List of Safety features products

  • classification:Safety features

856~900 item / All 3242 items

Displayed results

Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!

  • PRエリア.png
  • Other conveying machines

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.

  • Satech - AdaptaGuard_Ipros_2023_JP_1.jpg
  • Satech - BlueGuard_Ipros_2023_JP_1.jpg
  • Satech - EasyGuard_Ipros_2023_JP_1.jpg
  • Satech - FastGuard_Ipros_2023_JP_2.jpg
  • Satech - ImpactGuard_Ipros_2023_JP_1.jpg
  • Satech - EasyGuard_Ipros_2023_JP_Media-gallery_1.jpg
  • Satech - ImpactGuard_Ipros_2023_JP_Media-gallery_2.jpg
  • Satech - AdaptaGuard_Ipros_2023_JP_Media-gallery_1.jpg
  • Satech - BlueGuard_Ipros_2023_JP_Media-gallery_2.jpg
  • Other safety and hygiene products

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A new standard for securely destroying documents and optical media. High-security shredders for CDs/DVDs and documents.

  • Data Erasing
  • Other office supplies
  • Office supplies and stationery

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Hotron's non-contact entry and exit management system achieves faster facial recognition with high accuracy and automatically sprays disinfectant. It is useful for infection control measures in office...

  • Entrance and exit control system
  • Other safety equipment
  • Surveillance Cameras

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
ドア以外2.jpg

【Infection Control Measures】 The Hotron automatic door sensor can be used not only for automatic doors but also for the opening and closing of elevators and for calling them.

Due to the outbreak of infectious diseases, the term "contactless" has gained attention, and new lifestyles are being sought. The contactless operation of doors and elevators, which are touched by a large number of unspecified individuals, as well as the enhancement of security in mask-wearing situations, are areas where Hotron's automatic door sensors can be utilized not only for automatic doors but also for the opening and calling of elevators. ◎ Do you have any of these concerns? - Elevators in facilities and stores are touched by many people, raising hygiene concerns. - When my hands are full with luggage, I want to use my foot to call the elevator. - I'm worried about security because the elevator in my apartment building is used by people other than residents. 【Usage Examples】 ○ Calling the elevator using a contactless switch ○ Calling the elevator using my foot without pressing a button ○ Calling the elevator for specific individuals only through integration with a facial recognition device 【Product Lineup】 ● Infrared Sensor HA Series ● Contactless Switch PF Series ● Microwave Contactless Switch DHS-1 ● Foot Switch PF Series ● Facial Recognition Device DS Series ◎ We are here to address your various concerns and challenges. Please feel free to contact us.

The "DS Series," which installs facial recognition devices in nursing homes and care facilities with dementia patients, allowing only registered staff to call the elevator.

  • Entrance and exit control system
  • Other safety equipment
  • Surveillance Cameras

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
pp_case05.png

[Virus and Infectious Disease Measures] Face recognition speed of 0.2 seconds or less, face recognition accuracy of over 99%! Staff can call the elevator in nursing homes and care facilities using face recognition.

The Hotron automatic door sensor can be used not only for automatic doors but also for the opening and closing of elevators and for calling them. We will address various concerns and challenges you may have. 【Challenge】 We want to ensure that only staff can call the elevator in facilities for dementia patients. 【Solution】 Install a facial recognition device that allows only registered individuals to call the elevator. 【Target Products】 ○ Facial Recognition Terminal DS341 ○ Facial Recognition Terminal (Felica compatible) DS372F ○ Facial Recognition Terminal with Temperature Measurement Function DS70MI-T ◎ For more details, please contact us.

Numerous implementation results in municipalities! Smooth and safe entry and exit, preventing unauthorized access. Also reduces management costs.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
image_01.png

[Notice of Catalog Renewal] Bicycle Parking System "Cycle Gate"

We are pleased to announce that Tokai Giken Co., Ltd. has renewed the catalog for our bicycle parking system, "Cycle Gate." This product does not use electricity as its power source and adopts a simple mechanism, achieving low cost and easy maintenance, making it a safe and user-friendly mechanical gate. For more detailed information, please refer to the related products and catalogs.

