List of Safety features products
- classification:Safety features
856~900 item / All 3242 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
A new standard for securely destroying documents and optical media. High-security shredders for CDs/DVDs and documents.
- Data Erasing
- Other office supplies
- Office supplies and stationery
Hotron's non-contact entry and exit management system achieves faster facial recognition with high accuracy and automatically sprays disinfectant. It is useful for infection control measures in office...
- Entrance and exit control system
- Other safety equipment
- Surveillance Cameras
【Infection Control Measures】 The Hotron automatic door sensor can be used not only for automatic doors but also for the opening and closing of elevators and for calling them.
Due to the outbreak of infectious diseases, the term "contactless" has gained attention, and new lifestyles are being sought. The contactless operation of doors and elevators, which are touched by a large number of unspecified individuals, as well as the enhancement of security in mask-wearing situations, are areas where Hotron's automatic door sensors can be utilized not only for automatic doors but also for the opening and calling of elevators. ◎ Do you have any of these concerns? - Elevators in facilities and stores are touched by many people, raising hygiene concerns. - When my hands are full with luggage, I want to use my foot to call the elevator. - I'm worried about security because the elevator in my apartment building is used by people other than residents. 【Usage Examples】 ○ Calling the elevator using a contactless switch ○ Calling the elevator using my foot without pressing a button ○ Calling the elevator for specific individuals only through integration with a facial recognition device 【Product Lineup】 ● Infrared Sensor HA Series ● Contactless Switch PF Series ● Microwave Contactless Switch DHS-1 ● Foot Switch PF Series ● Facial Recognition Device DS Series ◎ We are here to address your various concerns and challenges. Please feel free to contact us.
The "DS Series," which installs facial recognition devices in nursing homes and care facilities with dementia patients, allowing only registered staff to call the elevator.
- Entrance and exit control system
- Other safety equipment
- Surveillance Cameras
[Virus and Infectious Disease Measures] Face recognition speed of 0.2 seconds or less, face recognition accuracy of over 99%! Staff can call the elevator in nursing homes and care facilities using face recognition.
The Hotron automatic door sensor can be used not only for automatic doors but also for the opening and closing of elevators and for calling them. We will address various concerns and challenges you may have. 【Challenge】 We want to ensure that only staff can call the elevator in facilities for dementia patients. 【Solution】 Install a facial recognition device that allows only registered individuals to call the elevator. 【Target Products】 ○ Facial Recognition Terminal DS341 ○ Facial Recognition Terminal (Felica compatible) DS372F ○ Facial Recognition Terminal with Temperature Measurement Function DS70MI-T ◎ For more details, please contact us.
Numerous implementation results in municipalities! Smooth and safe entry and exit, preventing unauthorized access. Also reduces management costs.
- Other security
[Notice of Catalog Renewal] Bicycle Parking System "Cycle Gate"
We are pleased to announce that Tokai Giken Co., Ltd. has renewed the catalog for our bicycle parking system, "Cycle Gate." This product does not use electricity as its power source and adopts a simple mechanism, achieving low cost and easy maintenance, making it a safe and user-friendly mechanical gate. For more detailed information, please refer to the related products and catalogs.
Reduce the burden of reception duties with AI character authentication! Implementation can be done at a lower cost.
- Other security
Equipped with a strong closing force, the anti-jump flap prevents unauthorized access, and it is also possible to incorporate a guest card collection device as an option.
- Entrance and exit control system
A design that harmonizes with the entrance space, allowing for the selection of cabinet size according to the installation location.
- Entrance and exit control system
Reasonably introduce multiple-channel flapper gates, with the option to change the top plate color to harmonize with the installation space.
- Entrance and exit control system
Lease monthly fee: 7,800 yen (excluding tax) Improved usability from the customer's perspective UTM "SS7000III" series
- Other security
Improving the moral use of IT resources by employees and eliminating wasteful investments through optimization solutions, along with enhancing IT operational efficiency and reducing costs during troub...
