List of Safety features products
- classification:Safety features
721~765 item / All 3642 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
You can safely share information while protecting important manufacturing know-how such as technical documents and drawings!
- Other security
- Document and Data Management
[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -
We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)
We will introduce a case study that successfully improved convenience while maintaining security in the distribution of e-books for paid members!
- Document and Data Management
- Encryption and authentication
- Other security
[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -
We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)
We will introduce a case where we successfully achieved efficient information sharing while maintaining security through the sharing of technical documents with overseas bases!
- Document and Data Management
- Encryption and authentication
- Other security
[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -
We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)
Innovation in information sharing within the manufacturing industry! Approaching the optimal solution for a security system that balances the reduction of information leakage risks and convenience.
- Other security
- Document and Data Management
[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -
We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)
While preventing the leakage of confidential document information, important manufacturing know-how such as technical materials and drawings can be safely shared!
- Other security
- Document and Data Management
[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -
We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)
Introducing a case study that successfully shared quality-related documents at domestic and international locations while maintaining security efficiently!
- Document and Data Management
- Encryption and authentication
- Other security
[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -
We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)
We will introduce a successful case of efficiently sharing technical documents at domestic and international locations while maintaining security!
- Document and Data Management
- Encryption and authentication
- Other security
[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -
We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)
A remote control pan-tilt head that can be utilized in various industries requiring remote operation, such as monitoring factory lines and warehouses, and coordinating with devices and robots.
- Remote Control
- Other security and surveillance systems
- Other security
First exhibition of the new product's tripod and touch monitor! Report on the Smart Factory EXPO exhibition.
From January 24 to 26, 2024, we exhibited at the "Smart Factory EXPO," where the latest technologies and solutions for realizing smart factories and smart logistics, such as IoT solutions, AI, and FA, gathered in one place. Thank you very much to everyone who visited our booth. At our booth, we proposed EIZO's IP solutions, image enhancement solutions, and touch panel monitors to manufacturers looking to achieve labor savings, safe operations, and improved production efficiency. On the EIZO website, we will provide detailed information about the solutions we introduced during the event. For those who could not attend, please take a look at the related links below.
Kaspersky's antivirus software for businesses! It prevents the intrusion of malware that causes data leaks and data destruction!
- Virus software
Security products that make cloud compatibility easy! Ideal for operating systems with confidential information due to advanced resistance to tampering.
- Other electronic parts
- Other security
Are you able to manage information leak prevention and IT asset management in a centralized manner?
- Other operation management software
- Other security
Information leakage countermeasures and IT asset management. Are you able to manage everything centrally with cloud services?
- Other security
- Other operation management software
Evaluate the security of networks and systems! Discover vulnerabilities and simulate attacks.
- Software (middle, driver, security, etc.)
- Other security
An explanation of the differences compared to FIPS 140-3, which was introduced in 2019!
- Encryption and authentication
Requirements for the cryptographic module defined in the specification document are also included!
- Encryption and authentication
Introduction to international standards for vehicle cybersecurity!
- Other security
Introducing a method to visualize and continuously manage vulnerability risks!
- Other security
Malware checks can be performed without installation! Just plug a USB memory stick into an offline device to achieve virus checking.
- Virus software
[A must-see for those considering or gathering information] We will explain the features of thermal cameras and how to utilize them!
- Surveillance Cameras
- Other security
[A must-see for those considering or gathering information] We will explain the features and applications of the iris recognition system!
- Other security and surveillance systems
- Other security
- Entrance and exit control system
It will serve as a powerful tool for the initial management of cybersecurity for overseas bases and business partners of the company.
- Other security
To customers who cannot avoid the labor of security risk analysis: We can significantly reduce the effort required for the tedious task of creating security risk analysis reports through automation.
- Other security
It is a device for protection against ransomware for NAS with a completely new concept.
- Other security
An English version of the tool based on IPA's "Security Risk Analysis of Control Systems" for strengthening cybersecurity at overseas bases and business partners.
- Other security
We offer suggestions for improvement through managing entry and exit, organizing flow, and inventorying issues from a site perspective!
- Entrance and exit control system
Not only system construction, but also a total support for your company's entry and exit management, including the review of operational tools and rules!
- Entrance and exit control system
Reduce diagnostic costs with AI-driven labor efficiency! We also introduce the top 5 concerns companies have regarding vulnerability assessments.
- Other IT tools
- Other security
A must-see for information security personnel! A clear explanation of purposes and necessities.
- Other security
Software for preventing email misdelivery and encryption
- Other security
- Email/Fax transmission
We provide a total solution from marketing and sales proposals!
- Software (middle, driver, security, etc.)
- Other security
- others
Targeted attack emails are successful if they infect just one person. Let's conduct a participatory training exercise for everyone.
- Other security
One-stop solution for unauthorized login issues! A SaaS-based one-stop security service that also prevents fraudulent registrations, transactions, and transfers by bots.
- Other security
- Software (middle, driver, security, etc.)
- Other security and surveillance systems
I want to keep the emails of customer interactions! @Securemail Plus series
- Email/Fax transmission
- Other security
Smart security testing. PenTest.WS automates everything from diagnosis to report creation!
- Other security
Achieve safe and seamless remittance, investment, and account management on mobile!
- Encryption and authentication
Scheduled to exhibit various biometric devices from December 10 (Wednesday) to December 12 (Friday), 2025!
- Other security
We handle integrated security platforms and contactless biometric authentication devices!
- Other security
- Software (middle, driver, security, etc.)
- Other security and surveillance systems
Universal design that is easy to use for large package deliveries and wheelchair users.
- Other security
- Other security and surveillance systems
Integrated leader design! With a simple structure and connection design, maintenance is also easy.
- Other security
- Other security and surveillance systems
Achieving an advanced security environment with a slim-designed speed gate.
- Other security
- Other security and surveillance systems
Equipped with a multi-card module! Android LCDP for third-party app integration.
- Personal authentication
8-inch TFT color touchscreen with a narrow bezel design! Supports IEEE 802.3af/at PoE power supply.
- Personal authentication