List of Safety features products
- classification:Safety features
1711~1755 item / All 3267 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Support for compliance with security and regulations! Experience immersive continuous learning.
- Software (middle, driver, security, etc.)
- Other security
- Distance learning/E-learning
Addressing software risks lurking in various places! Accelerating the delivery of secure and high-quality code.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Total support for application security from development to deployment!
- Software (middle, driver, security, etc.)
- Other security
Manage all test execution, policy application, prioritization of issues, and filtering!
- Software (middle, driver, security, etc.)
- Other security
Establish security and compliance as part of the normal business process!
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
You can quickly identify and fix critical security and quality issues while coding!
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Introducing a solution to detect and fix security vulnerabilities during coding!
- Software (middle, driver, security, etc.)
- Other security
Diagnosing software risks throughout the SDLC with a single record system for AppSec data!
- Software (middle, driver, security, etc.)
- Other security
We enable comprehensive open-source risk management regardless of your company's size or budget!
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Identify software security vulnerabilities! This enables informed and reliable decision-making based on information.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Manage risks related to security, licensing, and code quality! Introduction to SCA solutions.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Identify and exploit critical vulnerabilities for business to reduce the risk of leaks!
- Software (middle, driver, security, etc.)
- Other security
Accurately identify and verify vulnerabilities! You can grasp the URL detection and coverage of web applications at a glance.
- Other security
- Software (middle, driver, security, etc.)
- Other security and surveillance systems
To prevent the sharing of confidential information with the server, the risk of password leakage is zero! Peace of mind with international security standards.
- Encryption and authentication
Protecting logon to PC terminals with enhanced security! Reducing operational burden when using USB keys.
- Encryption and authentication
- Other security
Prevent information leaks caused by human error! This is a product that achieves cost performance.
- Encryption and authentication
- Other security
Password-free fingerprint authentication device! Next-generation authentication that balances security and convenience.
- Encryption and authentication
Prevent fraud with enhanced authentication! It is possible to integrate with various authentication solutions compliant with PKI.
- Encryption and authentication
Easily add one-time password authentication to existing systems! Strengthen the authentication of your company's web services.
- Encryption and authentication
A USB dongle that achieves overwhelming cost performance!
- Other security
Compliant with OATH's TOTP (Time-based One-time Password Algorithm)!
- Encryption and authentication
"Cloud Authentication Service" that allows you to choose from multiple authentication methods.
- Encryption and authentication
Authentication that balances security and convenience! Towards a world without passwords with easier and stronger authentication!
- Encryption and authentication
Static analysis (SAST) solutions by industry leaders. Quickly identify and fix security and quality issues during coding.
- Other security
When not in use, disconnect it! Simply turn the key to cut off the connection, making it easy to manage the LAN cable connection!
- Other security
Protect your laptop with a U-shaped bracket! You can use it in its normal form by removing the bracket!
- Other security
Close the ports for DVD and USB connections! It is also effective in maintaining a defensive posture when in use!
- Other security
Eliminate the anxiety of an unmanned factory at night! In case of fire, illegal intrusion, or abnormalities in important equipment, we will issue an emergency alert! LINE integration is now possible!
- Other security and surveillance systems
- Other security
Ideal for objectively recording employee entry and exit times in work style reform with hands-free operation!
- Entrance and exit control system
By centrally managing vehicle entry and exit, including passengers, as well as pedestrian entry and exit, we will enhance security, simplify reception duties, and alleviate congestion.
- Other security
Deterrence and prevention through restraint! Differences from the actual item can be judged for authenticity with the naked eye or simple devices.
- Other security
- Printing/Publishing
- others
This seminar will provide the latest information on cybersecurity and compare the mainstream security standards and frameworks.
- Firewall and intrusion prevention
Reasonable price and durability! Lockout is possible in a wide range of scenes! It is expected to have a significant effect on improving safety in the work environment.
- Other security
- Other security and surveillance systems
- Other safety and hygiene products
Since it is a resin-made padlock, it ensures a safer working environment without the worry of sparks or electrical conduction. It is an OSHA-compliant product with excellent corrosion resistance and n...
- Other security
- Other security and surveillance systems
- Other safety and hygiene products
Easy procedures with RFID tags! Usage history is automatically created, and the lending status is clear at a glance!
- Personnel and Labor
- IC tag reader/writer
- Personal authentication
Easy and simple cloud-based attendance and schedule management system.
- Entrance and exit control system
Windows login enters the passwordless era! Protected with advanced security.
- Encryption and authentication
- Other security
Vehicle number authentication using surveillance cameras (network cameras) in the art entry and exit management system.
- Entrance and exit control system
All-in-one security solution that integrates all features.
- filtering
- Firewall and intrusion prevention
- Encryption and authentication
Prevent human errors and significantly reduce operational burdens! Logs will record who did what and when.
- Data Erasing
- Document and Data Management
High security with low operational load! Introducing a very powerful and user-friendly solution!
- Other security
- Other operation management software
Face recognition entry and exit management system 'MB301 6-door IN/OUT, 12 units installed'
- Entrance and exit control system
Face Recognition Entry and Exit Management System 'MB-301-F Outdoor Installation'
- Entrance and exit control system
The latest AI facial recognition access control system rapidly authenticates users' facial information and body surface temperature measurements, successfully achieving downsizing.
- Entrance and exit control system