List of Safety features products

  • classification:Safety features

901~945 item / All 3661 items

Displayed results

Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.

  • small-mistcollector.png
  • air conditioning

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Convenient for aggregating data from multiple locations, such as entry and exit data and stamp rallies!

  • 2D Code Reader
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Good for the seller, good for the buyer, good for society! Our simple entry and exit management records have received positive feedback.

  • 2D Code Reader
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

For zone management within the facility! In addition to simple applications, it can also be linked with automatic doors and door locks.

  • 2D Code Reader
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Integration with infrared body temperature measurement is also possible! It contributes to improving productivity in event operations.

  • 2D Code Reader
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

You can clearly understand the flow of people and goods! It can be used for various purposes such as regional tourism and revitalization of local shopping districts.

  • 2D Code Reader
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Supports both QR codes and FeliCa! Widely applicable for attendance management and entry management.

  • 2D Code Reader
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Effective for preventing ticket resale! In addition to the information in a standard two-dimensional code, hidden characters can be included.

  • 2D Code Reader
  • Other security
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Data transfer in a network-isolated environment as an alternative to USB memory.

  • Data Erasing

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Targeted OT networks. How to protect the "invisible areas" of the manufacturing site.

  • 0903_ipors_2.jpg
  • 0903_ipors_3.jpg
  • 0903_ipors_4.jpg
  • 0903_ipors_5.jpg
  • 0903_ipors_6.jpg
  • 0903_ipors_7.jpg
  • 0903_ipors_8.jpg
  • Firewall and intrusion prevention
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Implementing internal risk measures such as information leakage and internal misconduct through behavioral analysis! A new corporate risk management approach to prevent risks before they occur.

  • Server monitoring and network management tools
  • Other security
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Explaining the specific settings for the screensaver and points to be aware of during the setup!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Explaining the high probability of successful unauthorized access known as "trashing"!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

I will explain in detail the measures that cloud server administrators should take!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Points for maintaining a safe internet environment! An explanation of the types and risks when not used properly.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A detailed explanation of definitions, types, and countermeasures. This is useful information for those using IT equipment in the workplace.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

It is possible to compile a summary of each employee's clock-in and clock-out times and breakdown of work hours necessary for management!

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Would you like to prepare for compliance with the Cyber Resilience Act using 'Black Duck SCA', which supports OSS risk management and SBOM creation?

  • Software (middle, driver, security, etc.)
  • Other security
  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The weather-resistant and waterproof permanent adhesive seal that can be used outdoors allows for the management of outdoor equipment, materials, and assets.

  • Other security
  • label
  • Packaging materials

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Achieving faster and smarter investigations: "CCL Digital Forensic Software"

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Free trial set available!] A USB dongle for license authentication that protects software and prevents unauthorized copying.

  • Encryption and authentication
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We will exhibit at Hannover Messe 2025 and showcase technologies that comply with the new EU cyber resilience regulations.

Wibu-Systems will showcase its comprehensive CRA-compliant solutions at the exhibition venue. - Protection of software and data integrity The CodeMeter Protection Suite provides a comprehensive security framework equipped with encryption and obfuscation technologies, integrity checks, anti-debugging features, and tamper resistance mechanisms. - Secure authentication The CodeMeter API features encryption technologies such as symmetric and asymmetric encryption and digital signature procedures, enabling seamless integration with digital products and protection against tampering. - Compliance-oriented licensing CodeMeter License Central is a database-based licensing and entitlement management solution that automates the processes of license creation, distribution, and management. This allows for tracking software usage, managing compliance, and conducting software recalls when necessary. Additionally, the handling of personal information and business data complies with the principle of "data minimization."

A useful tool for protecting and encrypting Python applications that are easily decipherable by third parties due to being interpreted.

  • Software (middle, driver, security, etc.)
  • Encryption and authentication
  • Other image-related equipment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We will exhibit at Hannover Messe 2025 and showcase technologies that comply with the new EU cyber resilience regulations.

Wibu-Systems will showcase its comprehensive CRA-compliant solutions at the exhibition venue. - Protection of software and data integrity The CodeMeter Protection Suite provides a comprehensive security framework equipped with encryption and obfuscation technologies, integrity checks, anti-debugging features, and tamper resistance mechanisms. - Secure authentication The CodeMeter API features encryption technologies such as symmetric and asymmetric encryption and digital signature procedures, enabling seamless integration with digital products and protection against tampering. - Compliance-oriented licensing CodeMeter License Central is a database-based licensing and entitlement management solution that automates the processes of license creation, distribution, and management. This allows for tracking software usage, managing compliance, and conducting software recalls when necessary. Additionally, the handling of personal information and business data complies with the principle of "data minimization."

