List of Safety features products
- classification:Safety features
1861~1920 item / All 3393 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Made-to-order product. Equipped with solar panels. This is a low-cost type of solar power device that does not require commercial power supply. Security cameras are optional.
- Other security
Made-to-order product. No commercial power supply required. It is a low-cost type of mobile solar power device. Security cameras are optional.
- Other security
Just hold up the QR code. Super fast check-in at the unmanned reception! Leave the reception duties to the "DXer RD-370B."
- Entrance and exit control system
DX for accommodation facilities! Branding for safety! Room key card cleaner & infection prevention certification mark acquisition Summer mega campaign!!
The "CL-76 Series Room Key Card Cleaner" is a product that automatically disinfects and sanitizes room key cards at a low cost. It can help address significant future challenges and issues, such as the time required for hand-wiping room key cards and skin irritation caused by hand-wiping (one source of infection). This campaign is particularly relevant in the current situation, so we encourage you to consider it. Additionally, we can also propose obtaining the infection prevention certification mark [GBAC STAR]. Please feel free to reach out. [Infection Prevention Certification Mark: GBAC STAR] Many inbound visitors prioritize the presence of an infection prevention certification mark when using facilities. In the future, there will be days when accommodation booking sites will allow searches based on the presence of this certification mark. Why not obtain the infection prevention certification mark at a low cost in preparation for that day? (The card cleaner can also assist in obtaining the certification!) As a customer attraction strategy for the with-COVID and post-COVID era, let’s establish a brand of safety! Please consult with us.
Identify security vulnerabilities in source code! Reduce the risk of data leaks.
- Software (middle, driver, security, etc.)
- Other security
- Other services
We will identify vulnerabilities lurking in access management, authentication controls, and known configuration mistakes!
- Software (middle, driver, security, etc.)
- Other security
- Other services
Attempt to attack the target application and uncover hidden vulnerabilities!
- Software (middle, driver, security, etc.)
- Other security
- Other services
Identifying vulnerabilities that have a significant impact on business! We deliver high-value test results.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Two depths are available! You can choose the appropriate test level according to your risk profile.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Reduce the risk of data leaks! We have resources that can quickly respond to changes in scale.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Support for compliance with security and regulations! Experience immersive continuous learning.
- Software (middle, driver, security, etc.)
- Other security
- Distance learning/E-learning
Addressing software risks lurking in various places! Accelerating the delivery of secure and high-quality code.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Total support for application security from development to deployment!
- Software (middle, driver, security, etc.)
- Other security
Manage all test execution, policy application, prioritization of issues, and filtering!
- Software (middle, driver, security, etc.)
- Other security
Establish security and compliance as part of the normal business process!
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
You can quickly identify and fix critical security and quality issues while coding!
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Introducing a solution to detect and fix security vulnerabilities during coding!
- Software (middle, driver, security, etc.)
- Other security
Diagnosing software risks throughout the SDLC with a single record system for AppSec data!
- Software (middle, driver, security, etc.)
- Other security
We enable comprehensive open-source risk management regardless of your company's size or budget!
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Identify software security vulnerabilities! This enables informed and reliable decision-making based on information.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Manage risks related to security, licensing, and code quality! Introduction to SCA solutions.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Identify and exploit critical vulnerabilities for business to reduce the risk of leaks!
- Software (middle, driver, security, etc.)
- Other security
Accurately identify and verify vulnerabilities! You can grasp the URL detection and coverage of web applications at a glance.
- Other security
- Software (middle, driver, security, etc.)
- Other security and surveillance systems
To prevent the sharing of confidential information with the server, the risk of password leakage is zero! Peace of mind with international security standards.
- Encryption and authentication
Protecting logon to PC terminals with enhanced security! Reducing operational burden when using USB keys.
- Encryption and authentication
- Other security
Prevent information leaks caused by human error! This is a product that achieves cost performance.
- Encryption and authentication
- Other security
Password-free fingerprint authentication device! Next-generation authentication that balances security and convenience.
- Encryption and authentication
Prevent fraud with enhanced authentication! It is possible to integrate with various authentication solutions compliant with PKI.
