List of Safety features products
- classification:Safety features
46~90 item / All 3305 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Achieving the highest level of certification accuracy! Strengthening server room security through the introduction of a difficult-to-forge biometric authentication system!
- Entrance and exit control system
Top-level certification accuracy! Enhanced security for access control in critical areas with a biometric authentication system that is difficult to forge!
- Entrance and exit control system
Highest level of certification accuracy! From customer management to access control with vein authentication systems.
- Entrance and exit control system
The "Safety-board" is a system that allows remote management of "entry and exit records" for work inside the tank, and it is also easy to install on-site.
- Other security and surveillance systems
- Entrance and exit control system
- IC tag reader/writer
Eliminate human errors such as omissions in entries that are a concern in the management board. A new DX service that improves safety and efficiency / Safety-board.
- Other security and surveillance systems
- Other measurement, recording and measuring instruments
- Entrance and exit control system
To securely obtain information in the supply chain, there are methods like this that can strengthen cybersecurity even with partners at different levels of response.
- Firewall and intrusion prevention
- filtering
- Other security
The compatibility of Zero Trust and data diodes is actually outstanding! Adoption cases are increasing rapidly. Let's make visible progress!
- Other security
- Firewall and intrusion prevention
- filtering
Entry and exit management + emergency response + remote monitoring! Smart management of workers in hazardous areas from various locations!
- Entrance and exit control system
From small cars to large vehicles! No need to get off; up to 8 passengers and vehicles can be authenticated at once! Achieving contactless entry and exit with RFID!
- Entrance and exit control system
Connecting business networks that handle production equipment and medical devices with general office systems. For cybersecurity measures in between, start with this.
- Firewall and intrusion prevention
For those who want to reduce communication volume and achieve stable video surveillance, or for those who want to reduce the load on IP cameras! Achieve high-quality and stable video transmission.
- Surveillance Camera System
- Other security and surveillance systems
- Other security
Displays footage from up to 32 IP cameras for factory surveillance. Real-time notifications are also possible in conjunction with IoT devices.
- Surveillance Camera System
- Other security and surveillance systems
- Other security
Visualizing abnormalities in the factory! IP Monitor/Decoding Box
EIZO's IP monitor/IP decoding box can be directly connected to IP cameras via LAN and hubs, allowing you to display video from up to 32 cameras on the monitor at once. This makes it easy to visualize abnormalities in the production line, leading to quick responses. ★For more details, please visit the product page.
An IP monitor/decoding box that can directly connect up to 32 surveillance cameras and display them simultaneously. It can interact with IoT devices for actionable responses!
- Surveillance Camera System
- Other security and surveillance systems
- Other security
Held at Makuhari Messe! Announcement of participation in the Railway Technology Exhibition 2021!
We will be exhibiting at the "Railway Technology Exhibition 2021" to be held at Makuhari Messe in November! The "Railway Technology Exhibition" is a comprehensive trade fair where technologies from various railway fields, including railway and transportation systems, infrastructure technology, facilities, power, transportation, operation management, vehicles, interiors, and passenger services, come together. = Exhibition Information = November 24 (Wednesday) - November 26 (Friday), 2021 Makuhari Messe 2-1 Nakase, Mihama-ku, Chiba City, Chiba Prefecture 261-8550 10:00 AM - 5:00 PM Booth Number: Hall 7 No. G-22 At the EIZO booth, we will present various solutions to ensure safety and security in the railway market under the theme "EIZO's imaging, recording, distribution, and display systems that protect safety on railway sites." We look forward to meeting everyone on the day of the event. Please feel free to stop by. *We are currently offering special benefits for visitors. For more details, please feel free to contact us!
Just by connecting, your monitor or TV transforms into a viewer for IP camera surveillance! It can display video from up to 32 cameras and supports 4K display.
- Surveillance Camera System
- Other security and surveillance systems
- Other security
Held at Makuhari Messe! Announcement of participation in the Railway Technology Exhibition 2021!
We will be exhibiting at the "Railway Technology Exhibition 2021" to be held at Makuhari Messe in November! The "Railway Technology Exhibition" is a comprehensive trade fair where technologies from various railway fields, including railway and transportation systems, infrastructure technology, facilities, power, transportation, operation management, vehicles, interiors, and passenger services, come together. = Exhibition Information = November 24 (Wednesday) - November 26 (Friday), 2021 Makuhari Messe 2-1 Nakase, Mihama-ku, Chiba City, Chiba Prefecture 261-8550 10:00 AM - 5:00 PM Booth Number: Hall 7 No. G-22 At the EIZO booth, we will present various solutions to ensure safety and security in the railway market under the theme "EIZO's imaging, recording, distribution, and display systems that protect safety on railway sites." We look forward to meeting everyone on the day of the event. Please feel free to stop by. *We are currently offering special benefits for visitors. For more details, please feel free to contact us!