Monitoring the number of people in a specific area at low cost! What are the benefits of understanding the number of people?

  • screenshot.4859.jpg
  • screenshot.4856.jpg
  • screenshot.4857.jpg
  • screenshot.4858.jpg
  • ピープルカウント5.jpg
  • ピープルカウント6.png
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Eliminating the need for applying to take out digital cameras and transferring data to PCs increases work efficiency!

  • Other security
  • Image Transmission Equipment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Installing network infrastructure to support complex digital video transmission at each subway station!

  • Routers, Switches, and Hubs
  • Other security
  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security diagnosis to prevent cyber attacks.

  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We would like to introduce a case where the speed of information sharing within the company has significantly improved, allowing us to thoroughly implement the rules for handling shooting data!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Safe and secure to use even for telework! Prevents information leaks in advance and strengthens your business.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

No data is left on the device! Even if the device is lost, it can prevent the risk of information leakage.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A magical solution where the encrypted file can be "deleted later"! For companies and organizations considering measures against information leakage!

  • Data Erasing

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Equipped with antivirus, firewall, and IPS in a palm-sized chassis. It defends the gateway to the internet with powerful security features.

  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
SG-ONE_main_550.png

[Notice of Start of Handling] Palm-sized All-in-One Security "SG-ONE"

We are pleased to announce that Aisel Co., Ltd. has started handling the UTM (Unified Threat Management) device "OCH SG-ONE," which is perfectly suited for customers who want to quickly secure their internet gateway but have an unknown number of devices to manage. **Features of SG-ONE** Compact design: No trouble finding a place to install it even in tight spaces! Create a secure environment on the go! Super easy setup and installation: Just connect it to your router and it's ready in 5 minutes! Suitable for companies without an IT administrator! All-in-one security that protects various aspects: Equipped with multiple powerful security features including antivirus, firewall, and IPS! Are you still feeling uneasy about your company's internet environment? With this one device, you can eliminate all remaining concerns at once!

From security measures to disaster preparedness, we deliver "peace of mind" in any environment!

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We offer both LAN management console version and cloud version! It improves erasure efficiency and contributes to cost reduction.

  • Data Erasing

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We will reliably erase traces of PC usage to prevent information leakage.

  • Data Erasing

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Achieved with reliable technical skills and advanced tools! A secure data erasure service designed for various scenarios.

  • Data Erasing
  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

USB duplicator equipped with a CD-ROM function that prevents data tampering, deletion, and formatting using a dedicated USB, allowing for data protection.

  • Expansion Boards
  • Encryption and authentication
  • Other operation management software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
カッティングエッジ ストレージパンチャー STPN-30 square.jpg

The most recommended and ideal data destruction device right now is the physical destruction device, Storage Puncher STPN-30.

Methods for data erasure of unnecessary HDDs, SSDs, magnetic tapes, etc. are as follows: 1. Erasure software, 2. Electrical shock to erase magnetic data, 3. Physical destruction Pros and cons: 1. Erasure software Licensing fees are incurred each time data is erased, resulting in significant costs. 2. Electrical shock magnetic erasure Magnetic erasure devices are very heavy, making it difficult to reuse HDDs. It is also cumbersome to check again by re-inserting into a PC after processing. 3. Physical destruction The easiest, fastest, and cheapest method for erasing data on HDDs is to drill holes in the platters. The currently most recommended device is the physical destruction device Storage Puncher STPN30. What’s good about it: 1. Destruction power of up to 12 tons 2. Processing time of about 10 seconds 3. Hydraulic high-power destruction 4. Various destruction tools can be exchanged on one main unit, allowing for the destruction of HDDs, SSDs, and magnetic tapes. This is a world first. 5. Drills four holes in the HDD to destroy the platter 6. Even if the destruction bit is damaged, it can be easily replaced 7. Function to prevent the destruction shaft from coming out after destruction 8. SSDs are bent at 5mm intervals in a wavy pattern to break the circuit board and destroy the IC chips 9. Battery operation is possible even in places without power, enabling on-site work 10. Weight of about 18 kg

A verification device that can display the front and back information of My Number cards, foreign resident cards, and driver's licenses on a reading screen for identity verification and counterfeit de...

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
カッティングエッジ マイナンバーカード本人確認、運転免許証本人確認、外国人在留カード本人確認、偽造判定、データベース管理が可能な装置 EXC-2800.jpg

A factory for counterfeiting residence cards and My Number cards has been raided. The EXC-2800 device can instantly view the front and back information of My Number cards, driver's licenses, foreign residence cards, etc., and can verify identity as well as detect counterfeiting or alteration.

