List of Safety features products
- classification:Safety features
2926~2970 item / All 3247 items
Connected ZigBee! A system that can locate tags.
- Other security
- Other information systems
Since it uses dry batteries, it can be installed anywhere! Easy management with the master number.
- Other security
- Other safety and hygiene products
A fireproof safe that can only be opened by me.
- Other safety and hygiene products
- Personal authentication
A must-read for those concerned about the leakage of technical information! How can file encryption prevent information leaks such as CAD and drawings? Measures in China are also included.
- Other security and surveillance systems
- Other security
- Encryption and authentication
Unified management of PCs worldwide on a common platform! Global information security management solution.
- Software (middle, driver, security, etc.)
- Other security
Security management for 20 blocks of private areas and 5 areas of common areas is possible!
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
A site where you cannot afford to mistake the opponent! A facial recognition-based identity verification system.
- Personal authentication
- Entrance and exit control system
- Circuit board design and manufacturing
A wandering monitoring system using RFID technology! Preventing missing persons and traffic accidents before they happen!
- Entrance and exit control system
No worries about key management, loss, theft, or duplication. Fingerprint authentication mailbox.
- Personal authentication
- Encryption and authentication
Visualize dispersed information! A software solution for data leak prevention that enables automatic detection and protection of confidential data.
- filtering
- Encryption and authentication
- Other security
One device can connect up to 50 clients! By simply connecting to the existing network, it protects your internal IT equipment and information from cyber attacks!
- Firewall and intrusion prevention
No special operations are required for encryption! The file size does not increase and does not become heavy even when encrypted. Achieve stress-free without any hassle.
- Encryption and authentication
Compatible with various Windows applications, including CAD/CAM systems!
- Encryption and authentication
Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leak prevention through powerful violation control and logging at the kernel level.
- Other security
Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leakage prevention through powerful violation control and logging performed at the kern...
- Other security
Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leakage prevention through powerful violation control and logging at the kernel level.
- Other security
Automatically encrypt files and manage the entire process from creation and sending to deletion! This product can be used in China without the need to apply for local usage permits.
- Encryption and authentication
Thorough control, perfect recording, and meticulous auditing! Information security endpoint management system.
- Software (middle, driver, security, etc.)
- Other security
Protect confidential documents, strengthen information security, and enhance market competitiveness!
- Software (middle, driver, security, etc.)
- Other security
●No unnecessary operations required! ●Compatible with various CAD/CAM applications! ●PC operation won't slow down! ●Available for use in China!
- Encryption and authentication
Recommended for identification cards such as employee IDs and student IDs.
- Printer
- Entrance and exit control system
- Personal authentication
Recommended for ID cards such as employee IDs and student IDs, as well as membership cards.
- Printer
- Entrance and exit control system
- Personal authentication
Recommended for identification cards such as employee IDs and student IDs, as well as membership cards.
- Printer
- Entrance and exit control system
- Personal authentication
We will solve the issues of information leakage measures and ID management.
- Encryption and authentication
- Firewall and intrusion prevention
- Personal authentication
By utilizing a search function called "index technique," fast fingerprint matching is achieved.
- Personal authentication
- Other security and surveillance systems
Achieve convenient and reliable personal authentication! A fingerprint authentication solution certified by the U.S. government.
- Personal authentication
FBI Mobile ID FAP20 compliant, India STQC certified fingerprint authentication device.
- Personal authentication
Zinc die casting has better fluidity compared to aluminum and magnesium, making it less likely to produce burrs! It is ideal for cylinders, joints, and industrial handles.
- Other security
- Encryption and authentication
The trial version of the fully functional SWANStor Server PRO EX2.0J is available for free for approximately 30 days based on the terms of use!
- Other security
- Other information systems
- Encryption and authentication
Protecting data with secure encryption solutions from the cloud to client PCs.
- Other security
- Other information systems
- Encryption and authentication
Simplify check-in and check-out! Compatible with a feature that turns mobile devices into room keys.
- others
- Other security
Streamline hotel management operations! Integration with mobile key features for a comfortable stay for guests.
- others
- Other security
A secure remote access platform that provides various security features!
- Other security
- Other information systems
- Encryption and authentication
Detailed explanation of the basics of security measures! Many countermeasure products are also featured.
- Virus software
- Other security
- Other information systems
A room entry and exit management system recognized by the world.
- Other PCs and OA equipment
- Entrance and exit control system
Improving security awareness and reducing the risk of malware infections! Targeted email training service.
- Other services
- Other security
A completely mechanical key storage box that can hold keys and cards!
- Other security
- Encryption and authentication
Automatic file encryption with easy operation! Compatible with various engineering applications!
- Encryption and authentication
Next-generation "leadership-type" information leakage prevention solution
- filtering
- Encryption and authentication
- Other security
Auto-lock system using finger vein authentication!
- Other security and surveillance systems
- Entrance and exit control system
- Personal authentication
[SystemAnswerG2 Introduction] Achieving visualization of performance and quality of critical infrastructure.
- Software (middle, driver, security, etc.)
- Other security
- Other services
[SystemAnswerG2 Introduction] Improving Service Levels in Comprehensive Reuse Business
- Software (middle, driver, security, etc.)
- Other security
- Server monitoring and network management tools
[SystemAnswerG2 Introduction] Achieve effective operational improvements and fault isolation!
- Software (middle, driver, security, etc.)
- Other security
【SystemAnswerG2 Introduction】Centralized monitoring of internal infrastructure! Reduction of operational workload.
- Software (middle, driver, security, etc.)
- Other security
By implementing powerful violation control and logging at the kernel level, we achieve comprehensive measures against information leakage.
- Other security