List of Safety features products
- classification:Safety features
1621~1665 item / All 3242 items
Adoption of a key cylinder that is difficult to pick and a special key that is hard to duplicate.
- Entrance and exit control system
A keyless system with numbers that change positions and are easily visible even at night.
- Entrance and exit control system
A keyless system with numbers that change positions and are easily visible even at night.
- Entrance and exit control system
Can be installed as is outdoors! (No rainproof box is needed.)
- Entrance and exit control system
A control unit integrated keypad switch with 2 outputs that supports a PIN code, capable of setting 4 operation modes.
- Entrance and exit control system
A universal switch that allows control of the security system and electric lock with the input of a passcode; the keypad uses a random display type.
- Entrance and exit control system
This product, which combines a numeric keypad operation unit with a highly versatile electric lock control panel, is designed for ease of use in various locations.
- Entrance and exit control system
This product, which combines a numeric keypad operation unit with a highly versatile electric lock control panel, is designed for ease of use in various locations.
- Entrance and exit control system
Voice-enabled card switch compatible with FeliCa/Mifare/I-CODE multi-read.
- Entrance and exit control system
Remote switch, facial recognition unit for ACsmart integration. High security is established through AND authentication of facial recognition and card/keypad.
- Entrance and exit control system
Completely solving the three major issues faced by customers in the information systems departments of small and medium-sized organizations!
- filtering
- Virus software
- Firewall and intrusion prevention
We provide generous support when assistance is needed! In the event of a threat detection, we will promptly notify you via email.
- filtering
- Virus software
- Firewall and intrusion prevention
Blocking access to fraudulent sites is possible! You can easily achieve a safe and secure network environment.
- filtering
- Virus software
- Firewall and intrusion prevention
Peace of mind with security measures for both PCs and networks, including monitoring and operation!
- filtering
- Virus software
- Firewall and intrusion prevention
EMV test card for brand certification!
- Testing Equipment and Devices
- Other security
Proposal for the introduction of AI with high investment value.
- Personal authentication
- Encryption and authentication
- Voice Recognition Software
Made-to-order product. Equipped with solar panels. This is a low-cost type of solar power device that does not require commercial power supply. Security cameras are optional.
- Other security
Made-to-order product. No commercial power supply required. It is a low-cost type of mobile solar power device. Security cameras are optional.
- Other security
Just hold up the QR code. Super fast check-in at the unmanned reception! Leave the reception duties to the "DXer RD-370B."
- Entrance and exit control system

DX for accommodation facilities! Branding for safety! Room key card cleaner & infection prevention certification mark acquisition Summer mega campaign!!
The "CL-76 Series Room Key Card Cleaner" is a product that automatically disinfects and sanitizes room key cards at a low cost. It can help address significant future challenges and issues, such as the time required for hand-wiping room key cards and skin irritation caused by hand-wiping (one source of infection). This campaign is particularly relevant in the current situation, so we encourage you to consider it. Additionally, we can also propose obtaining the infection prevention certification mark [GBAC STAR]. Please feel free to reach out. [Infection Prevention Certification Mark: GBAC STAR] Many inbound visitors prioritize the presence of an infection prevention certification mark when using facilities. In the future, there will be days when accommodation booking sites will allow searches based on the presence of this certification mark. Why not obtain the infection prevention certification mark at a low cost in preparation for that day? (The card cleaner can also assist in obtaining the certification!) As a customer attraction strategy for the with-COVID and post-COVID era, let’s establish a brand of safety! Please consult with us.
Identify security vulnerabilities in source code! Reduce the risk of data leaks.
- Software (middle, driver, security, etc.)
- Other security
- Other services
We will identify vulnerabilities lurking in access management, authentication controls, and known configuration mistakes!
- Software (middle, driver, security, etc.)
- Other security
- Other services
Attempt to attack the target application and uncover hidden vulnerabilities!
- Software (middle, driver, security, etc.)
- Other security
- Other services
Identifying vulnerabilities that have a significant impact on business! We deliver high-value test results.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Two depths are available! You can choose the appropriate test level according to your risk profile.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Reduce the risk of data leaks! We have resources that can quickly respond to changes in scale.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Support for compliance with security and regulations! Experience immersive continuous learning.
- Software (middle, driver, security, etc.)
- Other security
- Distance learning/E-learning
Addressing software risks lurking in various places! Accelerating the delivery of secure and high-quality code.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Total support for application security from development to deployment!
- Software (middle, driver, security, etc.)
- Other security
Manage all test execution, policy application, prioritization of issues, and filtering!
- Software (middle, driver, security, etc.)
- Other security
Establish security and compliance as part of the normal business process!
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
You can quickly identify and fix critical security and quality issues while coding!
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Introducing a solution to detect and fix security vulnerabilities during coding!
- Software (middle, driver, security, etc.)
- Other security
Diagnosing software risks throughout the SDLC with a single record system for AppSec data!
- Software (middle, driver, security, etc.)
- Other security
We enable comprehensive open-source risk management regardless of your company's size or budget!
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Identify software security vulnerabilities! This enables informed and reliable decision-making based on information.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Manage risks related to security, licensing, and code quality! Introduction to SCA solutions.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Identify and exploit critical vulnerabilities for business to reduce the risk of leaks!
- Software (middle, driver, security, etc.)
- Other security
Accurately identify and verify vulnerabilities! You can grasp the URL detection and coverage of web applications at a glance.
- Other security
- Software (middle, driver, security, etc.)
- Other security and surveillance systems
To prevent the sharing of confidential information with the server, the risk of password leakage is zero! Peace of mind with international security standards.
- Encryption and authentication
Protecting logon to PC terminals with enhanced security! Reducing operational burden when using USB keys.
- Encryption and authentication
- Other security
Prevent information leaks caused by human error! This is a product that achieves cost performance.
- Encryption and authentication
- Other security
Password-free fingerprint authentication device! Next-generation authentication that balances security and convenience.
- Encryption and authentication
Prevent fraud with enhanced authentication! It is possible to integrate with various authentication solutions compliant with PKI.
- Encryption and authentication
Easily add one-time password authentication to existing systems! Strengthen the authentication of your company's web services.
- Encryption and authentication