- Other security
Safely retrieve personal information using a vein authentication device and print the necessary information!
- Personal authentication
A case of developing a port monitor for card authentication printing of CAD prints using a multifunction printer!
- Software (middle, driver, security, etc.)
- Encryption and authentication
- Other security
Contec's device security solutions that solve industry-specific challenges!
- Industrial PCs
- Virus software
- Software (middle, driver, security, etc.)
New release of the embedded PC "Box Computer® BX-T3000 Trellix model" equipped with ransomware protection software.
Contec has developed an embedded computer pre-installed with Trellix's endpoint security product, Trellix Application Control, a whitelist-type antivirus software for Microsoft Windows 10 IoT Enterprise, which is designed for embedded devices. We will start accepting orders for a new model of the "Box Computer® BX-T3000 Series" from July 9, 2024.
Free design, short delivery time, low cost. Comprehensive support from design development to manufacturing and after-sales service.
- Processing Contract
- Contract manufacturing
- Other security
This is a newly released smart lock for hinged doors.
- Other security
Case studies available for viewing in photos! EPIC Smart Lock / Lavish Electric Lock
We are introducing examples of our products, such as the retrofittable smart lock brand 'EPIC' and the electric lock security system 'Lavish' that meets a wide range of needs, along with photos of their actual implementation. If you are considering installation or have concerns about security around your doors, please take a look and feel free to contact us. 【Past Installation Achievements】 Entrance auto locks, apartments, condominiums, single-family homes, offices, stores, kindergartens/nurseries, short-term rentals, hotels, rental conference rooms, storage rooms, warehouses, pharmaceutical storage, lockers. 【Unlocking Methods】 Face recognition, QR codes, barcodes, cards (FeliCa, MIFARE, EM, proprietary standards), API, PIN codes, fingerprints, remote controls, apps, buttons, intercoms, business phones. Please check the related links below. ▼
No need for login or logout! Use the cloud safely and securely with "magical" authentication!
- Personal authentication
Easily and quickly automate the analysis of malware, making it useful in various scenarios such as initial investigations of damage and pre-shipment inspections for software products to check for malw...
- Virus software
We defend against targeted attacks that cannot be detected by conventional virus protection using progressive heuristic technology.
- Virus software
Thorough compliance enhancement! Prevention of human errors and reduction of work time are also possible.
- Entrance and exit control system
A white paper explaining the challenges and solutions related to the existence of legacy systems. Vulnerability assessment services are also provided by qualified personnel.
- Other security
Based on the inspection checklist under Article 25 of the Medical Care Act, challenges related to the application of security patches and presentations on Heimdal patches, etc.
- Other security
Security risk analysis 'V-sec' for implementing cost-effective cybersecurity measures!
- Other security
Achieving an unprecedentedly superior cost performance! The diagnostic speed is also overwhelmingly fast, and the price is overwhelmingly low.
- Other security
Reflecting the voices of on-site childcare teachers! Developed with an emphasis on simplicity and usability.
- Entrance and exit control system
We will achieve the digitization of time cards simply and at a low cost!
- Entrance and exit control system
Perfect palm-sized 100x25x20mm for management locks, cabinets, and industrial locks.
- Entrance and exit control system
- Other security and surveillance systems
- others
Detect anomalies at the protocol level / Safely monitor the network
- Server monitoring and network management tools
- Other network tools
- Other security
Improving security awareness comes from training and education. Cybersecurity measures to protect the manufacturing industry from increasingly serious cyber attacks every day!
- Other security
Are you facing any of these issues: 'The cost of replacing a lost key...', 'I want to eliminate the handover of keys', 'I want to streamline key management as part of 5S activities'?
- Other security
- Safety Door Switch
- others
Equipped with sensors and a buzzer for detection! Compact yet featuring a flapper gate.
- Other security
Matches any environment! Displays status with LEDs on the flapper (blue, green, red).
