List of Other security products
- classification:Other security
1441~1500 item / All 1911 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Introduction of UHF band RFID laundry/linen supply tags that support compression dehydration and achieve high durability!
- IC tag reader/writer
- Other security
- Internal Control and Operational Management
No need for wire fixation, security with self-sounding tags! Enhanced security with tag and gate alarms!
- IC tag reader/writer
- Other security
Always diagnose based on new vulnerability information! Introduction to the cloud-based automatic annual vulnerability diagnosis service.
- Software (middle, driver, security, etc.)
- Server monitoring and network management tools
- Other security
High-security, low-cost, and highly convenient file server security software!
- Software (middle, driver, security, etc.)
- Other security
Ideal for continuous vulnerability monitoring of web applications! Annual diagnostic service for monitored web applications.
- Software (middle, driver, security, etc.)
- Server monitoring and network management tools
- Other security
Integration of deletion logs into the IT asset management system is possible! Complete deletion solution for USB-type HDDs.
- Data Erasing
- Other security
Lever handles that give various expressions to doors. You can choose according to your needs and specifications.
- Other security
- Other safety and hygiene products
Available in 5 types of color variations, allowing for color coordination that suits your interior!
- Other security
- Other safety and hygiene products
Sliding doors are now in the keyless era! With automatic locking, there's no more forgetting to lock the door.
- Other security and surveillance systems
- Other security
Deadlock function with double-sided button type! The handle can be selected between lever type and knob type!
- Other security and surveillance systems
- Other security
Are you missing important keys? Losing keys can lead to unauthorized activities.
- Other security
Leave the enhancement of web security to us!
- Other security
- Other services
A network that never stops, 24 hours a day, 365 days a year! Supporting smart factories.
- Wireless LAN
- Server monitoring and network management tools
- Other security
Exhibiting at the 6th Smart Factory Expo. Providing an uninterrupted wireless LAN environment and robust security measures for factories. "Supporting factories with a strong network - Promoting DX in the manufacturing industry with Allied Telesis."
Allied Telesis, Inc. (Headquarters: Shinagawa, Tokyo; President: Akira Oshima) will exhibit at the 6th Smart Factory EXPO, which will be held at Tokyo Big Sight (Tokyo International Exhibition Center) from January 19 (Wednesday) to 21 (Friday), 2022. The Smart Factory EXPO, now in its sixth edition, is a trade show focused on the "Manufacturing IoT" sector, which is essential for the rapidly expanding market of "smart factories." In the manufacturing industry, where various challenges such as labor shortages, employee safety management, and responses to production line stoppages are piling up, smart factory implementation and DX (Digital Transformation) are considered to lead to fundamental solutions. At our booth, themed "Supporting Factories with Strong Networks - Promoting Manufacturing DX with Allied Telesis," we will introduce solutions and services to realize DX in the manufacturing industry. We will showcase methods for strengthening networks not only for various devices used within factories but also for connecting between factories and between locations and headquarters. *For more details, please refer to the PDF materials or related links.
Visionline is a server-based access management system that offers ease of use and a wealth of features.
- Other security
- Other network tools
- others
International Hotel and Ryokan 500th Issue Commemorative Seminar
Dates: August 17 (Tuesday) - 18 (Wednesday), 2021 10:00 AM - 4:00 PM * Four courses, a total of eight courses will be offered. Venue: Tokyo Metropolitan Industrial Trade Center, Hamamatsucho Building, 4th Floor Conference Room (2 minutes on foot from Yurikamome Takeshiba Station, 5 minutes on foot from JR Hamamatsucho Station) Simultaneous Event: Tokyo Bridal Academy (Hosted by Bridal Industry Newspaper) "Hotel Access Solutions: Future Prospects of Global Standards" Daiichi Fukao, President and CEO, ASSA ABLOY Global Solutions Japan The card key system adopted in many hotel rooms. The advancement of technology is remarkable, with the IoT-enabled card locks and mobile keys that allow smartphones to be used as room keys. Global hotel chains are incorporating these latest technologies into their hotel programs, leading to smarter check-in processes and seamless guest experiences, thus creating new value for guests. Experts will discuss the latest access solutions closely related to improving hotel operational performance and their potential.