Reduce the burden of reception duties with AI character authentication! Implementation can be done at a lower cost.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Equipped with a strong closing force, the anti-jump flap prevents unauthorized access, and it is also possible to incorporate a guest card collection device as an option.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A design that harmonizes with the entrance space, allowing for the selection of cabinet size according to the installation location.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Reasonably introduce multiple-channel flapper gates, with the option to change the top plate color to harmonize with the installation space.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Lease monthly fee: 7,800 yen (excluding tax) Improved usability from the customer's perspective UTM "SS7000III" series

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Improving the moral use of IT resources by employees and eliminating wasteful investments through optimization solutions, along with enhancing IT operational efficiency and reducing costs during troub...

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Safely retrieve personal information using a vein authentication device and print the necessary information!

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A case of developing a port monitor for card authentication printing of CAD prints using a multifunction printer!

  • Software (middle, driver, security, etc.)
  • Encryption and authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Contec's device security solutions that solve industry-specific challenges!

  • ホワイトリスト型セキュリティ対策ソフト搭載コンピュータ2.JPG
  • ホワイトリスト型セキュリティ対策ソフト搭載コンピュータ3.JPG
  • Industrial PCs
  • Virus software
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
BX-T3000 Trellixモデル(ボックスコンピュータ)1.jpg

New release of the embedded PC "Box Computer® BX-T3000 Trellix model" equipped with ransomware protection software.

Contec has developed an embedded computer pre-installed with Trellix's endpoint security product, Trellix Application Control, a whitelist-type antivirus software for Microsoft Windows 10 IoT Enterprise, which is designed for embedded devices. We will start accepting orders for a new model of the "Box Computer® BX-T3000 Series" from July 9, 2024.

Free design, short delivery time, low cost. Comprehensive support from design development to manufacturing and after-sales service.

  • Processing Contract
  • Contract manufacturing
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

This is a newly released smart lock for hinged doors.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
導入事例.jpg

Case studies available for viewing in photos! EPIC Smart Lock / Lavish Electric Lock

We are introducing examples of our products, such as the retrofittable smart lock brand 'EPIC' and the electric lock security system 'Lavish' that meets a wide range of needs, along with photos of their actual implementation. If you are considering installation or have concerns about security around your doors, please take a look and feel free to contact us. 【Past Installation Achievements】 Entrance auto locks, apartments, condominiums, single-family homes, offices, stores, kindergartens/nurseries, short-term rentals, hotels, rental conference rooms, storage rooms, warehouses, pharmaceutical storage, lockers. 【Unlocking Methods】 Face recognition, QR codes, barcodes, cards (FeliCa, MIFARE, EM, proprietary standards), API, PIN codes, fingerprints, remote controls, apps, buttons, intercoms, business phones. Please check the related links below. ▼

No need for login or logout! Use the cloud safely and securely with "magical" authentication!

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Easily and quickly automate the analysis of malware, making it useful in various scenarios such as initial investigations of damage and pre-shipment inspections for software products to check for malw...

  • Virus software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We defend against targeted attacks that cannot be detected by conventional virus protection using progressive heuristic technology.

  • Virus software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Thorough compliance enhancement! Prevention of human errors and reduction of work time are also possible.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A white paper explaining the challenges and solutions related to the existence of legacy systems. Vulnerability assessment services are also provided by qualified personnel.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Based on the inspection checklist under Article 25 of the Medical Care Act, challenges related to the application of security patches and presentations on Heimdal patches, etc.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security risk analysis 'V-sec' for implementing cost-effective cybersecurity measures!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Achieving an unprecedentedly superior cost performance! The diagnostic speed is also overwhelmingly fast, and the price is overwhelmingly low.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Reflecting the voices of on-site childcare teachers! Developed with an emphasis on simplicity and usability.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We will achieve the digitization of time cards simply and at a low cost!

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Perfect palm-sized 100x25x20mm for management locks, cabinets, and industrial locks.

  • Entrance and exit control system
  • Other security and surveillance systems
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Detect anomalies at the protocol level / Safely monitor the network

  • Server monitoring and network management tools
  • Other network tools
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Improving security awareness comes from training and education. Cybersecurity measures to protect the manufacturing industry from increasingly serious cyber attacks every day!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Are you facing any of these issues: 'The cost of replacing a lost key...', 'I want to eliminate the handover of keys', 'I want to streamline key management as part of 5S activities'?

