List of Safety features products

  • classification:Safety features

1486~1530 item / All 3241 items

Displayed results

Achieve automatic PC locking when away! Accurately track PC operating time! Implement labor management and security measures with a single card!

  • Entrance and exit control system
  • Personal authentication
  • Personnel and Labor

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Achieve automatic PC locking when away! Accurately track PC operating time! Implement labor management and security measures with a single card!

  • Entrance and exit control system
  • Personal authentication
  • Personnel and Labor

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
イルトン.png

Automate business processes with appropriate judgment through log acquisition! Achieve labor management and security measures simultaneously!

Do you have any concerns regarding labor management and security measures? When you are suddenly called away from your PC in the office, there is a worry about information leakage due to forgetting to lock Windows when stepping away while working in an external space. Additionally, there are challenges related to management in telework, long working hours, and inefficient working times... issues arising from the diversification of work styles. For those facing such concerns, we recommend the PC Auto Lock Smart Card "Iltone," which automatically locks your PC when you step away for a few seconds and automatically logs you in when you return. With this one card, you can simultaneously solve your worries about labor management and security measures! We would greatly appreciate your consideration.

100% protection that does not rely on detection. Enterprise-level endpoint security! Thoroughly protect your PC from malware threats.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

"Network separation" enables work style transformation, BYOD, and telecommuting! It connects various communication methods and systems centered around people.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The position of the numbers on the keypad changes every time you use it; it is a high-security keypad.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

All-in-one necessary security measures! Comprehensive network security with high-performance UTM.

  • filtering
  • Virus software
  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Detect unknown malware that has bypassed traditional antivirus software and minimize damage to the greatest extent possible!

  • filtering
  • Virus software
  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Dedicated Outdoor Box ACS-BOX

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Rain cover, communication type random keypad model ACS-11T.BK

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introducing an IP camera that complies with waterproof standard IP66! It features 360° continuous pan rotation.

  • Other security and surveillance systems
  • Other security
  • Surveillance Cameras

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What should we do against increasingly sophisticated cyber attacks? Introducing measures to prevent the spread of viruses!

  • Routers, Switches, and Hubs
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
2022-09-09_09h09_41.png

<Security Measures> Introducing measures to prevent the spread of viruses.

We are offering a document summarizing the security measures implemented by SubGate Co., Ltd. It includes "Things to Address in 2022," "Security Measures for 2022," and "Necessary Measures for Supply Chain Attack Prevention," among other virus prevention strategies. Our security switch, 'SubGate,' protects your network. [Offered Materials] ■ Things to Address in 2022 ■ Security Measures for 2022 ■ Necessary Measures for Supply Chain Attack Prevention ■ [Fear Newspaper] True Scary Stories, Episode 1 ■ [Fear Newspaper] True Scary Stories, Episode 2 *For more details, please refer to the related products and catalog, or feel free to contact us.

A security solution that enables intuitive network operations.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
2022-09-09_09h23_51.png

Security solution "SubGate"

"SubGate" is a network internal security solution that automatically detects and blocks security threats occurring within the network, enhancing the stability of network services and the convenience of operations. It protects the network with patented technology from Special Publication 2011-523822 "Access Level Security Device and Security System." The MDS engine analyzes traffic based on behavior and automatically detects and blocks harmful traffic without degrading switch performance. *For more details, please refer to related products and catalogs, or feel free to contact us.

We will introduce the key points of issues that require strengthened measures and security switches!

  • Routers, Switches, and Hubs
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
2022-09-09_09h16_28.png

Things to address in 2022

In preparation for the day when measures to prevent the spread of viruses become even more essential, we would like to introduce the actions to be taken in 2022. Key points for strengthening measures include the "amendment of the Personal Information Protection Law," the "amendment of the Electronic Bookkeeping Law," and "measures for telework PCs." Our security switch, 'SubGate,' allows for easy internal measures. It is suitable for preventing the spread of computer viruses, detecting and blocking harmful traffic, and preventing eavesdropping on internal IP phones and confidential data. *For more details, please refer to related products and catalogs, or feel free to contact us.

Supply chain attacks are on the rise! Real-time detection and prevention of the spread of worms, viruses, and more.

  • Routers, Switches, and Hubs
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
2022-09-09_09h26_23.png

What is necessary for countering supply chain attacks

There has been a rapid increase in supply chain attacks that target the group companies, contractors, and suppliers of a target, using them as a foothold to infiltrate the target company. Since it is difficult to penetrate large corporations with strong security measures, attackers often aim for smaller companies that have less comprehensive security measures. Therefore, we recommend 'SubGate' for supply chain attack countermeasures. *For more details, please refer to the related products and catalog, or feel free to contact us.

The fear of dangerous supply chain attacks! Use the ultimate technique of excellent behavior detection to contain the fierce attacks!

