List of Safety features products
- classification:Safety features
481~540 item / All 3369 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
A leading company in access security and safety certification systems.
- Entrance and exit control system
- RFID/IC tags
- Personal authentication
*Video now available. Easy installation and quick setup. We will provide operational support. We can build specifications that suit your company with a wide variety of options.*
- Entrance and exit control system
- Other security and surveillance systems
It warns of a 'dangerous' situation when heavy machinery like forklifts gets too close to people.
- Safety Sensors
- IC tag
- Other security
Eliminate unnecessary opening and closing, reducing the number of times the seat shutter opens and closes by up to 90%! Introducing the seat shutter opening and closing eco system!
The eco system for opening and closing sheet shutters, utilizing W Alert technology, automatically detects only authorized vehicles (such as forklifts, AGVs, and carts) and operators, controlling the sheet shutters. By reducing unnecessary openings and closings, it enhances air conditioning efficiency, reduces energy costs, improves the work environment, and simultaneously contributes to the SDGs through the reduction of greenhouse gas emissions. *For more details, please contact us for confirmation.*
Improve security and safety while reducing the hassle of operational management and authentication! An access control system that prevents unauthorized entry while allowing awareness of those inside.
- others
- Entrance and exit control system
- Area Sensor
Leave everything from threat detection to response to us. Professionals will protect your security. [Campaign ongoing & technical explanation materials available for free.]
- Other security
Before and during operation──a diagnostic service for safely evolving smartphone applications.
- Other security
- Firewall and intrusion prevention
Visualizing API-specific risks with high precision based on international standards through a hybrid diagnosis of tools and manual methods.
- Other security
- Firewall and intrusion prevention
From the attacker's perspective, we will conduct a multifaceted assessment of whether the publicly available environment of the website is in a state where "valuable information can be collected."
- Other security
- Firewall and intrusion prevention
Ministry of Economy, Trade and Industry Registered Service × Expert Diagnosis × Ongoing Support" Platform Diagnosis that "Doesn't End with Discovery
- Other security
- Firewall and intrusion prevention
"Ministry of Economy, Trade and Industry registered services × Expert diagnosis × Ongoing support" Total support for visualizing, improving, and maintaining web application security.
- Other security
- Firewall and intrusion prevention
Enhancing web security through vulnerability assessments certified by the Ministry of Economy, Trade and Industry, regardless of industry or size.
- Other security
- Firewall and intrusion prevention
Functions as a secure gateway between onboard equipment and external services, ensuring protection and seamless connectivity!
- Other security
- Routers, Switches, and Hubs
Notice of Participation in Bariship 2025
We are pleased to inform you that we will be exhibiting at "BariShip 2025," which will be held from May 22 (Thursday) to May 24 (Saturday), 2025, at Technoport Imabari and other locations. ● Exhibition: BariShip 2025 ● Date: May 22 (Thursday) to May 24 (Saturday), 2025, from 10:00 AM to 5:00 PM (until 4:00 PM on the final day) ● Location: Technoport Imabari and others, 5-14-3 Higashimon-cho, Imabari City, Ehime Prefecture ● Exhibitor Name: MCM Japan Co., Ltd. ● Booth Number: B-63 (Zone B, Technoport Imabari) ● Exhibited Products: Security solutions compliant with IACS UR E26/27 ■ Robustel's Cybersecurity Gateway for Vessels (MG460) ■ Veinland's Cybersecurity Switch for Vessels (LAN24CH) ● Exhibitor Seminar: May 23 (Friday) from 4:20 PM to 4:50 PM, Seminar Room A (2nd Floor, Technoport Imabari) ■ S-218: Security solutions compliant with IACS UR E26/27
"Don't miss disaster information, heatstroke warnings, and emergency information emails!" Alerts anywhere via Wi-Fi | Important email notification system for schools and public facilities.
- Other environmental equipment
- Other security
- Data Logger
Immediate response to the "Heat Stroke Warning Alert"! Urgent proposal of heat stroke prevention products that can be used on-site right now.