- Encryption and authentication
Easily add one-time password authentication to existing systems! Strengthen the authentication of your company's web services.
- Encryption and authentication
A USB dongle that achieves overwhelming cost performance!
- Other security
Compliant with OATH's TOTP (Time-based One-time Password Algorithm)!
- Encryption and authentication
"Cloud Authentication Service" that allows you to choose from multiple authentication methods.
- Encryption and authentication
Authentication that balances security and convenience! Towards a world without passwords with easier and stronger authentication!
- Encryption and authentication
Static analysis (SAST) solutions by industry leaders. Quickly identify and fix security and quality issues during coding.
- Other security
When not in use, disconnect it! Simply turn the key to cut off the connection, making it easy to manage the LAN cable connection!
- Other security
Protect your laptop with a U-shaped bracket! You can use it in its normal form by removing the bracket!
- Other security
Close the ports for DVD and USB connections! It is also effective in maintaining a defensive posture when in use!
- Other security
Eliminate the anxiety of an unmanned factory at night! In case of fire, illegal intrusion, or abnormalities in important equipment, we will issue an emergency alert! LINE integration is now possible!
- Other security and surveillance systems
- Other security
Ideal for objectively recording employee entry and exit times in work style reform with hands-free operation!
- Entrance and exit control system
By centrally managing vehicle entry and exit, including passengers, as well as pedestrian entry and exit, we will enhance security, simplify reception duties, and alleviate congestion.
- Other security
Deterrence and prevention through restraint! Differences from the actual item can be judged for authenticity with the naked eye or simple devices.
- Other security
- Printing/Publishing
- others
Reasonable price and durability! Lockout is possible in a wide range of scenes! It is expected to have a significant effect on improving safety in the work environment.
- Other security
- Other security and surveillance systems
- Other safety and hygiene products
Since it is a resin-made padlock, it ensures a safer working environment without the worry of sparks or electrical conduction. It is an OSHA-compliant product with excellent corrosion resistance and n...
- Other security
- Other security and surveillance systems
- Other safety and hygiene products
Easy procedures with RFID tags! Usage history is automatically created, and the lending status is clear at a glance!
- Personnel and Labor
- IC tag reader/writer
- Personal authentication
Easy and simple cloud-based attendance and schedule management system.
- Entrance and exit control system
Windows login enters the passwordless era! Protected with advanced security.
- Encryption and authentication
- Other security
Vehicle number authentication using surveillance cameras (network cameras) in the art entry and exit management system.
- Entrance and exit control system
All-in-one security solution that integrates all features.
- filtering
- Firewall and intrusion prevention
- Encryption and authentication
Prevent human errors and significantly reduce operational burdens! Logs will record who did what and when.
- Data Erasing
- Document and Data Management
High security with low operational load! Introducing a very powerful and user-friendly solution!
- Other security
- Other operation management software
Face recognition entry and exit management system 'MB301 6-door IN/OUT, 12 units installed'
- Entrance and exit control system
Face Recognition Entry and Exit Management System 'MB-301-F Outdoor Installation'
- Entrance and exit control system
The latest AI facial recognition access control system rapidly authenticates users' facial information and body surface temperature measurements, successfully achieving downsizing.
- Entrance and exit control system
Centralized management of multiple gates! It is also possible to configure a large-scale system that manages between locations.
- Personal authentication
A wide range of highly scalable AI facial recognition terminals available!
- Entrance and exit control system
Introduction of a case where a camera + AI solution was built to inform in real-time about the office congestion status.
- Entrance and exit control system
- Other security
- others
Let's strengthen the company's information security measures by implementing UTM and firewalls.
- filtering
- Firewall and intrusion prevention
- Other PCs and OA equipment
A whitelist with no loopholes shuts out viruses and malicious software!
- Other security
Measures for proper device operation! Elimination of personal USB memory devices, etc. / Support for individual management of company USB memory devices.
- filtering
- Other security
Thorough measures against information leaks! Complete management of all removable media and device access.
- filtering
- Other security