List of Safety features products
- classification:Safety features
271~315 item / All 3246 items
Compact and highly flexible! Consistently accurate reading of ID documents is possible.
- Encryption and authentication
AI-driven EDR "Xcockpit Endpoint" achieving high speed and high precision.
- Firewall and intrusion prevention
A leading company in access security and safety certification systems.
- Entrance and exit control system
- Scanner
- Personal authentication
Introduced to the Security Operation Center (SOC) of the Bangladesh Army!
- Other security
With the spread of networks, cyber attacks are evolving and becoming more sophisticated every day. Antivirus software alone can no longer protect you! First, let's consult!
- Other security
- Software (middle, driver, security, etc.)
- Other security and surveillance systems
Easily authenticate users of your company's official app to streamline and enhance efficiency at the reception, and securely log in to store terminals.
- Personal authentication
Is Excel management outdated? Transforming outsourced risk management with SaaS for digital transformation!
- Other security

Case studies and data revealed! 66% have experienced incidents at subcontractors in the past five years - Considering subcontractor risk measures from the perspectives of ISO and P Mark.
Overview In this webinar, an ISO consultant will explain why it is necessary to consider outsourcing risk management now, using case studies. Additionally, we will present the results of a survey conducted with 300 personnel responsible for vendor management, highlighting how various companies are currently managing their vendors and the challenges they face. Content 〇 Outsourcing Risk Management from the Perspective of ISO and Privacy Mark - Examples of issues arising from vendors - The importance of vendor management in ISO and Privacy Mark - Methods for vendor management 〇 Current Status and Challenges of Outsourcing Risk Management as Revealed by Survey Results - Current state of outsourcing risk management - Challenges in outsourcing risk management 〇 Q&A *Please note that the program is subject to change without notice.
A monitoring system that automatically detects entry and exit to facilities such as nursery schools, after-school care, tutoring centers, and day services, and sends LINE notifications to parents and ...
- Other information systems
- Entrance and exit control system
Advanced abandonment automatic detection system using sensors and wireless technology, equipped with vehicle departure/arrival notification function and operation management function.
- Other security
- Other information systems
- Entrance and exit control system
A development kit that can build a high-security environment with ID cards and facial recognition. "KAOKEY" can establish a new environment for two-factor authentication.
- Entrance and exit control system