileOkay-HO" is not only capable of outdoor installation but also achieves high-speed and high-precision facial recognition using deep learning algorithms. The "SmileOkay-HO" is waterproof and dustproof, making it a facial recognition terminal that can be installed outdoors as well as indoors. The facial recognition time is just 0.2 seconds, and it authenticates at a distance of 1.5 meters from the camera. It can authenticate while walking without the need to stop. The facial recognition accuracy is also very high, at ≧99%. Additionally, with the utility software developed independently by IT Sec, bulk registration of user data and easy transfer of facial registration data can be performed, allowing for centralized management of multiple terminals. For indoor installation, we also offer the facial recognition and body temperature measurement systems "SmileOkay-HT" and "SmileOkay-DT," as well as the iris recognition, facial recognition, and body temperature measurement system "SmileOkay-iNX," which also includes a temperature measurement function. *Demo units are available for loan for all models! *For more details, please download the PDF from the related product page or contact us.
Accurate attendance management by the individual is possible! It is easy to exchange registered data between facial recognition terminals.
- Entrance and exit control system
A single device can register data for up to 6,000 people! Early detection of feverish individuals helps avoid droplet and contact infections at close range.
- Entrance and exit control system

Product information for the outdoor-installable facial recognition terminal "SmileOkay-HO" has been registered. *Demo/loan available.
The "SmileOkay-HO" is not only capable of outdoor installation but also achieves high-speed and high-precision facial recognition using deep learning algorithms. The "SmileOkay-HO" is waterproof and dustproof, making it a facial recognition terminal that can be installed outdoors as well as indoors. The facial recognition time is just 0.2 seconds, and it authenticates at a distance of 1.5 meters from the camera. It can authenticate while walking without the need to stop. The facial recognition accuracy is also very high, at ≧99%. Additionally, with the utility software developed independently by IT Sec, bulk registration of user data and easy transfer of facial registration data can be performed, allowing for centralized management of multiple terminals. For indoor installation, we also offer the facial recognition and body temperature measurement systems "SmileOkay-HT" and "SmileOkay-DT," as well as the iris recognition, facial recognition, and body temperature measurement system "SmileOkay-iNX," which also includes a temperature measurement function. *Demo units are available for loan for all models! *For more details, please download the PDF from the related product page or contact us.
To areas with few passengers or unmanned stations.
- Entrance and exit control system
- Other security and surveillance systems
- others
This is a card reader dedicated to your company that achieves low cost and high security.
- Other security
- Entrance and exit control system
We will notify parents via email or other means about their child's arrival/departure from the facility. The method used to authenticate the child employs the latest facial recognition technology.
- Personal authentication
- Entrance and exit control system
Support for Azure AD multi-factor authentication with hardware tokens! Choose products that suit your needs. *Free trial available.
- Other security
Enhance your security level! Introducing ways to prevent information leaks on the blog.
- Encryption and authentication
It's possible to save costs! Introducing the benefits of passwordless authentication in a blog.
- Encryption and authentication
Enjoy the convenience of the cloud! Introducing security enhancement through device authentication in our blog.
- Personal authentication
Introducing edge devices with diverse features and excellent scalability in our blog!
- Personal authentication
- Encryption and authentication
It is possible to avoid troubles! Introducing the facial recognition system in the blog.
- Personal authentication
- Entrance and exit control system
Introducing a facial recognition system on the blog that also enhances security!
- Entrance and exit control system
- Personal authentication
Demonstrating high authentication accuracy! Introducing an AI facial recognition terminal that can also measure temperature in a blog.
- Entrance and exit control system