List of Safety features products
- classification:Safety features
1801~1845 item / All 3267 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Built-in small electromagnetic lock with pre-intrusion alarm contact / Rated voltage: DC12 compatible, holding force: 40Kg
- Entrance and exit control system
- Other security and surveillance systems
- others
VOLCALOCK dedicated control panel. Compatible with VOLCALOCK "unlocking type during power-on" and "locking type during power-on." Standard model.
- Control Panel
- Entrance and exit control system
Proposing security systems for nursing care facilities and hospitals!
- Other security
- others
Ideal as an electric lock for partitions that can be embedded while maintaining the landscape with lightweight doors!
- Entrance and exit control system
- Other security and surveillance systems
- others
Ideal for security/management locks and cabinets/industrial locks! Reliable locking at a low cost.
- Entrance and exit control system
- Other security and surveillance systems
- others
Electric strike used in combination with an automatic locking type lock!
- Entrance and exit control system
- Other security and surveillance systems
- others
Waterproof large electromagnetic lock, ideal for large gates / Rated voltage: DC12/24V compatible, holding force: 680Kg
- Entrance and exit control system
- Other security and surveillance systems
- others
Excellent security and operability! For customers considering dimple key cylinders.
- Other security
- others
Waterproof electromagnetic lock, ideal for installation on large to medium-sized doors / Rated voltage: DC12/24V compatible, holding force: 410Kg
- Entrance and exit control system
- Other security and surveillance systems
- others
Prevent unauthorized operation of the PC / Lock the PC / Support for two-factor authentication / Log in to Windows just by inserting the key
- Other security
- others
- Other services
Free publication of seminar materials on the tethered balloon camera solution for security, introduced by NHK, commercial broadcasters, and major newspapers!
- Other security
You will be able to reduce the efficiency of daily email operations by 10 minutes a day, saving over 40 hours a year.
- Other security
- Email/Fax transmission
Choose a workplace that suits you, for the era to come! We will also lighten the burden on your mind.
- Entrance and exit control system
Adopting double monitoring with ICT and human oversight! If you haven't been watching the push notifications, we will contact you by phone from the monitoring center.
- Remote Control
- Surveillance Camera System
- Other security
A unit that restricts the flow of data in one direction and completely blocks cyber attacks from the outside! It safely transmits on-site data to the cloud.
- Other security
- server
Aiming for control that is independent of the connection environment! Introducing key points of privileged ID management in telework on the blog.
- Other information systems
- Other security and surveillance systems
- Other security
We are introducing examples of information leaks due to internal misconduct and three countermeasures on our blog!
- Other information systems
- Other security and surveillance systems
- Other security
We will introduce many examples of internal fraud countermeasures! Please use this to review the internal fraud countermeasures in your organization.
- Other information systems
- Other security and surveillance systems
- Other security
Is your supply chain access management okay? We introduce best practices for access management in our blog.
- Other information systems
- Other security and surveillance systems
- Other security
Streamlining high-load requirements! Tips for maintaining "PCI DSS compliance" introduced in the blog.
- Other information systems
- Other security and surveillance systems
- Other security
An example of improved internal security awareness through the establishment of a workflow for task approval.
- Other security
- Other information systems
Automation and efficiency of log management! We will introduce a case where two tools collaborated to achieve this.
- Other security
- Other information systems
Centralized management of internal access to the server! A case where the quality and efficiency of access control have significantly improved.
- Other security
- Other information systems
Significant cost reduction! Introducing a case study of an access management tool implemented for internal control.
- Other security
- Other information systems
Migrating the management of high-privilege IDs (privileged IDs) to cloud services! A case that significantly streamlined responses to system audits.
- Other security
- Other information systems
Two points to check during implementation! Key selection criteria for products that manage high-privilege IDs (privileged IDs) introduced in the blog.
- Other information systems
- Other security and surveillance systems
- Other security
What are the advantages and disadvantages of each method? Key points for selecting management products for high-privilege IDs (privileged IDs) introduced in the blog.
- Other information systems
- Other security and surveillance systems
- Other security
What is the most threatening event for our company? We explain the importance of managing high-privilege IDs (privileged IDs) and the approach methods in our blog!
- Other information systems
- Other security and surveillance systems
- Other security
The key point is the boundary of responsibility in the cloud! We will introduce how to manage "administrator accounts" in a blog.
- Other information systems
- Other security and surveillance systems
- Other security
RFID antenna coil, flat wire antenna coil
- IC tag reader/writer
- Personal authentication
- Entrance and exit control system
Since it does not use physical characteristics visible from the table, forgery and impersonation are difficult. It is a highly reliable system with no theft or loss.
- Personal authentication
The ultimate safe and secure life of having nothing. Equipped with standard auto-lock features!
- Personal authentication
To those who feel that it is not someone else's problem, yet are troubled by not knowing what measures to take.
- Other security
No need to change the router settings, so it can be implemented immediately and the security is perfect!
- VPN/Wide Area Ethernet
- Other security
Whitelist-type malware protection software
- Encryption and authentication
Rambus TLS Toolkit Standard FIPS Edition
- Encryption and authentication
Are you spending a lot of man-hours on log reconciliation work? Introducing a privileged ID management solution.
- Server monitoring and network management tools
- Other security
Can be implemented as an independent system! Eliminating threats lurking in Wi-Fi to achieve a clean Wi-Fi environment.
- Sensors
- Wireless LAN
- Other security
From equipment proposals to construction and maintenance, we provide comprehensive in-house support! We support the safety and security of your workplace.
- Surveillance Camera System
- Other security and surveillance systems
- Entrance and exit control system
It is suitable for access control systems and logistics management systems.
- IC tag
- Contract manufacturing
- Entrance and exit control system
Reader-writer module using the specific low-power wireless 920MHz band.
- IC tag
- Contract manufacturing
- Entrance and exit control system
No need for the introduction of a large-scale server system. Easily reduce risks with the functions of cameras and dedicated recorders!
- Other network tools
- Other security
Security + Sales Strategy Tool. Glassphere People Counting System Solution now available!
- Other network tools
- Other security