List of Safety features products
- classification:Safety features
1261~1305 item / All 3254 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Non-contact and speedy entry and exit authentication. Free licenses available for use.
- Entrance and exit control system
An intelligent terminal that supports a variety of authentication methods, from mobile access cards to RFID cards, QR codes, and barcodes.
- Entrance and exit control system
- Personal authentication
In stock! The perfect product for you looking for a card reader due to the semiconductor shortage! OSDP compatible!
- Other Code Readers
- Personal authentication
- Entrance and exit control system
Equipped with an NPU, it achieves high-precision and high-speed facial recognition. Personal information is also strictly protected. Demo kits are available for loan.
- Entrance and exit control system
Starting with invoices and compliance with PCI DSS 4.0. It is related to phishing emails.
- Other security
Introducing the recommended measures announced by the Cabinet Office and the National Police Agency!
- Other security
It's the same as not having antivirus software installed! The impersonated party will bear liability for damages.
- Other security
Reselling of trade secrets and personal information of customers. Various things are being targeted.
- Other security
The methods are becoming more sophisticated! If a business partner is impersonated, will the employees notice?
- Other security
It is a low-cost, high-security embedded card reader.
- Other security
- Entrance and exit control system
Integrated management of documents, images, drawings, and videos! Ideal for record management compliant with the Electronic Bookkeeping Preservation Law and the Invoice System.
- Encryption and authentication
Centralized management of necessary related information such as drawing management, technical information management, document management, revision history management, and parts deployment information...
- Encryption and authentication
A serial transfer service that enables control of remote RS-232C devices by sending an email to a specified email address.
- Other network tools
- Other security
- Other security and surveillance systems
The catalog for the "LTE-compatible remote monitoring device" has been updated.
We have updated the catalog for the "LTE-Compatible Contact Remote Monitoring Device." Remote monitoring of infrastructure sites with peace of mind. Main featured products: ■ LTE-Compatible Contact Remote Monitoring Device "IP3-LP4-2" ■ LTE-Compatible Contact Remote Monitoring Device "IP3-LP8-2" ■ LTE-Compatible Contact Remote Monitoring Device "IP3-LP20" ■ Remote Monitoring ASP Service "MiHarry 2"
Streamline operations with cloud management and complete entry and exit management in one stop! Customization options such as function expansion are also available.
- Other security
Achieving cost reduction for management companies and ensuring safety and convenience for residents in two modes!
- Entrance and exit control system
- Other security
There are also cases where the employee's workload was reduced by "233 hours per month."
- Entrance and exit control system
- Other office supplies
- Other information systems
Achieve high security with comprehensive basic features! Introducing a shredder that protects your privacy.
- Other security
- Other office supplies
Slim body high cost-performance model
- Other security
- Other PCs and OA equipment
Flexible access control! Face recognition can be performed while walking without stopping, thanks to behavior detection functionality.
- Entrance and exit control system
Passenger counting sensor for railway and vehicle applications.
- Entrance and exit control system
Generate a one-time disposable password! It enables stronger authentication than a fixed password.
- Encryption and authentication
A dedicated device for OTP token authentication as an alternative to smartphone apps.
- Personal authentication
It is a dedicated card standard reader for embedded use.
- Other security
- Entrance and exit control system
Just by connecting, your monitor or TV transforms into a viewer for IP camera surveillance! It can display video from up to 32 cameras and supports 4K display.
- Surveillance Camera System
- Other security and surveillance systems
- Other security
Use Case Introduction: Distribution of Materials - Strong Support for Remote Monitoring of Production Lines!
EIZO Corporation proposes "IP Solutions" to support the efficiency of monitoring production lines. We have published a PDF introducing use cases. Please take a look. ◆ Do you have any of these concerns? ◆ - When an anomaly occurs on the production line, it is necessary to go to the site each time to check the situation. - In an office away from the production line, it is difficult to notice when an anomaly occurs in the production line equipment, making immediate response challenging. We propose products and solutions to solve these issues. Please feel free to contact us after reviewing the materials.
An IP monitor/decoding box that can directly connect up to 32 surveillance cameras and display them simultaneously. It can interact with IoT devices for actionable responses!
- Surveillance Camera System
- Other security and surveillance systems
- Other security
We will exhibit at the Crisis Management Industry Exhibition (RISCON TOKYO) 2023 from October 11 to 13, 2023.
