List of Safety features products
- classification:Safety features
2836~2880 item / All 3248 items
Everything is connected to the internet, and logistics and finance, along with many other things, are dramatically changing.
- Encryption and authentication
- Other security
Centralized management of data on an advanced IoT platform with scalability.
- Encryption and authentication
High security level and also user-friendly!
- Encryption and authentication
It's okay to wear a helmet or mask! Recommended for the construction industry as well.
- Encryption and authentication
Cost-reduction type! Extremely safe cloud office space.
- Other network tools
- Server monitoring and network management tools
- Other security
Clear sound quality that makes the world feel close! It can be used even in countries with slow internet or those far away.
- Other network tools
- Server monitoring and network management tools
- Other security
Clear audio quality that reaches the world! No need for telephone line installation, PBX purchase, or inter-office call charges.
- Other network tools
- Server monitoring and network management tools
- Other security
Take the office work style reform a step further! Attendance management system linked with groupware!!
- Other security and surveillance systems
- Workflow System
- Entrance and exit control system
Detection of vulnerabilities in control systems and ensuring safety and robustness
- Technical and Reference Books
- Firewall and intrusion prevention
- Encryption and authentication
We will solve the challenges of item management in the office and make management tasks smarter.
- Other security
- Other operation management software
Compliant with ONVIF and PSIA! Equipped with a 2.7x optical electric zoom.
- Other security
- Other security and surveillance systems
Protection level IP67! An IP camera equipped with 35x optical electric zoom.
- Other security
- Other security and surveillance systems
Supporting your business continuity from the implementation to the operation of IT security!
- Other security
- Other contract services
- Other services
Introduction to Toshiba IT Services' One-Stop Network Security Service
- Other security
- Other contract services
- Other services
Introduction to Toshiba IT Services' One-Stop Network Security Service
- Other security
- Other contract services
- Other services
A highly reliable and secure security system! Semi-customized system upgrade!
- Other security and surveillance systems
- Entrance and exit control system
- Other security
Achieve total security management for the entire facility with a touch panel and one-touch operation!
- Other security and surveillance systems
- Entrance and exit control system
- Other security
Easily transmit signal lines for sensors, machine control, and instrumentation without creating a program!
- Other security and surveillance systems
- Entrance and exit control system
- Other security
A highly reliable and secure security system! Building a system tailored to the scale of the facility.
- Other security and surveillance systems
- Entrance and exit control system
- Other security
Introducing four enhanced features, including pre-recorded playback function (with sound) and pause function during playback.
- Other security and surveillance systems
- Entrance and exit control system
- Other security
Providing one-stop services from current situation analysis to system construction and operation!
- Other security and surveillance systems
- Entrance and exit control system
- Other security
Operation log products for virtual environments and desktop cloud environments!
- Other security
Patrol records are more reliable and easier to manage than patrol clocks.
- Personnel and Labor
- Other security
We will monitor your important keys 24 hours a day, 365 days a year! Regular checks of the keys can also be done automatically, eliminating the need for inspection tasks. Checkouts and returns are aut...
- Other security
- Other operation management software
Dramatically reduce the cost of daily key inspection tasks with "Key Checker"! It will reduce manual key inspection time to one-tenth!
- Other information systems
- others
- Other security
Recommended for identification cards such as employee IDs and student IDs, as well as membership cards.
- Personal authentication
- Personnel and Labor

Conducted a survey on the implementation status of IC card employee identification in the Human Resources and General Affairs departments.
Canon Marketing Japan Inc. conducted a survey on the implementation status of IC card employee IDs targeting 1,000 personnel and general affairs department employees nationwide. In the context of corporate work style reform, the main challenge faced by the personnel and general affairs departments was found to be "management of working hours," accounting for about 60%. The survey focused on the implementation status of IC card employee IDs, which are gaining attention as one method for managing working hours. <Topics> - The biggest challenge for personnel and general affairs in work style reform is "management of working hours." - The adoption of IC card employee IDs is expected to exceed 80% in the future. - The desired functions for IC cards in the future are "attendance management" and "security." ■ Survey Overview Survey Method: Internet survey Survey Target: Full-time employees aged 20 to 60 who are in charge of personnel and general affairs. Individuals involved in the creation, ordering, and management of employee IDs. * Excludes those in agriculture, forestry, fisheries, mining, and printing industries. Also excludes those involved in design and related tasks. Number of Responses: 1,000 samples Survey Period: August 30, 2018 - August 31, 2018 Survey Agency: Rakuten Insight Inc.
You can freely and safely enter and exit the building or room 24 hours a day.
- Other security and surveillance systems
- Entrance and exit control system
Biometric authentication using finger veins! Eliminate the difficulties of fingerprint authentication and the concerns of impersonation with password authentication! 【For Mac/Windows devices】
- Personal authentication
IC cards become the key! Security improves, and management becomes easier!
- Other security
- IC tag
- Other office supplies
For crime prevention measures! It blocks electromagnetic waves that attempt to receive the built-in data!
- Processing Contract
- Contract manufacturing
- Other security
It is a "smart lock" that can be utilized in factories and logistics warehouses.
- Mechanical Design
- Entrance and exit control system
Centralized management of endpoint security for all hosts within the corporate network.
- Virus software
Free Q&A giveaway! We are answering questions about the bicycle parking system in a Q&A format!
- Other security
- others
We prevent the leakage of important data through secure data deletion.
- Other contract services
- Data Erasing
Access control to various products and services utilizing the advantages of hand dorsal vein authentication.
- Other security
Fast and simple operation! Anyone can easily manage it with a PC and a tag reader at hand.
- Entrance and exit control system
- Other core systems
- Other information systems
Manage periodic usage data all in one device! It is also possible to output various data in analysis graphs!
- Other security and surveillance systems
- Other security
This is the access control system catalog of the video surveillance system/camera manufacturer GeoVision.
- Surveillance Cameras
- Surveillance Camera System
- Entrance and exit control system
Start high-reliability security with ART's next-generation electric lock control panel!
- Other security
Prevent information leakage from smartphone and tablet terminals!
- Server monitoring and network management tools
- Other operation management software
- Other security
Real-time display of entry and exit status on a computer! It allows for efficient cleaning and other tasks at low cost, simply and in a space-saving manner.
- Entrance and exit control system
A next-generation form of watching over your loved ones 24 hours a day.
- Surveillance Cameras
- Surveillance Camera System
- Personal authentication
H.265 compatible! Easy monitoring of network cameras!
- Surveillance Camera System
- Entrance and exit control system
- Other security and surveillance systems
Email archiving software adopted by over 35,000 companies worldwide! Bulk archive past emails imported to client devices before implementation!
- Email/Fax transmission
- Data Search Software
- Other security