List of Other security products
- classification:Other security
901~915 item / All 2160 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
Reduce the burden of reception duties with AI character authentication! Implementation can be done at a lower cost.
- Other security
Lease monthly fee: 7,800 yen (excluding tax) Improved usability from the customer's perspective UTM "SS7000III" series
- Other security
Improving the moral use of IT resources by employees and eliminating wasteful investments through optimization solutions, along with enhancing IT operational efficiency and reducing costs during troub...
- Other security
A case of developing a port monitor for card authentication printing of CAD prints using a multifunction printer!
- Software (middle, driver, security, etc.)
- Encryption and authentication
- Other security
Free design, short delivery time, low cost. Comprehensive support from design development to manufacturing and after-sales service.
- Processing Contract
- Contract manufacturing
- Other security
This is a newly released smart lock for hinged doors.
- Other security
Case studies available for viewing in photos! EPIC Smart Lock / Lavish Electric Lock
We are introducing examples of our products, such as the retrofittable smart lock brand 'EPIC' and the electric lock security system 'Lavish' that meets a wide range of needs, along with photos of their actual implementation. If you are considering installation or have concerns about security around your doors, please take a look and feel free to contact us. 【Past Installation Achievements】 Entrance auto locks, apartments, condominiums, single-family homes, offices, stores, kindergartens/nurseries, short-term rentals, hotels, rental conference rooms, storage rooms, warehouses, pharmaceutical storage, lockers. 【Unlocking Methods】 Face recognition, QR codes, barcodes, cards (FeliCa, MIFARE, EM, proprietary standards), API, PIN codes, fingerprints, remote controls, apps, buttons, intercoms, business phones. Please check the related links below. ▼
A white paper explaining the challenges and solutions related to the existence of legacy systems. Vulnerability assessment services are also provided by qualified personnel.
- Other security
Based on the inspection checklist under Article 25 of the Medical Care Act, challenges related to the application of security patches and presentations on Heimdal patches, etc.
- Other security
Security risk analysis 'V-sec' for implementing cost-effective cybersecurity measures!
- Other security
Achieving an unprecedentedly superior cost performance! The diagnostic speed is also overwhelmingly fast, and the price is overwhelmingly low.
- Other security
Detect anomalies at the protocol level / Safely monitor the network
- Server monitoring and network management tools
- Other network tools
- Other security
Improving security awareness comes from training and education. Cybersecurity measures to protect the manufacturing industry from increasingly serious cyber attacks every day!
- Other security
Are you facing any of these issues: 'The cost of replacing a lost key...', 'I want to eliminate the handover of keys', 'I want to streamline key management as part of 5S activities'?
- Other security
- Safety Door Switch
- others
Equipped with sensors and a buzzer for detection! Compact yet featuring a flapper gate.
- Other security
Matches any environment! Displays status with LEDs on the flapper (blue, green, red).
- Other security