List of Safety features products
- classification:Safety features
1351~1395 item / All 3241 items
Effective for enhancing security! By combining 'multi-factor authentication,' it is also possible to increase safety further.
- Encryption and authentication
Ensuring safety! Introducing security solutions in our blog.
- Encryption and authentication
Optimization of management resources is also possible! Introducing cashless solutions with IoT devices in our blog.
- Other security
You can keep track of the expiration date! An effective way to prevent license violations is introduced in the blog.
- Other security
Equipped with a facial recognition engine that can recognize faces even with masks on!
- Personal authentication
Authentication credentials are available! Introducing security keys in our blog.
- Other security
Achieving a robust security network! Introducing Zero Trust in our blog.
- Encryption and authentication
Prevent unauthorized login by impersonation! Introducing appropriate MFA devices in our blog.
- Encryption and authentication
To ensure that "it's already too late by the time you realize it!" is definitely prevented! We will significantly reduce operational burdens and operational costs.
- Virus software

Campaign extension decided! Until December 31, 2022. Strong support for vulnerability assessments and incident response training! Take advantage of this special package to combat increasingly malicious cyber attacks.
Allied Telesis, Inc. (Headquarters: Shinagawa-ku, Tokyo; Chairman: Akira Oshima) announces the extension of its ongoing "Pentest Campaign," which targets web server diagnostic services and phishing email training services, until December 31, 2022 (for orders received). As digital transformation (DX) progresses across various markets, cyberattacks such as "targeted attacks" primarily using email and "website tampering" exploiting network vulnerabilities are becoming increasingly malicious, and the expansion of their damage has become a global issue. In the event of an attack, not only could business and services be halted, but there is also the potential for significant damage that threatens business continuity due to the leakage of confidential information and loss of trust. To protect organizations from these threats, it is essential to conduct vulnerability assessments to prevent damage in advance, improve employees' security literacy through training, and provide incident response education to appropriately handle emergencies. *For more details, please refer to the PDF materials or related links.*
We propose a suitable plan! Security measures advanced through "diagnosis and investigation" and "countermeasures and strengthening."
- Software (middle, driver, security, etc.)
- Other security
News 2023/2/14: A new outdoor security camera system to prevent frequent thefts and vandalism.
- Surveillance Cameras
- Surveillance Camera System
- Other security
1CH H.265 4K (3840×2160/60fps) compatible video server
- Video Recorder
- Other security
- Other security and surveillance systems
We will introduce numerous examples of how standardization and efficiency improvements have significantly increased work efficiency! You can create IC cards easily and cheaply.
- Entrance and exit control system
- Personal authentication
- Personnel and Labor
Identity verification using IC card + fingerprint without a dedicated authentication server or fingerprint authentication device.
- Dedicated IC
- Personal authentication
- Encryption and authentication
Reduction of key management burden / Improvement of information and safety management / Measures for personal information protection law
- Encryption and authentication
- Entrance and exit control system
- Personal authentication
Touch panel LCD integrated with entry and exit controller non-contact IC card reader.
- Entrance and exit control system
- Personal authentication
- Encryption and authentication
A fingerprint authentication IC card that realizes two-factor authentication with "ownership authentication via IC card" and "biometric authentication via fingerprint" on a single card.
- Dedicated IC
- Personal authentication
- Encryption and authentication
No need for troublesome key management or carrying! A digital lock specialized for locker security measures!
- Other security
- Safety Door Switch
- others
[Free trial available] Visualize and analyze employee tasks to support business efficiency and improve work styles. 'From 500 yen/month/license - no initial costs'
- Other information systems
- Other operation management software
- Other security
Defense against malware, blocking suspicious communications and information leaks! We assist in implementing multi-layered defense!
- Firewall and intrusion prevention
- Virus software
- Desktop PC
Achieve multiple non-contact authentications such as facial recognition and mobile access! Please watch the video for a new door experience [*Demo kits available for loan*].
- Entrance and exit control system
Achieve TOC reduction while providing "cost-effective and high-performance" foundational services.
- Other network tools
- Other security
- Other core systems
Here we gather the technology cultivated through years of RF-EAS gate development! Achieving a longer battery life.
- Other security
- Encryption and authentication
Starting with AHD cameras, we offer a lineup of IP cameras, AI facial recognition cameras, and thermal cameras!
- Surveillance Cameras
- Surveillance Camera System
- Personal authentication
Complete visualization of internal networks! Achieving detection, investigation, and blocking of internal threats and unknown threats through AI.
- Other security
Just hold up the IC card to collect data (CSV)! You can easily set it up on your computer, so no specialized knowledge is required!
- Entrance and exit control system
- Personal authentication
Industry-leading certification accuracy supports the safety and security of society!
- Personal authentication
The facial recognition system monitors in place of the human eye, preventing unauthorized outings by residents!
- Personal authentication
Real-time aggregation and confirmation of entry and exit management! Building an entry and exit management system tailored to customer needs.
- Other security
- Entrance and exit control system
Supporting work style reform! Introducing a case study on the implementation of license plate vehicle number recognition.
- Other security
- Entrance and exit control system
Utilizing a reservation system and QR codes! Achieving significant labor reduction in reception tasks.
- Other security
- Entrance and exit control system
Switching is possible in case of paper jams or malfunctions! Achieve labor-saving reception operations with an unmanned two-dimensional code issuing machine.
- Other security
- Entrance and exit control system
Face recognition using AI technology allows for the wearing of masks and glasses! Detects human body temperature within an error margin of ±0.5℃.
- Entrance and exit control system
Determine and authenticate the presence or absence of masks and glasses using AI technology! Facial recognition and quick temperature detection.
- Entrance and exit control system
News January 20, 2023: Developed for a construction site of a multi-family dwelling.
- Entrance and exit control system
Waterproof! Battery life of 2 years! With the loudest sound among lost item tags, it serves as a preventive measure against lost items both inside and outside the company.
- Other security
- Office supplies and stationery
Contributing to the acceleration of situation understanding! A case of establishing an IT environment that does not hinder growth strategies!
- Software (middle, driver, security, etc.)
- Other security
- Other security and surveillance systems
Initial response time reduced from 24 hours to 5 minutes! A security software that is easy to manage with telework!
- Software (middle, driver, security, etc.)
- Other security
- Other security and surveillance systems
The user evaluation regarding detection accuracy is high, and the easy-to-use UX is a major attraction!
- Software (middle, driver, security, etc.)
- Other security
- Other security and surveillance systems
Not only large corporations but also small businesses can implement it! It excels in automated operations using AI technology!
- Software (middle, driver, security, etc.)
- Other security
- Other security and surveillance systems
Achieve security automation with AI! By the time you notice it, it's already over—automated response EDR!
- Software (middle, driver, security, etc.)
- Other security
- Other security and surveillance systems