List of Safety features products
- classification:Safety features
2791~2835 item / All 3248 items
【Solved with Facial Recognition System】A must-see for those who are in places like research institutes where communication devices that emit radio waves cannot be brought in and are struggling to make...
- Other operation management software
- Other security
Are you worried that checks by security personnel are causing delays for trucks and delivery vehicles? Introducing a system that quickly records visitors using facial recognition!
- Other operation management software
- Other security
Manage attendance with facial recognition. No need for time cards, IC cards, or tedious aggregation tasks! Simply pass in front of the camera to manage employee attendance. *Video available!
- Other operation management software
- Other security
OK on iPhone too! Introducing examples of a 'facial recognition system' that does not require additional server or display installation and can be integrated with existing attendance management system...
- Entrance and exit control system
- Other security
- Personal authentication
Smooth management of people's entry and exit with 'AI × facial recognition cameras.' It is widely used for security measures against unauthorized personnel, managing entry and exit for factory contrac...
- Other operation management software
- Other security
[Exhibiting at the Microsoft Event] Recognizing people's smiles too! Comfortable visualization of entry and exit, attendance, customers, and security with a facial recognition system.
- Other operation management software
- Other security
Is your company's information management okay? We will explain common situations in companies and countermeasures using a fingerprint authentication system in a manga!
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Real-time understanding of the situation at the work site! Versatile applications in food factories and warehouses, with various use cases available.
- Entrance and exit control system
- Other security
- Personal authentication
Realizing visualization of the site with 'Iroato' using Chameleon Code! Introducing examples of its use in managing people and things.
- Entrance and exit control system
- Other security
- Personal authentication
Digi TrustFence is an out-of-the-box device security framework that simplifies the securing of connected products.
- Other security
- Communications
If used as a door lock, centralized management of the floor is also possible!
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
"Over 99% authentication rate" ultra-fast fingerprint recognition algorithm! A fingerprint authentication device that can take photos.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Over 99% authentication rate! Intuitive operation! No need for troublesome LAN cable wiring with this fingerprint authentication terminal!
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Proven results in over 50 countries worldwide! Not only for entrance and exit security, but also effective in managing entry and exit as well as attendance and departure! *A comic explaining the produ...
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Build a secure and visualized large-scale internal network with FortiSwitch!
- Other security
- Other contract services
- Other services
We promise to provide precise services.
- Voice Recognition Software
- Personal authentication
- Other security and surveillance systems
Digital signage that provides customers with a variety of information on interest rates, exchange rates, and more at 29 store counters.
- Other security
- Other contract services
- Other services
Case study of a security assessment that checks 7,000 accounts in 30 minutes!
- Other security
- Other contract services
- Other services
"Over 99% authentication rate" High performance despite ultra-compact size! Genuine leather authentication sensor fingerprint authentication terminal.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
"Over 99% authentication rate" High performance despite its ultra-compact size! A fingerprint authentication device that achieves an authentication speed of "0.1 seconds." It can register up to 10 mil...
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
"Over 99% authentication rate" Stylish design is popular! A fingerprint authentication device suitable for centralized management of floors.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
An explanation of the basics of IC tags, including the differences between HF and UHF IC tags, their applications, and how they are made.
- IC tag
- Entrance and exit control system
- Process Control System
Would you like to "visualize" the condition of equipment that can only be understood on-site?
- Server monitoring and network management tools
- Other security
Tapia will assist visitors at the entrance of the office or store.
- Entrance and exit control system
- Voice Recognition Software
Introducing advanced software for monitoring and controlling industrial processes.
- Server monitoring and network management tools
- Other operation management software
- Other security
Meeting all mobility needs! You can obtain necessary information while on the move.
- Server monitoring and network management tools
- Other operation management software
- Other security
Glasses and masks are okay! Security system for door installation with an authentication speed of under 0.7 seconds.
- Encryption and authentication
- Other security and surveillance systems
Achieving authentication speed of under 0.7 seconds! A facial recognition system that can be used in offices, stores, and more.
- Encryption and authentication
- Other security and surveillance systems
Achieve authentication speed of under 0.7 seconds! A facial recognition system that can be utilized in factories, warehouses, and more!
- Encryption and authentication
- Other security and surveillance systems
Achieve authentication speed of under 0.7 seconds! A facial recognition system that can be utilized in schools, tutoring centers, and training schools.
- Encryption and authentication
- Other security and surveillance systems
Achieving authentication speed of under 0.7 seconds! A facial recognition system that can be used in hospitals, nursing homes, and more!
- Encryption and authentication
- Other security and surveillance systems
Automatic door linkage and entry/exit record available. Door opening and closing system compatible with each eye color.
- Entrance and exit control system
Achieved significant labor cost reduction leading to a transformation in employee awareness! Case study of Fingered introduction.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Ensuring the safety of the entire building and each resident! Case study on the introduction of FingerGuard.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Strict access control implemented! Case study of FingerGuard introduction.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Introduction of fingerprint authentication for access control at all entrances and exits! Case study of FingerGuard.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
The expanding fingerprint authentication system! Introducing a feature article on the fingerprint authentication key "FingerGuard."
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Over 3,000 street cameras installed nationwide, high-quality recording, integrated camera and recording device with no wiring required, SD card recording, utility model obtained.
- Other security
To those involved in hardware and software design and development! Are you fully prepared for IoT data processing in factory automation and measures against operational downtime risks that come with r...
- Industrial PCs
- Embedded Board Computers
- Firewall and intrusion prevention
It automatically outputs a contact upon receiving a general phone call. You can use it to automatically start the device when a phone call is received.
- Other security
"Face" is the key! Achieving high authentication accuracy by 3D mapping the areas of the eyes and nose with 7,000 points. No need to touch the sensor, completely non-contact and hygienic!
- Encryption and authentication
Recordable in places without power! A solar panel security camera set that can be easily assembled and installed! Equipped with automatic maintenance features.
- Other security
If you try to pass through forcefully, the opening and closing lock will activate, preventing unauthorized passage!
- Entrance and exit control system
- Other security
Mobile phone storage locker
- others
- Entrance and exit control system
Key Management System for managing your company's important assets.
- others
- Personal authentication
- Entrance and exit control system