  • Routers, Switches, and Hubs
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
2022-09-09_09h31_06.png

Terrifying News: A Truly Scary Story - Episode 1

In the horror news, we introduce truly scary stories. The first story is about "The Fear of Dangerous Supply Chain Attacks." "There were attacks targeting the supply chains of major Japanese manufacturers," and "a subsidiary's subcontractor messed up," leading to damage that spread from subcontractors to subsidiaries and then to parent companies. In such times, the security switch 'SubGate' protects the network. With its excellent behavior detection capabilities, it can block harmful traffic, prevent the spread of viruses, and stop data theft. *For more details, please refer to related products and catalogs, or feel free to contact us.*

The damage that occurred just from bringing the telework PC back to the company! Containing the cluster with a special move!

  • Routers, Switches, and Hubs
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
2022-09-09_09h34_35.png

Terrifying News: A Truly Scary Story, Episode 2

In the horror news, we introduce truly scary stories. The second episode is about "Just bringing the telework PC back to the company...". There have been incidents such as "connecting the telework PC to the company's LAN," "the fear of home clusters," and "the emergence of corporate clusters from returned PCs." In such times, the security switch 'SubGate' protects the network. With its excellent behavior detection capabilities, it can block harmful traffic, prevent the spread of viruses, and stop data theft. *For more details, please refer to the related products and catalog, or feel free to contact us.

We are introducing how to prevent sophisticated cyber attacks and what should be done!

  • Routers, Switches, and Hubs
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
2022-09-09_09h15_05.png

[Data] Security Measures in 2022

This document introduces security measures for 2022 on how to address increasingly sophisticated cyber attacks such as EMOTET, ransomware, and supply chain attacks. It includes sections on "What is EMOTET," "Attack Methods," and "Examples of Attacks on Major Manufacturing Supply Chains." Additionally, it introduces 'SubGate,' which helps prevent the spread of viruses. Please make use of this information for your countermeasures. *For more details, please refer to related products and catalogs, or feel free to contact us.

This is a card reader dedicated to the entry and exit management system ACsmart/ACsmart2.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

This is a card reader specifically for the entry and exit management system ACsmart/ACsmart2.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Investigating major vulnerabilities that are easily exploited and have a significant impact!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

With the single-camera 2D authentication method, high-speed walkthrough authentication of approximately 30 people per minute is possible.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

With the single-camera 2D authentication method, high-speed walkthrough authentication of approximately 30 people per minute is possible.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Sophisticated design, feature-rich card reader. Smart design that allows for immediate operation with simple setup.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Detection of attempts to misuse! Visualization of vulnerabilities in layers lower than the OS (i.e., firmware).

  • Software (middle, driver, security, etc.)
  • Server monitoring and network management tools
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Matrix Corporation (Chuo Ward, Osaka City) is pleased to announce that it has begun development of a safety device (tentative) to support the prevention of leaving passengers behind on buses.

  • Other security
  • Safety Sensors
  • Other safety equipment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We propose a high-precision and affordable hybrid location information solution that takes the best of BLE and UWB! The setup is really easy as well.

  • IC tag
  • Entrance and exit control system
  • Other information systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

This is a face recognition module suitable for embedded development in various devices. By integrating it into machine tools and factory equipment, it is also possible to restrict the operations of wo...

  • Personal authentication
  • Other embedded systems (software and hardware)
  • Other electronic parts

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Achieve strong two-factor authentication with simple operations! You can choose a product that suits your needs. *Free trial version available.

  • Other security
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Easily eliminate the frustration of waiting times! A queue management system to assist with reception tasks.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

If the temperature is normal, tapping the unlock icon will unlock the door where the visitor is! It can also be used for factory security measures with facial recognition terminals.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We offer various training on security.

  • Other security
  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

For matters related to information security, please contact our company.

  • Other information systems
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cybersecurity tool that collects information from multiple sources.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

No initial costs and no long-term contracts required for comprehensive cybersecurity measures for your entire business!

  • Firewall and intrusion prevention
  • Rental/lease

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

In core important systems and OT, zero-day response is also essential. Let's enhance the effectiveness of security measures against attacks by implementing precise boundary control.

  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Detects fire sources and notifies! Fire source detection cameras for reducing fire risk are now on sale!

  • Other security
  • Surveillance Camera System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introducing products suitable for environmental maintenance, visualization measures, security measures, and labor management!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cloud services that can be implemented immediately! Proven track record in companies requiring high security, such as banks.

  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The high-precision IC tag detects passengers on board when the bus passes through the gate. It also helps prevent leaving people behind on the bus.

  • Entrance and exit control system
  • IC tag
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

How to break away from the culture of "password-protected zip files," as introduced in the blog.

  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Multi-vendor support! Introduction to firewall operation management solutions.

  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Filter

classification
Delivery Time
Location