List of Safety features products
- classification:Safety features
1126~1170 item / All 3687 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
Manage battery-operated smart locks and wired card readers collectively in the cloud. Usable in residential areas, coworking spaces, etc. Applicable for both new constructions and renovations.
- Other security
Smart lock utilization for unmanned operations! Real-time 24/7 service! Easily understand what is happening anytime and anywhere!
- Other security
On-premises key management software that allows centralized management of all battery-operated smart locks and wired card readers. Compatible with new constructions and renovations.
- Other security
Remote management of server racks for opening and closing! Easy installation without wiring. Since it uses a wireless electronic cylinder, no LAN wiring is needed!
- Entrance and exit control system
Four measures against targeted phishing emails that you can start today, along with an introduction to the characteristics of targeted phishing emails!
- Personal authentication
- ISO-related consultant
Introducing what can be solved with business card management services and tools, along with recommended handling methods!
- Personal authentication
You don't have to change your password regularly, and we will introduce recommended password management methods!
- Personal authentication
Introducing our E-Learning, which is suitable for education on P Mark and ISMS!
- Personal authentication
Introducing how to proceed with operational verification and the items to check during the verification!
- Personal authentication
Introducing the relationship between personal information management systems and privacy marks!
- Personal authentication
Industrial managed switching hub equipped with rich managed features, dual power supply support for DC power input, and SFP slots.
- Routers, Switches, and Hubs
- VPN/Wide Area Ethernet
- Other security
Newly released industrial managed switching hubs "SH-9210F" and "SH-9210AT-POE" equipped with rich managed features, dual power supply support for DC input, and SFP slots.
Contec has developed two industrial managed switching hubs, the "SH-9210F" and "SH-9210AT-POE," equipped with a wealth of managed features for enhanced reliability, dual power supply support for DC power input, two SFP slots, and eight Gigabit ports, and began sales on December 24, 2024. The "SH-9210F" is an industrial managed switching hub compliant with IEEE802.3ab/IEEE802.3u/IEEE802.3 standards, featuring eight Gigabit LAN ports with AutoMDI/MDI-X and auto-negotiation, along with two SFP slots. The "SH-9210AT-POE" is a PoE-enabled industrial managed switching hub that supports PoE power supply compliant with IEEE802.3af and IEEE802.3at, also compliant with IEEE802.3u/IEEE802.3 standards, and features eight Gigabit LAN ports with AutoMDI/MDI-X and auto-negotiation, along with two SFP slots. Both products support dual power supply with DC power input, allowing them to continue operating even if there is a power issue on one side.
No need for troublesome network construction! Introducing lockers and storage units that use QR codes as keys.
- locker
- Encryption and authentication
- Personal authentication
No need for troublesome network construction! Introducing lockers and storage units that use QR codes as keys.
- locker
- Encryption and authentication
- Personal authentication
We use CodeMeter's automatic encryption tool AxProtector to strongly encrypt applications. *Free trial version available.
- Software (middle, driver, security, etc.)
- Encryption and authentication
- Firewall and intrusion prevention
We will exhibit at Hannover Messe 2025 and showcase technologies that comply with the new EU cyber resilience regulations.
Wibu-Systems will showcase its comprehensive CRA-compliant solutions at the exhibition venue. - Protection of software and data integrity The CodeMeter Protection Suite provides a comprehensive security framework equipped with encryption and obfuscation technologies, integrity checks, anti-debugging features, and tamper resistance mechanisms. - Secure authentication The CodeMeter API features encryption technologies such as symmetric and asymmetric encryption and digital signature procedures, enabling seamless integration with digital products and protection against tampering. - Compliance-oriented licensing CodeMeter License Central is a database-based licensing and entitlement management solution that automates the processes of license creation, distribution, and management. This allows for tracking software usage, managing compliance, and conducting software recalls when necessary. Additionally, the handling of personal information and business data complies with the principle of "data minimization."
The third option following USB dongles and software licenses. With CodeMeter, three types can be used together!
- Encryption and authentication
- Software (middle, driver, security, etc.)
We will exhibit at Hannover Messe 2025 and showcase technologies that comply with the new EU cyber resilience regulations.
Wibu-Systems will showcase its comprehensive CRA-compliant solutions at the exhibition venue. - Protection of software and data integrity The CodeMeter Protection Suite provides a comprehensive security framework equipped with encryption and obfuscation technologies, integrity checks, anti-debugging features, and tamper resistance mechanisms. - Secure authentication The CodeMeter API features encryption technologies such as symmetric and asymmetric encryption and digital signature procedures, enabling seamless integration with digital products and protection against tampering. - Compliance-oriented licensing CodeMeter License Central is a database-based licensing and entitlement management solution that automates the processes of license creation, distribution, and management. This allows for tracking software usage, managing compliance, and conducting software recalls when necessary. Additionally, the handling of personal information and business data complies with the principle of "data minimization."
Introducing a thermal camera that measures body surface temperature and monitors temperature to detect signs of fire!
- Other safety equipment
- Other security
Enhancement of cybersecurity protection and improvement of the return on investment for continuous state monitoring programs.
- Other security
- Other services
Introducing the role of the privacy policy within PMS and the necessity of its creation!