In response to the "Special Heat Stroke Warning Alert" and the "Mandatory Heat Stroke Measures" that began full-scale operation in June 2025, we are reintroducing our IoT heat stroke countermeasure solutions. The target products are the three series: "Meru Maru-kun + Heat Stroke Alert," "Miharukun PRO," and "Momoko and Ayaka." With this system revision, heat stroke measures have changed from "effort obligations" to "obligations" for all businesses employing workers. As measures are required across all industries and sites, including government agencies, educational institutions, welfare facilities, distribution, and construction, ISA supports the creation of a safe and secure environment through existing products that can be operated immediately. ■ Introduction of three heat stroke countermeasure products (1) Meru Maru-kun + Heat Stroke Warning Alert Email Distribution Service (2) Miharukun PRO (WBGT compatible model) (3) Momoko and Ayaka Environmental Monitoring Solution (environmental monitoring, recording, alerts) ◆ Main industries and achievements of implementation Local governments (offices, evacuation centers, nurseries) Educational institutions (playgrounds, gymnasiums, classrooms) Medical and welfare facilities (nursing homes, disability support facilities) Distribution and construction industries (warehouses, job sites, delivery hubs) General companies (reception areas, warehouses, employee break rooms)
Introducing email threats that bypass gateway security!
- Other security
Easy unlocking with facial recognition! Next-generation IP auto-lock system.
- Other security and surveillance systems
- Entrance and exit control system
Centralized management of employee entry and exit using RFID. A reliable method leveraging DX achievements.
- Entrance and exit control system
- RFID related products and IC tag services
- RFID/IC tags
Packed with tips to improve production efficiency! We have released "30 Case Studies of DX Implementation in Logistics and Inventory Management"!
[Announcement of New Content] We have released "30 Selected Case Studies of DX Implementation in Logistics and Inventory Management"! To those struggling with operational efficiency and cost reduction―― We have published "30 Selected Case Studies of DX Implementation in Logistics and Inventory Management," filled with hints for improving production efficiency. This document clearly presents how actual companies have solved challenges and achieved results through DX (Digital Transformation). It is also packed with the latest trends in the manufacturing and logistics industries. Please make use of it as a reference for improving your company's operations!
Convenient for aggregating data from multiple locations, such as entry and exit data and stamp rallies!
- 2D Code Reader
- Entrance and exit control system
Good for the seller, good for the buyer, good for society! Our simple entry and exit management records have received positive feedback.
- 2D Code Reader
- Entrance and exit control system
For zone management within the facility! In addition to simple applications, it can also be linked with automatic doors and door locks.
- 2D Code Reader
- Other security
Integration with infrared body temperature measurement is also possible! It contributes to improving productivity in event operations.
- 2D Code Reader
- Personal authentication
You can clearly understand the flow of people and goods! It can be used for various purposes such as regional tourism and revitalization of local shopping districts.
- 2D Code Reader
- Entrance and exit control system
Supports both QR codes and FeliCa! Widely applicable for attendance management and entry management.
- 2D Code Reader
- Entrance and exit control system
Effective for preventing ticket resale! In addition to the information in a standard two-dimensional code, hidden characters can be included.
- 2D Code Reader
- Other security
- Encryption and authentication
Data transfer in a network-isolated environment as an alternative to USB memory.
- Data Erasing
Targeted OT networks. How to protect the "invisible areas" of the manufacturing site.
- Firewall and intrusion prevention
- Other security
Implementing internal risk measures such as information leakage and internal misconduct through behavioral analysis! A new corporate risk management approach to prevent risks before they occur.
- Server monitoring and network management tools
- Other security
- Entrance and exit control system
Explaining the specific settings for the screensaver and points to be aware of during the setup!
- Other security
Explaining the high probability of successful unauthorized access known as "trashing"!
- Other security
I will explain in detail the measures that cloud server administrators should take!
- Other security
Points for maintaining a safe internet environment! An explanation of the types and risks when not used properly.
- Other security
A detailed explanation of definitions, types, and countermeasures. This is useful information for those using IT equipment in the workplace.
- Other security
It is possible to compile a summary of each employee's clock-in and clock-out times and breakdown of work hours necessary for management!
- Entrance and exit control system
Would you like to prepare for compliance with the Cyber Resilience Act using 'Black Duck SCA', which supports OSS risk management and SBOM creation?
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
The weather-resistant and waterproof permanent adhesive seal that can be used outdoors allows for the management of outdoor equipment, materials, and assets.
- Other security
- label
- Packaging materials
Achieving faster and smarter investigations: "CCL Digital Forensic Software"
- Other security
[Free trial set available!] A USB dongle for license authentication that protects software and prevents unauthorized copying.
- Encryption and authentication
- Software (middle, driver, security, etc.)
We will exhibit at Hannover Messe 2025 and showcase technologies that comply with the new EU cyber resilience regulations.
