List of Safety features products
- classification:Safety features
1576~1620 item / All 3692 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
What is necessary to make remote work secure and safe?
- Other security
With SeciossLink, you can log in to the academic authentication service using your Microsoft Entra ID account information.
- Other security
Ideal for realizing the GIGA School Concept. An access control service necessary for the next generation of school administrative DX. Creating an environment where students can learn safely and staff ...
- Other security
No changes to VPN devices or network configuration are necessary. Secure remote connections to Windows OS and Linux OS are achieved.
- Other security
Leave automotive security consulting to us.
- Other security
Share important files securely! Solve security issues like the PPAP problem.
- Encryption and authentication
Suprema's new flagship device BioStation3
- Other security
We offer two types of aisle widths! Compact and simple, making it suitable for labor-saving in various locations.
- Other security
By balancing safety and usability, we have achieved a security gate that is easy for anyone to use!
- Other security
Create an open space that integrates with the entrance, allowing everyone to spend time comfortably!
- Other security
Excellent cost performance! Introducing our flapper gate.
- Entrance and exit control system
For labor-saving tasks such as ticket validation! An LCD display is built into the ticketing section.
- Entrance and exit control system
A classic model of the flapper gate! It has numerous achievements in public racing venues nationwide.
- Entrance and exit control system
Enhancing security using biometric information from finger veins while also achieving labor-saving during passage! A timer function allows for the setting of access restrictions as well.
- Personal authentication
Realizing various services and SSO integration.
- Other security
Software for centralized management of IDs scattered across multiple systems.
- Other security
Possessing achievements and experience/skills in the international market! Responding immediately to unknown threats, detecting zero-day attacks, and proactively defending.
- Firewall and intrusion prevention
Devices facing the internet, such as firewalls and mail servers!
- Other security
Over 1,600 high-quality diagnoses annually! Re-diagnosis is possible as many times as needed with one year of after-support.
- Other security
AI technology to detect zero-day attacks! Conducting inspections through a unique four-phase process.
- Other security
Supporting safe business operations! A specialized team provides centralized monitoring of all networks.
- Other services
- Firewall and intrusion prevention
[Introduced in a comic] What is the best protective frame for renovation work in family apartments?
- others
- Firewall and intrusion prevention
We will share and accumulate data on the entry and exit situation at the site.
- Entrance and exit control system
Why we are promoting DX! An explanation of the risks of not promoting it and key points for success.
- Other services
- Other security
Reduce the risk of external intrusion! Cut labor costs through automation and unmanned operations! Also useful for understanding and managing the number of people in the facility!
- Entrance and exit control system
We protect information assets with authentication via IC cards and encryption technology!
- Encryption and authentication
Protect your information assets from the latest threats. UTM for small businesses.
- Other security
Equipped with an intuitive and easy-to-understand touch screen! Authentication management with a PIN code.
- Entrance and exit control system
Introducing how facial recognition will become rooted in our lives in a column format!
- Personal authentication
Introducing the future prospects of facial recognition technology in a column, incorporating specific examples!
- Personal authentication
Drip-proof mechanism (equivalent to IPX5), slim (13mm) surface-mounted ◎ Can be installed in various locations, both outdoors and indoors.
- Other security
- Entrance and exit control system
To set an appropriate password! An explanation of weak passwords and attack methods.
- Encryption and authentication
- Other security
Explaining examples of dangerous passwords and methods to prevent unauthorized access by third parties!
- Encryption and authentication
- Other security
The reality of password management in companies! A column explaining the measures that should be taken.
- Other security
- Integrated operation management
- Encryption and authentication
A detailed explanation of the importance and key points of password management in a column!
- Other security
- Integrated operation management
- Encryption and authentication
Explaining safe password management methods! Also introducing recommended password management tools.
- Other security
- Integrated operation management
- Encryption and authentication
Introduction to the necessity of access control, its basic functions, and types of control methods!
- Encryption and authentication
- Other security
Explaining the causes of damage, examples of damage, and the measures taken by users and companies!
- Other security
An overview and explanation of single sign-on features! We are comparing major tools.
- Encryption and authentication
- Personal authentication
- Other security
A column explaining the advantages and disadvantages of implementation, as well as the methods of single sign-on!
- Encryption and authentication
- Personal authentication
The benefits of single sign-on using SAML authentication! Explanation of the differences with OAuth as well.
- Encryption and authentication
- Personal authentication
Introducing the cloud-based and on-premises types! Also explaining the main features and how to choose.
- Encryption and authentication
- Personal authentication
- Other security
Explaining methods and usage examples! We will also introduce the system for achieving single sign-on.
- Encryption and authentication
- Personal authentication
Explaining the six authentication methods and mechanisms of single sign-on, as well as the four benefits of its implementation!
- Encryption and authentication
- Personal authentication