List of Safety features products
- classification:Safety features
3016~3060 item / All 3307 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Protecting data with secure encryption solutions from the cloud to client PCs.
- Other security
- Other information systems
- Encryption and authentication
Simplify check-in and check-out! Compatible with a feature that turns mobile devices into room keys.
- others
- Other security
Streamline hotel management operations! Integration with mobile key features for a comfortable stay for guests.
- others
- Other security
A secure remote access platform that provides various security features!
- Other security
- Other information systems
- Encryption and authentication
Detailed explanation of the basics of security measures! Many countermeasure products are also featured.
- Virus software
- Other security
- Other information systems
A room entry and exit management system recognized by the world.
- Other PCs and OA equipment
- Entrance and exit control system
Improving security awareness and reducing the risk of malware infections! Targeted email training service.
- Other services
- Other security
A completely mechanical key storage box that can hold keys and cards!
- Other security
- Encryption and authentication
Automatic file encryption with easy operation! Compatible with various engineering applications!
- Encryption and authentication
Next-generation "leadership-type" information leakage prevention solution
- filtering
- Encryption and authentication
- Other security
Auto-lock system using finger vein authentication!
- Other security and surveillance systems
- Entrance and exit control system
- Personal authentication
[SystemAnswerG2 Introduction] Achieving visualization of performance and quality of critical infrastructure.
- Software (middle, driver, security, etc.)
- Other security
- Other services
[SystemAnswerG2 Introduction] Improving Service Levels in Comprehensive Reuse Business
- Software (middle, driver, security, etc.)
- Other security
- Server monitoring and network management tools
[SystemAnswerG2 Introduction] Achieve effective operational improvements and fault isolation!
- Software (middle, driver, security, etc.)
- Other security
【SystemAnswerG2 Introduction】Centralized monitoring of internal infrastructure! Reduction of operational workload.
- Software (middle, driver, security, etc.)
- Other security
By implementing powerful violation control and logging at the kernel level, we achieve comprehensive measures against information leakage.
- Other security
We handle everything from the selection and installation of security cameras to construction and repairs all in one package. We can offer a wide range of options, from outdoor to smartphone-compatible...
- Other office supplies
- others
- Other security
Always detect the weight of products with sensors! Notify changes in weight to prevent large-scale theft in advance.
- Other security and surveillance systems
- Other security
From an era of storage to an era of management! A key management system that simultaneously pursues safety and convenience.
- Other security and surveillance systems
- Other security
The final move against information leaks! Starting today, it's a confidential strategy that will change the company.
- Software (middle, driver, security, etc.)
- Other security
- Other security and surveillance systems
Safe login with Suica, Mobile Wallet, and IC card!
- Other security
- Personal authentication
- Encryption and authentication
Make the USB flash memory an authentication device!
- Other security
- Personal authentication
- Encryption and authentication
Unlawful operations are immediately obvious; a deterrent against information leaks!
- Other security
- Personal authentication
- Encryption and authentication
This one is enough for endpoint security!
- Other security
- Personal authentication
- Encryption and authentication
Essential tool for TruStack product managers!
- Other security
- Personal authentication
- Encryption and authentication
Automatic playback of keyboard and mouse operations!
- Other security
- Personal authentication
Authentication of the individual is required for access to the certificate!
- Other security
- Personal authentication
- Encryption and authentication
Freeing end users from password management!
- Other security
- Personal authentication
- Encryption and authentication
Protect your PC from unauthorized connections of illegal USB devices!
- Other security
Patrol Trust Advance can record patrol logs just by passing through! No need to worry about forgetting to press!
- Personnel and Labor
- Other security
A proposal for information investment that looks at the "present" and the "future"!
- Other information systems
- Other security and surveillance systems
- Other security
The device itself thinks up and creates passwords! Just obtain them with dedicated software!
- Other security and surveillance systems
- Other security
It was developed as a locker for temporary storage of personal belongings within the premises.
- Personal authentication
- locker
Invitation to Exhibit at the 10th School and Education Comprehensive Exhibition
We will be exhibiting at the "School Facilities and Services EXPO" held at Tokyo Big Sight from June 19 (Wednesday) to June 21 (Friday). At this exhibition, we will showcase our flagship product, the fingerprint authentication locker "Personal 1 Armor," as well as the IC card key authentication "PC Storage Box," "AV Rack," and "Delivery Box." Please be sure to stop by our booth! Booth number: A11-36
Next-generation application that enables OS login via non-contact!
- Personal authentication
- Software (middle, driver, security, etc.)
- Other security
Network Microphone Built-in IP67 IR Wedge Dome Camera 【IPD-WD4231R-M】
- Other security
- Surveillance Cameras
- Surveillance Camera System
Authentication solutions that protect users and systems from threats such as unauthorized access.
- Encryption and authentication
Safe security with a card lock! Easy to operate! Easy to install! An electric lock that's friendly for everyone.
- others
- Other security
Since there is no electrical work required, the previously high hurdle for electric locks can now be easily introduced! You can use your smartphone for IC authentication! The shape of the door and loc...
- others
- Other security
Mobile phones and electronic money become the keys to your home! A safe, secure, and high-security electric lock.
- Other security
Automotive security inspection service to counter malicious hackers!
- Other security and surveillance systems
- Other security
Automatic doors to IC authentication gates! Set the operating hours to prevent wandering and other issues in advance!
- Other security
Easily installable in renovation properties and new builds! Existing equipment can be integrated into the IC authentication system.
- Other security
Make all shared areas 'keyless entry'! Automatically generate a passcode valid for a certain period.
- Other security and surveillance systems
- Other security
Many successful implementations! You can introduce electric keys similar to those of major key manufacturers at a low price!
- Other security
Many sales achievements! Just cover it with the current key! An electric lock with outstanding management capabilities and security performance.
- Software (middle, driver, security, etc.)
- Other security