List of Safety features products
- classification:Safety features
2026~2070 item / All 3242 items
Building security for Raspberry Pi with hardware approach using microSD and USB memory with built-in security features for industrial applications.
- Encryption and authentication
- Embedded Board Computers
- Other embedded systems (software and hardware)
Achieve a discreet and smart installation with embedded design! Up to 2000 users can be registered!!
- Other security
- Entrance and exit control system
Achieve a discreet and smart installation with embedded setup! Up to 3000 users can be registered!!
- Other security
- Entrance and exit control system
Just issue and register your own QR code! A popular QR code reader that can scan codes.
- Other security
- Entrance and exit control system
Just issue and register the QR code yourself! A popular QR code reader that can read QR codes.
- Other security
- Entrance and exit control system
Compact design handle lock! Easy to use during installation and storage!!
- Other security
Assisted GPS with over 1,000 continuous position searches and no need for charging for one month.
- Other security
There is no need to collect issued cards or arrange for spare cards, allowing for a reduction in the costs of modification work.
- Other security and surveillance systems
- Personal authentication
- Entrance and exit control system
IoT solution for safe remote maintenance of industrial PCs in factories.
- Other security
- Other network tools
[White Paper Available!] An analysis of the extent to which DMARC (Domain-based Message Authentication, Reporting & Conformance), a countermeasure against spoofing and security, is being adopted by in...
- Other security
Next-generation firewall-equipped, high-performance secure VPN center router suitable for large-scale networks.
- Routers, Switches, and Hubs
- VPN/Wide Area Ethernet
- Firewall and intrusion prevention

- Strengthening of security measures - Upgrading of UTM-enabled "NFV-APL series" and "AT-AR4000S-Cloud"
Allied Telesis, Inc. (Headquarters: Shinagawa-ku, Tokyo; Chairman: Sachie Oshima) has upgraded its NFV-APL series of products, which support gigabit connectivity, UTM, firewalls, and routers, as well as the virtual appliance product "AT-AR4000S-Cloud," which enables VPN functionality to be provided from virtual and cloud environments. The download service from our website has started on February 10. Cyber attacks targeting vulnerabilities in networks, systems, and people continue unabated, and urgent solutions are required across all industries. However, implementing security solutions that can address viruses and malware leads to extremely complicated individual operational management. Unified Threat Management (UTM) allows for the consolidation of various security functions, enabling a reduction in operational management burdens and centralized management, rather than deploying individual devices or solutions. *For more details, please refer to the PDF document or related links.
Tamper-evident label that clearly shows whether it has been opened or not.
- Other security
- Other consumables
- label
Face recognition image quality check and correction library! Customization supported.
- Personal authentication
Close the door and it auto-locks! To open it, just use the passcode! No power needed, so it's safe to use even during power outages or disasters—maintenance-free button lock.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
A lineup of distinctive technologies, including intrusion detection used in ship radar monitoring systems.
- Other security
The domestically produced cloud-based WAF Aegis, which requires no complicated setup or operation, supports the healthy growth of your company's web business.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Detect unauthorized use of your own domain! By understanding the existence and content of phishing emails, you can also prevent damage to customers and partners.
- Other security

TwoFive signs agency contract with DigiCert Japan and starts selling BIMI-compliant certification mark certificates.
TwoFive Inc. has entered into a sales agency agreement with DigiCert Japan LLC for the Verified Mark Certificates (VMC), which comply with the new email authentication technology known as the BIMI standard. Additionally, to enable the reflection of results in security measures after implementing DMARC, we provide a cloud service called "DMARC / 25 Analyze" that aggregates and visualizes DMARC reports, which report the authentication results on the email receiving side in an easy-to-understand manner. We support all companies and organizations that send emails to appropriately utilize DMARC and BIMI without requiring special expertise.
We detect and block cyber attacks on websites at a low cost. Equipped with an AI engine, it automatically responds to the latest attacks, eliminating the need for manual operation.
- Firewall and intrusion prevention
- Other security
- Software (middle, driver, security, etc.)
Recruiting agents and distributors! IT solution "NinjaConnect ISM" for the manufacturing industry that enables remote maintenance of industrial PCs.
- Other security
- Other network tools
Log in from your computer or mobile device! You can easily view it anytime, anywhere.
- Other information systems
- Internal Control and Operational Management
- Other security
Block targeted attack emails before they arrive! You can start using it shortly after the decision to implement it.
- filtering
Improve security and safety while reducing the hassle of operational management and authentication! An access control system that prevents unauthorized entry while allowing awareness of those inside.
- others
- Entrance and exit control system
- Area Sensor
*Video now available. Easy installation and quick setup. We will provide operational support. We can build specifications that suit your company with a wide variety of options.*
- Entrance and exit control system
- Other security and surveillance systems
It has been implemented in multiple factories of Wipro, one of the four major IT companies in India. A free trial is also currently available!
- Server monitoring and network management tools
- Other security
- Other network tools

