List of Safety features products
- classification:Safety features
1756~1800 item / All 3267 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Centralized management of multiple gates! It is also possible to configure a large-scale system that manages between locations.
- Personal authentication
A wide range of highly scalable AI facial recognition terminals available!
- Entrance and exit control system
Introduction of a case where a camera + AI solution was built to inform in real-time about the office congestion status.
- Entrance and exit control system
- Other security
- others
Let's strengthen the company's information security measures by implementing UTM and firewalls.
- filtering
- Firewall and intrusion prevention
- Other PCs and OA equipment
A whitelist with no loopholes shuts out viruses and malicious software!
- Other security
Measures for proper device operation! Elimination of personal USB memory devices, etc. / Support for individual management of company USB memory devices.
- filtering
- Other security
Thorough measures against information leaks! Complete management of all removable media and device access.
- filtering
- Other security
Security Software Measures in 5 Minutes: A Simple Explanation of McAfee and Acronis Blacklists and Whitelists!
- Software (middle, driver, security, etc.)
- Virus software
- Other embedded systems (software and hardware)
Advanced security through facial recognition - in combination with IC cards, fingerprints, and temperature checks - easy integration with external systems, also serves as digital signage.
- Entrance and exit control system
Achieving SASE (Secure Access Service Edge) that simply integrates SD-WAN and network security!
- VPN/Wide Area Ethernet
- Firewall and intrusion prevention
- Other security
We provide custom-made web systems and websites tailored to our customers!
- Other information systems
- Other security
- Other server related
Providing usable security to our customers! Featuring face recognition modules suitable for embedded development and specifications comparison, etc.
- Entrance and exit control system
Break away from the state of managing only with ID and password, and achieve detailed permission management!
- Other security
- Other information systems
Data erasure of computers, servers, and storage.
- Data Erasing
Suitable for tracking many non-powered assets such as valuables, wire reels, tools, and construction machinery.
- Other security
- Communications
Email distribution to the registered guardians' addresses! It also includes a mass email distribution feature for guardians and staff.
- Software (middle, driver, security, etc.)
- Other security
- Entrance and exit control system
Simply connect for safety—no complicated setup required to get started! We provide a secure network even in locations without dedicated engineers, such as regional bases and retail stores!
- Embedded Board Computers
- Routers, Switches, and Hubs
- Firewall and intrusion prevention
Centralized management of Forescout deployment across the entire extended enterprise!
- Other security
We will enhance threat response capabilities across the entire enterprise!
- Other security
We will confidently design, build, and deploy large-scale network segmentation!
- Other security
Implement policy-based controls and automate! Respond quickly to incidents.
- Other security
You can gain our unique insights into the overall picture of the device without interrupting business processes!
- Other security
Use commercially available USB devices as keys for PCs to lock unauthorized operations on Windows Server. It also supports USB connection restrictions for smartphones.
- Encryption and authentication
- others
- Other security
Encrypt files/folders ◆ Simply drag and drop data onto the application icon.
- Encryption and authentication
File/folder-level encryption software. Passwordless operation is also possible when used within a group.
- Encryption and authentication
Equipped with data leakage prevention features when transferring data to USB-connected storage (including smartphones).
- Encryption and authentication
- others
Ideal for My Number measures! Launch of the PC operation log collection software "LB Access Log 2 Pro" equipped with monitoring features and no server required.
Lifeboat Co., Ltd. (President Takahiro Yamazaki, Chiyoda-ku, Tokyo, TEL 03-3265-1250, URL http://www.lifeboat.jp/) will start selling "LB Access Log 2 Pro" (LB Access Log 2 Pro), a software developed by Es Computer that does not require a dedicated server and can collect and monitor PC operation logs, starting from February 15, 2016, through various sales agents, with a standard price of 22,000 yen (excluding tax) and up. In addition to collecting operation logs, it features the ability to take screenshots and notify administrators when specific actions are performed, monitor network traffic to detect unexpected data transmissions, and restrict the use of USB devices, among other diverse functionalities. It is an ideal software for monitoring PCs and collecting operation logs, particularly for enhancing the security of PCs handling My Number information. ● For more details on LB Access Log 2 Pro, please visit http://www.lifeboat.jp/products/alog2p/.
Create a secret area on removable media or HDD.
- Encryption and authentication
- others
Create an encrypted disk with simple operations by following the wizard.
- Encryption and authentication
- Other security
- others
Standard functions are prepared from sensing to data control, communication, alarms, and graphing! We achieve continuous operation for over one year with original devices.
