List of Other security products
- classification:Other security
1666~1710 item / All 1989 items
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Amino acid-derived natural cationic polymer that can be used in food preservatives, hygiene materials, and daily necessities. It is a safe material as it is a fermentation product produced by natural ...
- Shelf life enhancer
Introduction of the preservative polylysine / fermented polyamino acids that contribute to food poisoning prevention.
We provide easy-to-understand materials explaining the natural preservative polylysine, which prevents food poisoning. ε-Polylysine (hereafter referred to as polylysine) is an amino acid-derived preservative widely used as a food preservative. By adding polylysine, the growth of microorganisms that cause food poisoning can be prevented. Every year, food poisoning caused by microorganisms is a significant issue and is frequently reported in the news. Even foods that do not appear to be spoiled can rapidly proliferate microorganisms if the growth environment is suitable, so caution is necessary. Even if something looks clean, contamination by bacteria can progress, posing a risk of food poisoning. By ensuring hygiene management during the manufacturing process, proper storage at appropriate temperatures, and the appropriate use of the preservative polylysine, food safety can be more effectively protected. 【Features】 ■ A safe material produced through fermentation by natural microorganisms (not genetically modified organisms) ■ Provides a good image as a natural fermented product ■ Listed in the existing additive registry as a food preservative ■ A safe domestic product *Please feel free to contact us.
Delivery box (mini 2BOX type)
- IC tag
- Other security
- Other office supplies
Variable Cylinder (MMX/MMX2)
- IC tag
- Other security
- Other office supplies
Variable Cylinder (Memory System)
- IC tag
- Other security
- Other office supplies
Non-contact entrance system (Pasta Touch LE)
- IC tag
- Other security
- Other office supplies
Key to prevent forgetting to lock (Memory Eyes)
- IC tag
- Other security
- Other office supplies
Huh, did I lock the door? I'll help ease that anxiety.
- IC tag
- Other office supplies
- Other security
No need for key management! A storage box that can be easily used and kept nearby!
- IC tag
- Other security
- Other office supplies
A new variation. The square type has arrived!
- IC tag
- Other security
- Other office supplies
A door handle that is thoroughly focused on ease of use!
- IC tag
- Other office supplies
- Other security
A quick check to see if you locked the door when going out!
- IC tag
- Other office supplies
- Other security
Introducing our three core competencies as a company aiming to be a communication company!
- Other contract services
- Other security
With "MobilePassport," your mobile phone is your password.
- Other security
- Other network tools
A global company that creates information and communication technology products for professionals.
- Other measurement, recording and measuring instruments
- oscilloscope
- Other security
Automatic spectrum clearance in LTE and 5G mobile networks.
- Other security
- Other information systems
Examples of achieving user-friendliness, operational efficiency, and reduction of information security risks.
- Other security
- Other network tools
Information is being uploaded from users around the world not only about known threats but also about new threats!
- Software (middle, driver, security, etc.)
- Other security
Effective in preventing vehicle theft and unauthorized entry!
- Entrance and exit control system
- Other information systems
- Other security
Our system, which has been implemented in approximately 60 factories to date, creates an "invisible wall" using radio waves to help prevent cross-contamination!
- Entrance and exit control system
- Other information systems
- Other security
A detection system that easily detects unauthorized intrusions and locates them! For customers who want to implement a security system but keep costs low!
- Entrance and exit control system
- Other information systems
- Other security
A system that automatically detects and aggregates the entry of workers and vehicles into the tunnel!
- Entrance and exit control system
- Other information systems
- Other security
A security system that integrates location detection systems and surveillance cameras!
- Entrance and exit control system
- Other information systems
- Other security
Outdoor entry and exit solutions for work sites and construction sites!
- Entrance and exit control system
- Other information systems
- Other security
This seminar is a must-attend for those in charge who are facing issues with network bandwidth monitoring and those interested in new bandwidth analysis methods!
- Other security
- Business Skills Seminar
- Other security and surveillance systems
[Press Release] Orizon Systems Provides Functionality to Integrate with Araksa's Cyber Attack Automated Defense Solution Software
- Other security
Prohibit downloading/printing/screen capturing of content shared on the web system.
- Firewall and intrusion prevention
- filtering
- Other security
With just one app, you can open and close the shutter and turn the lighting ON & OFF!
- Other security
Laptop Security: Automatically transforms into a computer that prevents information leaks when taken "outside."
- Other security
Quickly respond to on-site issues ∞Answer Series Can be implemented at a low cost.
- Entrance and exit control system
- Other security
No network knowledge required! Easily and securely achieve a remote access environment.
- Other security
- Other information systems
- Encryption and authentication
Achieving a secure IoT system! An explanation of penetration testing.
- Other security
Do you have concerns about security? If it's about intercoms, please feel free to consult with us!
- Other security and surveillance systems
- Other security
- Machinery and equipment installation/dismantling/relocation
We quickly resolve troubles with computers, IT tools, and networks!
- Notebook PC
- Other security
- Desktop PC
A replacement door knob using a dimple-type lock as a picking prevention measure.
- Other security
A prefabricated panel-type shield room that is easy to relocate and modify, with a short on-site construction period.
- others
- EMC Testing
- Other security
Vaccination against targeted phishing emails! Training solution through simulated attacks!
- Firewall and intrusion prevention
- Other security
【World No.2 Surveillance Camera Manufacturer Dahua Technology】2 Megapixel Cue 1080P WiFi Camera
- Other security
AI-based network anomaly analysis solution
- Other security
- Encryption and authentication
- Firewall and intrusion prevention
[Made in Japan] A dedicated reporting device for email using telephone lines. It can be used for equipment monitoring and security surveillance.
- Other security
- Other security
We provide security plans tailored to the needs of your business activities!
- Other security and surveillance systems
- Other security
Next-generation security device that is impossible to hack even with quantum computers. It caters to a variety of areas from mobile to advanced security.
- Software (middle, driver, security, etc.)
- Other security
Designed for use in harsh environments! It is also compatible with IPX4.
- Surveillance Cameras
- Other security
- Surveillance Camera System
"AI recognizes your face" - Easily accessible for anyone hands-free, even in work environments where you can't touch a tablet!
- Other operation management software
- Other security
Manage on-site workers' time records with the "facial recognition system × installed cameras"! The feature that can recognize expressions reduces the workload for managers and increases worker satisfa...
- Other operation management software
- Other security
No need to review the recordings of the security cameras! A facial recognition system that automatically records the faces of unauthorized individuals. *There is a video that shows the speed of facial...
- Other operation management software
- Other security