A Chinese national suspect who forged My Number cards and residence cards has been arrested. Approximately 750 sheets for forgery were discovered at their home, and the data for forgery was sent via the Chinese communication app WeChat, with about 3,000 pieces of data believed to be for card forgery. The majority were for residence cards, while about 70 were for My Number cards. We would like to introduce the EXC-2800 device, which allows for immediate viewing of information on the front and back of My Number cards, driver's licenses, foreign residence cards, etc., as well as the information within the IC chip, enabling identity verification and detection of forgery/alteration. 1. With a single insertion, front and back information, IC chip data, and facial photos can be quickly compared and verified on a PC. 2. Information such as name, address, date of birth, and expiration date can be converted into text data using OCR character recognition, allowing for quick database creation and prevention of input errors. 3. Data can be saved in various formats, including text, CSV, and JPEG images. 4. For driver's licenses and My Number cards with unknown PINs, the device can read surface patterns using a unique algorithm to determine authenticity. 5. It has a tampering check function that detects surface adhesive forgery, making it possible to identify altered cards.

A device that reads the photo page and IC chip information of a passport and international driver's license, displaying them on a screen for identity verification and forgery authentication.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
カッティングエッジ マイナンバーカード本人確認、運転免許証本人確認、外国人在留カード本人確認、偽造判定、データベース管理が可能な装置 EXC-2800.jpg

A factory for counterfeiting residence cards and My Number cards has been raided. The EXC-2800 device can instantly view the front and back information of My Number cards, driver's licenses, foreign residence cards, etc., and can verify identity as well as detect counterfeiting or alteration.

A Chinese national suspect who forged My Number cards and residence cards has been arrested. Approximately 750 sheets for forgery were discovered at their home, and the data for forgery was sent via the Chinese communication app WeChat, with about 3,000 pieces of data believed to be for card forgery. The majority were for residence cards, while about 70 were for My Number cards. We would like to introduce the EXC-2800 device, which allows for immediate viewing of information on the front and back of My Number cards, driver's licenses, foreign residence cards, etc., as well as the information within the IC chip, enabling identity verification and detection of forgery/alteration. 1. With a single insertion, front and back information, IC chip data, and facial photos can be quickly compared and verified on a PC. 2. Information such as name, address, date of birth, and expiration date can be converted into text data using OCR character recognition, allowing for quick database creation and prevention of input errors. 3. Data can be saved in various formats, including text, CSV, and JPEG images. 4. For driver's licenses and My Number cards with unknown PINs, the device can read surface patterns using a unique algorithm to determine authenticity. 5. It has a tampering check function that detects surface adhesive forgery, making it possible to identify altered cards.

An electric destruction device capable of physically destroying HDDs and SSDs with 12 tons of hydraulic power. By simply changing the tool, it can also destroy magnetic tapes with one unit.

  • Data Erasing
  • Other security
  • Other server related

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
カッティングエッジ ストレージパンチャー STPN-30 square.jpg

The most recommended and ideal data destruction device right now is the physical destruction device, Storage Puncher STPN-30.

Methods for data erasure of unnecessary HDDs, SSDs, magnetic tapes, etc. are as follows: 1. Erasure software, 2. Electrical shock to erase magnetic data, 3. Physical destruction Pros and cons: 1. Erasure software Licensing fees are incurred each time data is erased, resulting in significant costs. 2. Electrical shock magnetic erasure Magnetic erasure devices are very heavy, making it difficult to reuse HDDs. It is also cumbersome to check again by re-inserting into a PC after processing. 3. Physical destruction The easiest, fastest, and cheapest method for erasing data on HDDs is to drill holes in the platters. The currently most recommended device is the physical destruction device Storage Puncher STPN30. What’s good about it: 1. Destruction power of up to 12 tons 2. Processing time of about 10 seconds 3. Hydraulic high-power destruction 4. Various destruction tools can be exchanged on one main unit, allowing for the destruction of HDDs, SSDs, and magnetic tapes. This is a world first. 5. Drills four holes in the HDD to destroy the platter 6. Even if the destruction bit is damaged, it can be easily replaced 7. Function to prevent the destruction shaft from coming out after destruction 8. SSDs are bent at 5mm intervals in a wavy pattern to break the circuit board and destroy the IC chips 9. Battery operation is possible even in places without power, enabling on-site work 10. Weight of about 18 kg

Filter

classification
Delivery Time
Location