EIZO's booth theme is "Infrastructure monitoring solutions ideal for disaster prevention and security!" Below are three proposed solutions: 1. Disaster and nighttime monitoring using ultra-sensitive cameras 2. Stabilization and efficiency of IP camera video transmission in narrow bandwidth 3. Improved management and inspection efficiency and early detection of problem areas through video and image clarification ★ For more detailed exhibition information, please visit the EIZO website.
This is a newly released smart lock for hinged doors.
- Other security
- Entrance and exit control system
【First EPIC Guide】Introducing the features and operation methods of smart locks!
The guide for the smart lock brand EPIC has been completed. In this issue, we introduce the battery-operated smart lock 'FACEY,' which features Japan's first facial recognition technology, as well as the functions and attractions of the popular high-functionality series 'Flassa,' and information about the convenient cloud feature 'Watchkey.' We also provide detailed proposals for various operational patterns and installation examples regarding the recently upgraded Flassa 1J. ◆What is Flassa 1J? Ideal for rental management Restorative to original condition Compatible with swinging and sliding doors If you have concerns about security or are considering introducing a smart lock, or even if you are not, we encourage you to take a look.
Introducing facial recognition products for security purposes aimed at the digital signage industry!
- Software (middle, driver, security, etc.)
- Personal authentication
No complicated wiring is needed, and of course, no drilling work is required!
- Other security
- Entrance and exit control system
Notice of participation in the 'Rental Housing Fair 2024' from August 6 (Tuesday) to August 7 (Wednesday), 2024.
Enspiration Inc. (EPIC/Lavish/Guub) will be exhibiting at the "Rental Housing Fair 2024" held at Tokyo Big Sight from August 6 (Tuesday) to August 7 (Wednesday), 2024. We will showcase new products such as Japan's first battery-operated facial recognition smart lock and QR code readers, so please feel free to stop by if you have time.
Prevention of email misdelivery and information leakage measures, management of sending logs.
- Other security
- Email/Fax transmission
[Case Study] Understand the Security Measures for Metaverse (VR) Apps!
- Other security
Equipment selection and installation work! Supporting a simple and reliable operational system in a one-stop manner.
- Other services
- Other core systems
- Other security
■ Controller integrated specifically for entrance and exit management ■ Non-contact IC card reader with touch panel LCD ■ Maximum registration capacity of 9999 cards
- Other optical parts
- Other physicochemical equipment
- Other security
■ Direct control of automatic doors, shutters, gate devices, electric locks, etc. ■ Can be installed outdoors due to rainproof design (IPX3) ■ Additional sub-reader units can be added
- Other optical parts
- Other physicochemical equipment
- Entrance and exit control system
■Can be used for various purposes such as visitor management, attendance management, project management, and electronic advertising. ■Can be embedded in walls or mounted exposed, and can also be place...
- Other optical parts
- Other physicochemical equipment
- Other security
Infection control measures with fever can quickly and accurately measure body surface temperature without human intervention! It can operate independently and can be linked with entry and exit systems...
- Other temperature and humidity measuring instruments
- Entrance and exit control system
- Personnel and Labor
■Specialized in card ID reading ■Prioritizing ease of introduction, with simple functionality and low price ■No need for dedicated drivers or apps, making installation easy
- Other optical parts
- Other physicochemical equipment
- Other security
Introducing the "UC-8200 Series" equipped with system failover functionality by Moxa MIL3!
- Industrial PCs
- Other security
Easy to set up and completely wireless! It protects your bike and enjoyment from the risk of theft.
- Other security
Maintaining SPF and DKIM results even after forwarding! We introduce situations where ARC is helpful in our blog.
- Email/Fax transmission
- Other security
- Server monitoring and network management tools
Phishing targeting specific individuals or organizations! Introducing what you need to protect yourself in a blog.
- Other security
- Server monitoring and network management tools
- Email/Fax transmission
Display name impersonation spreading through phishing scams! We introduce the reasons and more in our blog.
- Other security
- Server monitoring and network management tools
- Email/Fax transmission
Linking domain names and IP addresses! Introducing why it's necessary and how to manage it.
- Other security
- Server monitoring and network management tools
- Email/Fax transmission
DMARC is a key measure against spoofed emails! We will introduce methods to identify them in our blog.
- Other security
- Server monitoring and network management tools
- Email/Fax transmission
A very inconvenient situation for both website visitors and owners! Introduction to the blog.
- Other security
- Server monitoring and network management tools
- Email/Fax transmission
Ensure email authentication and protect against external threats! Let's analyze DKIM manually or automatically.
- Other security
- Server monitoring and network management tools
- Email/Fax transmission