- Other security
A monitoring system (measuring device + application) that can measure current, power, and temperature from the distribution board of electrical equipment.
- Other electronic measuring instruments
- Other security
- Other operation management software
[Notice of Video Posting] Current, Power, Temperature, and Other Monitoring System (F&M-Portal)
We are pleased to announce that a YouTube video has been published on the page for our product, the "Current, Power, and Temperature Monitoring System (F&M-Portal)." This product is a monitoring system (measurement device + application) that can measure current, power, and temperature from the distribution board of power equipment. You can find more details from the related products below. Please check the YouTube video as well.
Safe and secure Japanese-made! Certification OK even when wearing a mask and glasses!
- Other office supplies
- Entrance and exit control system
- Personal authentication
By connecting the contacts, it can work in conjunction with electric locks and automatic doors, allowing for unlocking instructions! Achieve stress-free authentication!
- Other office supplies
- Entrance and exit control system
- Personal authentication
Authentication OK in 0.2 seconds! We provide stress-free facial recognition!
- Other office supplies
- Entrance and exit control system
- Personal authentication
Explaining how to "specify as much as possible" the provisions under the Personal Information Protection Act and the purpose of use.
- Personal authentication
Introducing what information is included in personal data and points to consider when obtaining it.
- Personal authentication
Explaining how to obtain and the uses of the My Number Card (Individual Number Card).
- Personal authentication
A detailed introduction to the goals of "realizing a fair and just society," "improving the efficiency of administration," and "enhancing the convenience for citizens."
- Personal authentication
Companies need to establish a system to protect personal information, implement it, and have a mechanism for continuous improvement.
- Personal authentication
Specialized analysts monitor the configuration, operation, and status of security devices such as UTM and IPS 24 hours a day, 365 days a year.
- Firewall and intrusion prevention
- Integrated operation management
Eliminate all files and remove malware! The number one decontamination solution in the domestic market.
- Other security
- Virus software
The email sanitization "Active! zone" collaborates with the attachment sanitization "VOTIRO Disarmer," set to be released in spring 2021.
Qualityia Inc. announces that it will begin releasing its collaboration with Azgent Inc., which primarily provides email sanitization "Active! zone" and network security, for the file sanitization solution "VOTIRO Disarmer" starting in the spring of 2021.
Achieve phishing email countermeasures that do not burden administrators or employees. Compatible with G Suite and Office 365.
- Email/Fax transmission
- Other security
Phishing email countermeasure solution "IRONSCALES" wins the CYBER DEFENSE GLOBAL AWARDS.
The phishing email countermeasure solution "IRONSCALES," sold by Azgent, has won the CYBER DEFENSE GLOBAL AWARDS. IRONSCALES is a phishing email countermeasure solution that performs message delivery, detection, and remediation in the inbox, which is the most affected area by phishing. It not only detects advanced impersonation emails using machine learning but also has the capability to share phishing email information within the organization and isolate it from mailboxes, making phishing countermeasures easy and seamless for both security administrators and employees (email recipients). Additionally, it offers mobile applications for iOS and Android, allowing security administrators to access the IRONSCALES dashboard via the internet while on the go and respond with a single click, thereby reducing the response time for phishing email incidents. [Contact Information] Azgent Inc. E-mail: info@asgent.co.jp
Enhance security simply by adding it as an extension to your familiar browser!
- Other information systems
- Other security
★Free materials available! We have summarized the advantages and disadvantages of facial recognition entrance doors, widely adopted in homes, offices, and commercial facilities, in a simple manner tha...
- Other security and surveillance systems
- Personal authentication
[Expert Explanation] A Must-See! We will teach you the advantages and disadvantages of facial recognition entrance doors!
The facial recognition entrance door is an advanced security system that uses each individual's face as a key, replacing traditional keys and cards. We have prepared a document that clearly summarizes the "advantages of facial recognition doors" and "disadvantages of facial recognition doors." It also includes examples of how to implement it in offices and commercial facilities, as well as its applications in accommodation and nursing facilities, so please use it for consideration of implementation and selection of products suitable for your site.
Compatible with narrow frames that cannot be handled by other products! With a stylish design and high performance, it supports operations tailored to various scenes.
- Entrance and exit control system
We will introduce essential safety measures to prevent accidental information leaks!
- Other security
Introducing safety management measures related to information systems that serve as the business infrastructure of companies!
- Other security
We also introduce cases where individuals are excluded from personal information handling businesses!
- Other security
Many businesses are required to properly protect personal information!
- Other security
We will also introduce information to which "rights regarding personal information" do not apply!
- Other security
Shut out the entry of unrelated vehicles and suspicious vehicles, as well as the leakage of sensitive information!
- Other security
Cardless and online for easy management! Managing and aggregating clock-in and clock-out times is simple.
- Other operation management software
- Entrance and exit control system
- Mobile phones, PHS, data communication cards
Next-Generation Forensics Pioneered by the SQLite Forensic Toolkit
- Virus software
Don't miss "companionship" with AI! Achieving high-performance entry and exit management.
- Entrance and exit control system
Achieve vehicle entry and exit management for factories and facilities!
- Entrance and exit control system
Shutting out unauthorized vehicle access to buildings and factories.
- Entrance and exit control system