We will be exhibiting at ITmedia Virtual EXPO 2021 in the fall!
e-Jan Networks will participate in the online exhibition "ITmedia Virtual EXPO 2021 Autumn" to be held in September 2021. At our online booth, you can view our remote maintenance solutions for factories. Since it is an online exhibition, anyone is welcome to join. ■ Exhibition Overview - Dates: September 1, 2021 (Wed) - September 30, 2021 (Thu) - Venue: Online - Participation Fee: Free - Organizer: ITmedia Inc. ■ What is NinjaConnect ISM? NinjaConnect ISM is a solution for remote maintenance of industrial PCs connected to factory networks. By installing a dedicated connector in the factory network, it enables remote maintenance without directly connecting the industrial PCs to the internet. It supports file transfers and log file storage, reducing costs associated with on-site maintenance, improving operational efficiency, and promoting digital transformation in the manufacturing industry.
Securely integrate information technology (IT) and operational technology (OT) to protect factory networks from cyber attacks.
- Other security

We will be exhibiting at ITmedia Virtual EXPO 2021 in the fall!
e-Jan Networks will participate in the online exhibition "ITmedia Virtual EXPO 2021 Autumn" to be held in September 2021. At our online booth, you can view our remote maintenance solutions for factories. Since it is an online exhibition, anyone is welcome to join. ■ Exhibition Overview - Dates: September 1, 2021 (Wed) - September 30, 2021 (Thu) - Venue: Online - Participation Fee: Free - Organizer: ITmedia Inc. ■ What is NinjaConnect ISM? NinjaConnect ISM is a solution for remote maintenance of industrial PCs connected to factory networks. By installing a dedicated connector in the factory network, it enables remote maintenance without directly connecting the industrial PCs to the internet. It supports file transfers and log file storage, reducing costs associated with on-site maintenance, improving operational efficiency, and promoting digital transformation in the manufacturing industry.
New standard contactless solutions in the new normal era.
- Entrance and exit control system
Leave and attendance management, from attendance tracking to collecting training attendance data, all taken care of!
- Entrance and exit control system
Selling a diverse lineup of aluminum cases.
- Engineering Plastics
- aluminum
- Personal authentication
Advancing DX, how to protect OT/IoT? Special edition of the Critical Infrastructure Cybersecurity Conference Report.
- Internal Control and Operational Management
- Other information systems
- Other security
[Indoor Type] Monitors your home in real-time with smartphone management, ensuring safety and security through crime prevention measures!
- Other security
A printing service that provides security for important printed materials such as gift certificates and securities!
- Printing/Publishing
- Other security
Automatic character recognition of handwritten information and registration to the database! We are developing a simple entry and exit management system.
- Software (middle, driver, security, etc.)
- Workflow System
- Entrance and exit control system
Flexible system! We offer a lineup of software utilizing new technologies.
- Other security and surveillance systems
- Other security
- Personal authentication
[COMODO Product] Eliminate damage from unknown threats! "AutoContainment" technology with U.S. patent.
- Virus software
- filtering
- Other security
We will achieve safe and efficient data transfer in a network-isolated environment!
- Data Erasing
Enhanced security measures. Cutting-edge surveillance systems for home and business use.
- Other security
- Color camera
Are you still going to continue handling complicated and troublesome IT security measures in-house?
- Other security
Blockchain as a platform for society Concurrent publication: The forefront of Fintech transforming financial services
- Encryption and authentication
- Server monitoring and network management tools
The best facial recognition performance achieved with Suprema's fusion matching technology.
- Entrance and exit control system
- Personal authentication
Access control and thermal AI cameras capable of managing people through AI facial recognition.
- Entrance and exit control system
Application protection from memory to the web! Detect fileless attacks and memory corruption attacks within milliseconds.
- Other network tools
- Server monitoring and network management tools
- Other security
Protect your assets from "Zero-Day" attacks! All-in-one "SaaS-type" vulnerability management tool!
- Other network tools
- Server monitoring and network management tools
- Other security