Wibu-Systems will showcase its comprehensive CRA-compliant solutions at the exhibition venue. - Protection of software and data integrity The CodeMeter Protection Suite provides a comprehensive security framework equipped with encryption and obfuscation technologies, integrity checks, anti-debugging features, and tamper resistance mechanisms. - Secure authentication The CodeMeter API features encryption technologies such as symmetric and asymmetric encryption and digital signature procedures, enabling seamless integration with digital products and protection against tampering. - Compliance-oriented licensing CodeMeter License Central is a database-based licensing and entitlement management solution that automates the processes of license creation, distribution, and management. This allows for tracking software usage, managing compliance, and conducting software recalls when necessary. Additionally, the handling of personal information and business data complies with the principle of "data minimization."
A useful tool for protecting and encrypting Python applications that are easily decipherable by third parties due to being interpreted.
- Software (middle, driver, security, etc.)
- Encryption and authentication
- Other image-related equipment
We will exhibit at Hannover Messe 2025 and showcase technologies that comply with the new EU cyber resilience regulations.
Wibu-Systems will showcase its comprehensive CRA-compliant solutions at the exhibition venue. - Protection of software and data integrity The CodeMeter Protection Suite provides a comprehensive security framework equipped with encryption and obfuscation technologies, integrity checks, anti-debugging features, and tamper resistance mechanisms. - Secure authentication The CodeMeter API features encryption technologies such as symmetric and asymmetric encryption and digital signature procedures, enabling seamless integration with digital products and protection against tampering. - Compliance-oriented licensing CodeMeter License Central is a database-based licensing and entitlement management solution that automates the processes of license creation, distribution, and management. This allows for tracking software usage, managing compliance, and conducting software recalls when necessary. Additionally, the handling of personal information and business data complies with the principle of "data minimization."
★ High-performance demodulation processing device. Optimal for long-range pseudo-spread spectrum codes that are difficult with IC/LSI! An option to enhance secure communication.
- Personal authentication
"Technical documentation for transmitting images via radio waves" now available all at once!
★ We are releasing a wealth of technical information that includes experience and know-how related to radio laws, antennas, transmitters and receivers, installation, etc., when transmitting video via radio waves. A must-read for all stakeholders! ● When transmitting video via radio waves, we provide a clear explanation of legal considerations, antenna selection, performance evaluation of transmitters and receivers, the latest digital wireless technologies, and installation precautions. ● In explaining video transmission via wireless, we aim to avoid using formulas as much as possible, instead providing clear explanations through text and photos that are easier to understand than formulas. This is essential reading for researchers and salespeople involved in radio operations! ● The author has been involved in wireless operations for 30 years and explains the know-how gained from experience in research, design, manufacturing, and on-site installation in an easily understandable manner within limited pages. ● As we are in an era of energy conservation and efficiency, we hope you will utilize this material to review products related to wireless equipment. ● Considering various individuals engaged in wireless-related fields, we have tried to explain things with minimal use of formulas. We hope this can serve as a helpful resource for enhancing everyone's knowledge.
Monitoring the number of people in a specific area at low cost! What are the benefits of understanding the number of people?
- Other security
Eliminating the need for applying to take out digital cameras and transferring data to PCs increases work efficiency!
- Other security
- Image Transmission Equipment
Installing network infrastructure to support complex digital video transmission at each subway station!
- Routers, Switches, and Hubs
- Other security
- Firewall and intrusion prevention
Security diagnosis to prevent cyber attacks.
- Firewall and intrusion prevention
We would like to introduce a case where the speed of information sharing within the company has significantly improved, allowing us to thoroughly implement the rules for handling shooting data!
- Other security
Safe and secure to use even for telework! Prevents information leaks in advance and strengthens your business.
- Other security
No data is left on the device! Even if the device is lost, it can prevent the risk of information leakage.
- Other security
A magical solution where the encrypted file can be "deleted later"! For companies and organizations considering measures against information leakage!
- Data Erasing
Equipped with antivirus, firewall, and IPS in a palm-sized chassis. It defends the gateway to the internet with powerful security features.
- Firewall and intrusion prevention
[Notice of Start of Handling] Palm-sized All-in-One Security "SG-ONE"
We are pleased to announce that Aisel Co., Ltd. has started handling the UTM (Unified Threat Management) device "OCH SG-ONE," which is perfectly suited for customers who want to quickly secure their internet gateway but have an unknown number of devices to manage. **Features of SG-ONE** Compact design: No trouble finding a place to install it even in tight spaces! Create a secure environment on the go! Super easy setup and installation: Just connect it to your router and it's ready in 5 minutes! Suitable for companies without an IT administrator! All-in-one security that protects various aspects: Equipped with multiple powerful security features including antivirus, firewall, and IPS! Are you still feeling uneasy about your company's internet environment? With this one device, you can eliminate all remaining concerns at once!
From security measures to disaster preparedness, we deliver "peace of mind" in any environment!
- Other security