List of Safety features products
- classification:Safety features
406~450 item / All 3246 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Solving various challenges in SBOM and vulnerability management!
- Other security
Frictionless IDS/IPS that eliminates the need for large-scale renovations of the entire system!
- Other security
We will quickly and reliably build the optimal cloud environment for your business and provide a secure IT infrastructure.
- Integrated operation management
- Other security
Add "advanced malware protection features" and "remote device management capabilities" to the backup!
- Other security
It is now possible to manage the patch application targets, timing, and frequency in detail based on the policy!
- Other security
By being able to prioritize effectively for patching work and focus only on what is important, operational efficiency is further improved!
- Other security
A lineup of seven types of products, including a workspace for IT analysts (device status, remote control)!
- Integrated operation management
- Other security
Utilizing Intercept X technology! An advanced endpoint security solution powered by AI.
- Other security
Prevent security breaches, ransomware, and data leaks!
- Other security
Identify high-risk users based on web browsing history and ATP trigger counts using the user threat index!
- Other security
Features beyond the firewall! Automatic adjustment to active adversaries and responses to attacks.
- Other security
Rated by G2 users as the top-level firewall solution!
- Other security
The ultimate weapon against ransomware! Experience simulated email attacks to raise employee awareness.
- ISO-related consultant
- Other security
- Distance learning/E-learning
Compact and highly flexible! Consistently accurate reading of ID documents is possible.
- Encryption and authentication
We provide a total solution from marketing and sales proposals!
- Software (middle, driver, security, etc.)
- Other security
- others
One-stop solution for unauthorized login issues! A SaaS-based one-stop security service that also prevents fraudulent registrations, transactions, and transfers by bots.
- Other security
- Software (middle, driver, security, etc.)
- Other security and surveillance systems
AI-driven EDR "Xcockpit Endpoint" achieving high speed and high precision.
- Firewall and intrusion prevention
Introduced to the Security Operation Center (SOC) of the Bangladesh Army!
- Other security
With the spread of networks, cyber attacks are evolving and becoming more sophisticated every day. Antivirus software alone can no longer protect you! First, let's consult!
- Other security
- Software (middle, driver, security, etc.)
- Other security and surveillance systems
Easily authenticate users of your company's official app to streamline and enhance efficiency at the reception, and securely log in to store terminals.
- Personal authentication
Is Excel management outdated? Transforming outsourced risk management with SaaS for digital transformation!
- Other security
Case studies and data revealed! 66% have experienced incidents at subcontractors in the past five years - Considering subcontractor risk measures from the perspectives of ISO and P Mark.
Overview In this webinar, an ISO consultant will explain why it is necessary to consider outsourcing risk management now, using case studies. Additionally, we will present the results of a survey conducted with 300 personnel responsible for vendor management, highlighting how various companies are currently managing their vendors and the challenges they face. Content 〇 Outsourcing Risk Management from the Perspective of ISO and Privacy Mark - Examples of issues arising from vendors - The importance of vendor management in ISO and Privacy Mark - Methods for vendor management 〇 Current Status and Challenges of Outsourcing Risk Management as Revealed by Survey Results - Current state of outsourcing risk management - Challenges in outsourcing risk management 〇 Q&A *Please note that the program is subject to change without notice.
We provide assistance with electromagnetic wave shielding construction (radio wave shielding construction) in various fields.
- IC tag
- Magnetic field analysis/electromagnetic wave analysis
- Other security
Cybersecurity gateway for ships compliant with IEC61162-460 (3rd edition) and IEC60945 standards.
- Other security
Notice of Participation in Bariship 2025
We are pleased to inform you that we will be exhibiting at "BariShip 2025," which will be held from May 22 (Thursday) to May 24 (Saturday), 2025, at Technoport Imabari and other locations. ● Exhibition: BariShip 2025 ● Date: May 22 (Thursday) to May 24 (Saturday), 2025, from 10:00 AM to 5:00 PM (until 4:00 PM on the final day) ● Location: Technoport Imabari and others, 5-14-3 Higashimon-cho, Imabari City, Ehime Prefecture ● Exhibitor Name: MCM Japan Co., Ltd. ● Booth Number: B-63 (Zone B, Technoport Imabari) ● Exhibited Products: Security solutions compliant with IACS UR E26/27 ■ Robustel's Cybersecurity Gateway for Vessels (MG460) ■ Veinland's Cybersecurity Switch for Vessels (LAN24CH) ● Exhibitor Seminar: May 23 (Friday) from 4:20 PM to 4:50 PM, Seminar Room A (2nd Floor, Technoport Imabari) ■ S-218: Security solutions compliant with IACS UR E26/27
A development kit that can build a high-security environment with ID cards and facial recognition. "KAOKEY" can establish a new environment for two-factor authentication.
- Entrance and exit control system
Software for preventing email misdelivery and encryption
- Other security
- Email/Fax transmission
Industry's smallest class network AI camera, domestic surveillance camera share No. 1, edge recording type affordable cloud service.
- Entrance and exit control system
By displaying people in a stick figure format, it enables privacy-conscious monitoring and surveillance! Fall detection, prohibited area intrusion detection, SOS detection, and more.
- Other security
Understand the on-site situation appropriately and in a timely manner! No need for power or communication environment! Remote monitoring from anywhere! Easy to carry with a dedicated case!
- Other security
Is the security of the company/factory foolproof? Not only the entrances and exits to prevent external intrusions, but also visualizing when? who? where?
- Entrance and exit control system
We will also introduce an overview of personal information leaks, how to respond when a leak occurs, and preventive measures!
- Other security
We will introduce the process for applying for P mark renewal, the necessary documents, the time required until renewal, and the renewal costs!
- Other security
We will introduce what ISMS is and what benefits it has!
- Other security
We will also introduce the aspects to be careful about when building and operating an ISMS!
- Other security
Information security personnel should keep this in mind! A summary and explanation of the basics of security.
- Other security
Outstanding security professionals are on top of it! Introducing increasingly sophisticated cyber attacks and case studies of damage.
- Virus software
Ransomware, Emotet, targeted attacks, etc.! Solutions for increasingly sophisticated and complex cyber attacks.
- Firewall and intrusion prevention
With the shift to remote work, we would like to review! Introducing key points of employee training with explanations.
- Other security