- Other security
Ideal for locations and events where permanent installation is difficult! Products with the same performance as those used in airports.
- Other security
Available for standalone use! Easy to install and remove with a dedicated stand, and no drilling required.
- Other security
Display status with LED! Cost-effective simple security gate device.
- Other security
Low cost and initial expenses starting from zero yen! Already compatible with many various cloud services.
- Encryption and authentication
Facial recognition attendance management! Simultaneously capable of temperature measurement, clothing disinfection, and hand sanitization with one device.
- Entrance and exit control system
- Personal authentication
- Other safety and hygiene products
Cyberstanc instantly detects cyber threats with advanced technology!
- Other security
Introducing the challenges of encrypted ZIP files and how to choose the right alternative products.
- Other security
New Criteria for Selecting Load Balancers Revealed from the Survey Findings
A load balancer, which distributes access to web servers and prevents system outages and other failures, is an essential tool for companies that operate e-commerce sites and online games. Due to the spread of telecommuting and the increasing use of high-definition images and videos within companies, load balancers are now being used by various industries, businesses, and municipalities. With the expansion of these use cases, signs of change are emerging in the needs of companies and organizations regarding load balancers. You can find more details about the blog through the related links below.
Utilizing action analysis algorithms to detect anomalies hidden within network traffic and identify signs of malicious behavior or breaches!
- filtering
New Criteria for Selecting Load Balancers Revealed from the Survey Findings
A load balancer, which distributes access to web servers and prevents system outages and other failures, is an essential tool for companies that operate e-commerce sites and online games. Due to the spread of telecommuting and the increasing use of high-definition images and videos within companies, load balancers are now being used by various industries, businesses, and municipalities. With the expansion of these use cases, signs of change are emerging in the needs of companies and organizations regarding load balancers. You can find more details about the blog through the related links below.
Standalone appliance! Available as hardware or virtual.
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
The generated flow statistics are analyzed in detail! Introducing products that can also be used in virtual environments.
- filtering
Active Directory Monitoring: Reasons and Methods
Active Directory (AD), which is a crucial part of the network, can be considered a lifeline, especially in terms of user and ID management. Many companies position AD as a core directory service, enabling them to identify, track, and manage users and IT assets appropriately. All these IDs are stored in Active Directory, and IT assets are logged. Through this directory data, it is possible to identify breaches and abnormal behavior; however, if Active Directory is not monitored, malicious actors may go unnoticed when they begin to infiltrate the network. You can find more details in the related links below.
The core of multi-layered defense against cyber attacks! Introducing the role of NDR.
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Prioritize important network traffic! Introducing case studies of the network traffic monitoring tool "Flowmon."
- filtering
Active Directory Monitoring: Reasons and Methods
Active Directory (AD), which is a crucial part of the network, can be considered a lifeline, especially in terms of user and ID management. Many companies position AD as a core directory service, enabling them to identify, track, and manage users and IT assets appropriately. All these IDs are stored in Active Directory, and IT assets are logged. Through this directory data, it is possible to identify breaches and abnormal behavior; however, if Active Directory is not monitored, malicious actors may go unnoticed when they begin to infiltrate the network. You can find more details in the related links below.
Providing clients with robust security solutions! Publicizing case studies on countermeasures against cyber attacks.
- filtering
Active Directory Monitoring: Reasons and Methods
Active Directory (AD), which is a crucial part of the network, can be considered a lifeline, especially in terms of user and ID management. Many companies position AD as a core directory service, enabling them to identify, track, and manage users and IT assets appropriately. All these IDs are stored in Active Directory, and IT assets are logged. Through this directory data, it is possible to identify breaches and abnormal behavior; however, if Active Directory is not monitored, malicious actors may go unnoticed when they begin to infiltrate the network. You can find more details in the related links below.
IaaS provisioning through network traffic monitoring! Case studies on countermeasures against cyber attacks are now available.
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.