Is that connection becoming a 'backdoor' for ransomware?" The new common sense of remote connections that has mastered "protection.
- Firewall and intrusion prevention
The smallest and safest smart lock "tedee".
- Other PCs and OA equipment
- Other security
Ransomware damage is increasing, and the risks are growing. If breached, only a handful succeed in preventing data leakage. Are you implementing measures to prevent data exfiltration?
- Firewall and intrusion prevention
- Other security
- Virus software
[Presentation of Materials] What is Barrier-Free? An Explanation of the Basics of Accommodations for Wheelchair Users
- Other security
- Safety Sensors
- Area Sensor
AI facial recognition, employee management solution, attendance and labor management, entry and exit management, strengthening internal controls, reliable construction and maintenance system, retail i...
- Entrance and exit control system
- Personal authentication
Improving system stability through OSS management, also compliant with the Cyber Resilience Act.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Manage OSS vulnerability risks in game development and create safe games.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Reduce copyright risks of entertainment content through OSS/SBOM management.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
OSS/SBOM management tool to enhance personal information protection.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
An OSS/SBOM management tool that supports the secure management of customer data.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Supporting compliance for financial institutions through OSS management and SBOM creation.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
We support risk management of OSS and the creation of SBOM, protecting communication infrastructure.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Support risk management of OSS and creation of SBOM to enhance security.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Support OSS management and SBOM creation to reduce supply chain risks.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
A tool for managing OSS/SBOM that protects patient information security.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
From project management to tool management, readable across a wide range! For efficient and accurate production line construction.
- antenna
- Document and Data Management
- Entrance and exit control system
A clear explanation of how to obtain a technical standards conformity certification!
To sell and use products that utilize wireless technology in Japan, it is necessary to obtain a national certification called "Technical Standards Conformity Certification (Giteki)." So, "how do you obtain Giteki?" 【Step 1】 What products require Giteki? Devices that communicate using wireless technology that emits radio waves are subject to this requirement, such as smartphones, Wi-Fi routers, Bluetooth earphones, wireless mice, wireless transceivers, IoT devices, etc. 【Step 2】 Where can you get the assessment done? The assessment for Giteki is conducted by a third-party organization recognized by the government, called a "Registered Certification Body." Examples include the Telecommunications Engineering Center (TELEC) and the Japan Maritime Bureau (JCI). 【Step 3】 What do you need to submit? For the assessment, you need to submit documents and samples such as the following, to check for "signal strength," "frequency accuracy," and "radio interference": Product technical specifications (such as frequency and output), circuit diagrams or design drawings, and the actual product (or prototype). 【Step 4】 If you pass the test, you will receive the "Giteki mark"! 【Step 5】 After that, you can freely sell and use the product!
Just turn your face, and it's done. Zero-stress identity verification on-site!
- Entrance and exit control system
Facial recognition that fits your company's business.
- Entrance and exit control system
Eliminate both effort and recording errors to zero. Optimize entry and exit management for your business flow.
- Entrance and exit control system
Improving the quality and safety of the manufacturing process through OSS/SBOM management.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Is there a possibility that the backup storage data could be leaked? It's also important to have a system in place that prevents data from being stolen.
- Firewall and intrusion prevention
- Other security
- filtering
This seminar will provide the latest information on cybersecurity and compare the mainstream security standards and frameworks.
- Firewall and intrusion prevention
Introducing a system for managing entry and exit to management locations using a touch panel display!
- Entrance and exit control system
Achieve hands-free and smooth entry and exit management! Real-time monitoring is possible even from a distance.
- Entrance and exit control system
Isn't the remote connection becoming the lifeline of the company?" A new idea to physically seal the "invisible entry points.
- Firewall and intrusion prevention
- Other network tools
- filtering
Securing the supply chain is a headache for managers. With OWC-D file secure link, you can enhance security even with partners at different levels.
- Firewall and intrusion prevention
- Other information systems
- filtering
You can safely share information while protecting important manufacturing know-how such as technical documents and drawings!
- Other security
- Document and Data Management
[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -
We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)
We will introduce a case study that successfully improved convenience while maintaining security in the distribution of e-books for paid members!
- Document and Data Management
- Encryption and authentication
- Other security
[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -
We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)
We will introduce a case where we successfully achieved efficient information sharing while maintaining security through the sharing of technical documents with overseas bases!
- Document and Data Management
- Encryption and authentication
- Other security
[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -
We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)
Innovation in information sharing within the manufacturing industry! Approaching the optimal solution for a security system that balances the reduction of information leakage risks and convenience.
- Other security
- Document and Data Management
[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -
We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)