It is also possible to change and control the security system settings remotely from the confirmation call!
- Other security
- Other services
Security solutions for a highly ICT-oriented society, including AI and autonomous driving.
- Other security
- cabinet
You can manage accounts, organizations, groups, and mailing lists in bulk!
- Software (middle, driver, security, etc.)
- Other security
Quickly detect incidents using artificial intelligence and prevent escalation!
- Other security and surveillance systems
- Other security
We will shut out suspicious individuals and outsiders!
- Other security
I want to manage visitor access in a commercial building!
- Other security
I want to be able to report automatically in case of an emergency!
- Other security
Easily prevent laptop theft even while on business trips or outings!
- Other security
The definitive version of the security wire! It is effective in preventing theft of the computer itself.
- Other security
The wire is coiled, making it convenient to carry and not cumbersome when transporting.
- Other security
MicroSaver DS Security Cable featuring high-performance flat keys.
- Other security
The definitive security wire! You can manage two devices with one key.
- Other security
Shutting out suspicious individuals and outsiders! Strict restrictions on visitor access will be enforced.
- Entrance and exit control system
- Encryption and authentication
- Other security
It can be put into operation on the same day simply by installing it on the target client PC and performing the initial setup.
- Other security
- Firewall and intrusion prevention
You can avoid the risk of virus infection via USB memory.
- Other security
Compatible with PCs and mobile phones! A monitoring and control device that can respond quickly even in emergencies.
- VPN/Wide Area Ethernet
- Other security
- Other security and surveillance systems
Prioritizing comfort and convenience for people working in the office.
- Other security
- Other information systems
By simply connecting a USB, it is possible to investigate the possession of personal information! It prevents the leakage of confidential information in advance!
- Other security
We propose IoT-focused consulting backed by the experience and achievements of a group of security experts.
- Other security
- Other services
Automatic collection and visualization of access rights + audit support made easy and low-cost.
- server
- Other security
Protects the company's PC from vulnerabilities when there are no users present.
- Software (middle, driver, security, etc.)
- Entrance and exit control system
- Other security
You can utilize a wide range of features such as history management and prevention of unauthorized access due to loss!
- Other security
- Other security and surveillance systems
Instant automatic recovery from tampering in less than 0.1 seconds! SaaS-based instant tampering detection and recovery service.
- Server monitoring and network management tools
- Other security
Patent obtained! Endpoint security that does not seek threats.
- Firewall and intrusion prevention
- Other security
Cloud-era security archive application for Windows!
- Other security
High-precision defense with AI! Utilizing artificial intelligence algorithms to achieve predictive defense and prevention against cyber attacks.
- Other security and surveillance systems
- Other security
New concept OS-protect type endpoint security!
- Other security
The growing threat of targeted attack emails every day. Can you tell them apart?
- Email/Fax transmission
- Other information systems
- Other security
It is said that about 70% of information leakage incidents are due to internal factors.
- Other security
From passive crime prevention to proactive 24-hour response!
- Other security
I want to change the system from live-in management to daytime management!
- Other security
Easily prevent laptop theft even while on business trips or outings!
- Other security
Slim security wire suitable for a wide range of applications.
- Other security
Newly developed one-click lock security wire
- Other security
The definitive security wire! Patented T-lock.
- Other security
Eliminate password entry and control login with fingerprint authentication + single sign-on.
- Other security
- Personal authentication
Bring the technology used by large corporations and government agencies in Japan to your business as well.
- Virus software
- Other security
- filtering
Urchin successor software!
- Server monitoring and network management tools
- Other security
- Development support tools (ICE, emulators, debuggers, etc.)