List of Safety features products
- classification:Safety features
3331~3375 item / All 3671 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
Product unboxing verification, unpacking detection, prevention of tampering and removal.
- Other security
- label
- Packaging materials
Matte silver finish, tamper-evident seal, tamper-proof, safety confirmation.
- Other security
- label
- Packaging materials
Detection of cardboard box unpacking and prevention of tampering and removal.
- Other security
- Adhesive tape
- Packaging materials
The applied product has a tamper-evident seal that leaves no markings (only the label retains markings).
- Other security
- Office supplies and stationery
- Other packaging materials
A security system that captures images with an infrared CCD camera and completes personal authentication!
- Image Processing Equipment
- Personal authentication
Enhancing functional safety and security measures! Strong support for risk-based design.
- Other security and surveillance systems
- Other security
Ensuring reliable safety and peace of mind for your ICT assets.
- Other services
- Other security
Remote control lock recommended by the Tokyo Crime Prevention Association!
- Other security
- Remote Control
We will propose equipment management measures based on the current situation analysis.
- Entrance and exit control system
- Other security
IoT-compatible network camera, capable of receiving physical signal packets and transmitting signals through the genuine IO module. The camera becomes an IoT device.
- Surveillance Camera System
- Personal authentication
- Other operation management software
A trial kit for easily visualizing the environment! Make your usual site "visible."
- Surveillance Camera System
- Other security and surveillance systems
- Other security
Harnessing the wisdom of the Warring States period for the power of control system defense.
- Other security
- filtering
No need for contact with the reader, making it less prone to damage! Introduction to non-contact IC cards.
- Other production management systems
- Entrance and exit control system
- Other semiconductors
Improve repeat purchase rates with original IC tags! We offer a wide range of options.
- IC tag
- Other production management systems
- Entrance and exit control system
A detailed explanation of the usage of our NFC products! For payment functions, promotions, entry and exit, and more.
- IC tag
- Other production management systems
- Entrance and exit control system
We will assist in strengthening security in response to the diversification and intensification of crime.
- Other security and surveillance systems
- Other security
- Surveillance Camera System
Face recognition compatible AI deep learning IP camera series
- Other security
- Routers, Switches, and Hubs
- Surveillance Camera System
Face recognition compatible AI deep learning IP camera series
- Other security
- Routers, Switches, and Hubs
- Surveillance Camera System
To those who want to effectively manage various LAN-connected devices while increasing customer satisfaction and improving their own efficiency.
- Other security
- Routers, Switches, and Hubs
- Surveillance Camera System
To those who want to effectively manage various LAN-connected devices while increasing customer satisfaction and improving their own efficiency.
- Other security
- Routers, Switches, and Hubs
- Surveillance Camera System
Connected ZigBee! A system that can locate tags.
- Other security
- Other information systems
Since it uses dry batteries, it can be installed anywhere! Easy management with the master number.
- Other security
- Other safety and hygiene products
A fireproof safe that can only be opened by me.
- Other safety and hygiene products
- Personal authentication
A must-read for those concerned about the leakage of technical information! How can file encryption prevent information leaks such as CAD and drawings? Measures in China are also included.
- Other security and surveillance systems
- Other security
- Encryption and authentication
Unified management of PCs worldwide on a common platform! Global information security management solution.
- Software (middle, driver, security, etc.)
- Other security
Security management for 20 blocks of private areas and 5 areas of common areas is possible!
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
A site where you cannot afford to mistake the opponent! A facial recognition-based identity verification system.
- Personal authentication
- Entrance and exit control system
- Circuit board design and manufacturing
A wandering monitoring system using RFID technology! Preventing missing persons and traffic accidents before they happen!
- Entrance and exit control system
No worries about key management, loss, theft, or duplication. Fingerprint authentication mailbox.
- Personal authentication
- Encryption and authentication
Visualize dispersed information! A software solution for data leak prevention that enables automatic detection and protection of confidential data.
- filtering
- Encryption and authentication
- Other security
One device can connect up to 50 clients! By simply connecting to the existing network, it protects your internal IT equipment and information from cyber attacks!
- Firewall and intrusion prevention
No special operations are required for encryption! The file size does not increase and does not become heavy even when encrypted. Achieve stress-free without any hassle.
- Encryption and authentication
Compatible with various Windows applications, including CAD/CAM systems!
- Encryption and authentication
Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leak prevention through powerful violation control and logging at the kernel level.
- Other security
Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leakage prevention through powerful violation control and logging performed at the kern...
- Other security
Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leakage prevention through powerful violation control and logging at the kernel level.
- Other security
Automatically encrypt files and manage the entire process from creation and sending to deletion! This product can be used in China without the need to apply for local usage permits.
- Encryption and authentication
Thorough control, perfect recording, and meticulous auditing! Information security endpoint management system.
- Software (middle, driver, security, etc.)
- Other security
Protect confidential documents, strengthen information security, and enhance market competitiveness!
- Software (middle, driver, security, etc.)
- Other security
●No unnecessary operations required! ●Compatible with various CAD/CAM applications! ●PC operation won't slow down! ●Available for use in China!
- Encryption and authentication
Recommended for identification cards such as employee IDs and student IDs.
- Printer
- Entrance and exit control system
- Personal authentication
Recommended for ID cards such as employee IDs and student IDs, as well as membership cards.
- Printer
- Entrance and exit control system
- Personal authentication
Recommended for identification cards such as employee IDs and student IDs, as well as membership cards.
- Printer
- Entrance and exit control system
- Personal authentication
We will solve the issues of information leakage measures and ID management.
- Encryption and authentication
- Firewall and intrusion prevention
- Personal authentication
By utilizing a search function called "index technique," fast fingerprint matching is achieved.
- Personal authentication
- Other security and surveillance systems