- Other information systems
- Other security
In addition to excellent authentication accuracy, it allows for the registration of up to 100,000 fingers.
- Personal authentication
- Other security
Significantly reduced size, weight, and power consumption compared to a typical IFF transponder.
- Other electronic parts
- Other security
Long-term data storage without power, automatic data deletion settings, and the ability to specify up to 10 PCs for use.
- Document and Data Management
- Storage Backup
- Data Erasing
This is a charging storage unit that can charge and store up to 10 units in delivery services, apparel shops, supermarkets, factories and production sites, warehouses and logistics, hospitals, etc.
- Other security
- Other PCs and OA equipment
- Office furniture
Early detection of falls, accidents, and sudden illnesses such as heatstroke!
- Other security and surveillance systems
- Other security
- Image analysis software
Prevent the entry of individuals with unwashed hands due to accompanying persons and improve the hygiene management standards of food factories!
- Surveillance Camera System
- Entrance and exit control system
- Image analysis software
Detecting employee intrusion into dangerous areas of factories and warehouses to prevent accidents.
- Surveillance Camera System
- Entrance and exit control system
- Image analysis software
From entrance management to the front doors of apartments and private homes! It combines a sense of security that cannot be faked or stolen with the convenience of not needing to carry keys.
- Personal authentication
- Other security
We introduce a plan where the DX system is available for 16,500 yen per account per month (tax included)!
- Other security
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
Windows environment restoration software to restore to the original state with reboot or shutdown.
- Software (middle, driver, security, etc.)
- Other security
High-speed transfer USB 3.1 Gen 1 (USB 3.0) compatible! A USB memory stick dedicated to protecting information for businesses.
- Other security
Unauthorized USB memory - Shut out hard disks.
- Encryption and authentication
Just install it to thoroughly record operations on your Windows PC. No dedicated server required.
- Other security
- Other office supplies
Ideal for My Number measures! Launch of the PC operation log collection software "LB Access Log 2 Pro" equipped with monitoring features and no server required.
Lifeboat Co., Ltd. (President Takahiro Yamazaki, Chiyoda-ku, Tokyo, TEL 03-3265-1250, URL http://www.lifeboat.jp/) will start selling "LB Access Log 2 Pro" (LB Access Log 2 Pro), a software developed by Es Computer that does not require a dedicated server and can collect and monitor PC operation logs, starting from February 15, 2016, through various sales agents, with a standard price of 22,000 yen (excluding tax) and up. In addition to collecting operation logs, it features the ability to take screenshots and notify administrators when specific actions are performed, monitor network traffic to detect unexpected data transmissions, and restrict the use of USB devices, among other diverse functionalities. It is an ideal software for monitoring PCs and collecting operation logs, particularly for enhancing the security of PCs handling My Number information. ● For more details on LB Access Log 2 Pro, please visit http://www.lifeboat.jp/products/alog2p/.
Windows operation log collection software. Enhanced PC monitoring features. No server required.
- Other security
- others
Dedicated control panel for VOLCALOCK, equipped with a DC12V/3.5A power supply unit.
- Control Panel
- Entrance and exit control system
[New Product] FeliCa/Mifare Compatible! Outdoor-Compatible Contactless Card Reader [ST-530MF]
The "ST-530MF" is compatible with both FeliCa and Mifare standards, and there is no need to change settings such as switching during use. You can use your employee ID card or transportation IC card as a unlocking key, and the unlocking method can be selected according to the security level. 【Four selectable operation modes】 1. Unlock with card 2. Unlock with PIN 3. Unlock with both card and PIN input 4. Unlock with either card or PIN input It supports DC12V/DC24V, making it easy to build systems with other devices. With an IP64 waterproof rating, it can be installed both indoors and outdoors, and is suitable for system operations combined with outdoor electromagnetic locks. Additionally, it is equipped with two contact outputs: a voltage-free unlocking contact output (Relay 1) and a voltage contact output (Relay 2) that can be used for various applications. It is also possible to connect and utilize external devices such as security contacts. 【Other features】 ◆ Individual registration function by ID number ◆ Easy registration mode through device replacement ◆ Internal forced lock setting ◆ Volume adjustment function ◆ Sequential registration function (only available for the dedicated model "ST-530MF-R") *Dedicated unlocking tags or cards from our company are required.
Lock status display LED built-in electromagnetic lock / Rated voltage: DC12/24V compatible, holding force: 270Kg
- Entrance and exit control system
- Other security and surveillance systems
- others