  • Other security
  • Safety Door Switch
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Equipped with sensors and a buzzer for detection! Compact yet featuring a flapper gate.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Matches any environment! Displays status with LEDs on the flapper (blue, green, red).

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ideal for locations and events where permanent installation is difficult! Products with the same performance as those used in airports.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Available for standalone use! Easy to install and remove with a dedicated stand, and no drilling required.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Display status with LED! Cost-effective simple security gate device.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Low cost and initial expenses starting from zero yen! Already compatible with many various cloud services.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Facial recognition attendance management! Simultaneously capable of temperature measurement, clothing disinfection, and hand sanitization with one device.

  • Entrance and exit control system
  • Personal authentication
  • Other safety and hygiene products

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cyberstanc instantly detects cyber threats with advanced technology!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introducing the challenges of encrypted ZIP files and how to choose the right alternative products.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
logo.JPG

New Criteria for Selecting Load Balancers Revealed from the Survey Findings

A load balancer, which distributes access to web servers and prevents system outages and other failures, is an essential tool for companies that operate e-commerce sites and online games. Due to the spread of telecommuting and the increasing use of high-definition images and videos within companies, load balancers are now being used by various industries, businesses, and municipalities. With the expansion of these use cases, signs of change are emerging in the needs of companies and organizations regarding load balancers. You can find more details about the blog through the related links below.

Utilizing action analysis algorithms to detect anomalies hidden within network traffic and identify signs of malicious behavior or breaches!

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
logo.JPG

New Criteria for Selecting Load Balancers Revealed from the Survey Findings

A load balancer, which distributes access to web servers and prevents system outages and other failures, is an essential tool for companies that operate e-commerce sites and online games. Due to the spread of telecommuting and the increasing use of high-definition images and videos within companies, load balancers are now being used by various industries, businesses, and municipalities. With the expansion of these use cases, signs of change are emerging in the needs of companies and organizations regarding load balancers. You can find more details about the blog through the related links below.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
logo.JPG

Secure file transfer: Protection of personal identifiable information

In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.

The generated flow statistics are analyzed in detail! Introducing products that can also be used in virtual environments.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
logo.JPG

Active Directory Monitoring: Reasons and Methods

Active Directory (AD), which is a crucial part of the network, can be considered a lifeline, especially in terms of user and ID management. Many companies position AD as a core directory service, enabling them to identify, track, and manage users and IT assets appropriately. All these IDs are stored in Active Directory, and IT assets are logged. Through this directory data, it is possible to identify breaches and abnormal behavior; however, if Active Directory is not monitored, malicious actors may go unnoticed when they begin to infiltrate the network. You can find more details in the related links below.

The core of multi-layered defense against cyber attacks! Introducing the role of NDR.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
logo.JPG

Secure file transfer: Protection of personal identifiable information

In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.

Prioritize important network traffic! Introducing case studies of the network traffic monitoring tool "Flowmon."

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
logo.JPG

Active Directory Monitoring: Reasons and Methods

Active Directory (AD), which is a crucial part of the network, can be considered a lifeline, especially in terms of user and ID management. Many companies position AD as a core directory service, enabling them to identify, track, and manage users and IT assets appropriately. All these IDs are stored in Active Directory, and IT assets are logged. Through this directory data, it is possible to identify breaches and abnormal behavior; however, if Active Directory is not monitored, malicious actors may go unnoticed when they begin to infiltrate the network. You can find more details in the related links below.

Providing clients with robust security solutions! Publicizing case studies on countermeasures against cyber attacks.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
logo.JPG

Active Directory Monitoring: Reasons and Methods

Active Directory (AD), which is a crucial part of the network, can be considered a lifeline, especially in terms of user and ID management. Many companies position AD as a core directory service, enabling them to identify, track, and manage users and IT assets appropriately. All these IDs are stored in Active Directory, and IT assets are logged. Through this directory data, it is possible to identify breaches and abnormal behavior; however, if Active Directory is not monitored, malicious actors may go unnoticed when they begin to infiltrate the network. You can find more details in the related links below.

IaaS provisioning through network traffic monitoring! Case studies on countermeasures against cyber attacks are now available.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
logo.JPG

Secure file transfer: Protection of personal identifiable information

In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.

Filter

classification
Delivery Time
Location