List of Safety features products
- classification:Safety features
1666~1710 item / All 3693 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
Secure communication for IoT devices! Safely store certificates and keys on a USB dongle.
- Encryption and authentication
It is an AI facial recognition access control system that can authenticate even with a Suprema mask on.
- Entrance and exit control system
A mail archiving and auditing solution with numerous large-scale user achievements that can handle everything from regular email audits to e-discovery requirements.
- Other security
For those utilizing apps in the manufacturing industry and wanting to know the measures to take before distribution, we will explain knowledge related to app security.
- Other security
It is possible to conduct security evaluations in accordance with ISO/SAE 2143.
- Other security
It is a security service equipped with ID management and authentication functions to protect information assets.
- Other security
We will explain methods and tips for those who find order management difficult!
- Other security
- Other information systems
- Other network tools
Web authentication system using USB keys. Effective security measures. Strong security is possible with one-time passwords.
- Personal authentication
- Other security
The USB dongle "LOCK STAR-PK," which prevents unauthorized copying and use of software, protects the assets of software development manufacturers.
- Development support tools (ICE, emulators, debuggers, etc.)
- Software (middle, driver, security, etc.)
- Encryption and authentication
Virtual function-equipped SSL-VPN remote access solution
- Firewall and intrusion prevention
- Encryption and authentication
- Personal authentication
Ideal for BYOD, no dedicated app required, prevents information leakage from smart devices.
Logical Tech Co., Ltd. will start selling its information leakage prevention system "LOCK STAR-SGateM" (Lock Star SGateM), which uses a screen transfer method and is compatible with any terminal and OS, from March 4, 2013. "LOCK STAR-SGateM" is a screen transfer-based security solution built on a Linux server. This solution operates on browsers that support HTML5, eliminating the need for dedicated applications. Additionally, by utilizing free OS, it allows companies to save on the substantial costs associated with licensing fees. Furthermore, by integrating with the currently available integrated security system LOCK STAR-SGate series, it can accommodate various usage scenarios tailored to corporate needs. Groupware such as Notes, which was previously only usable on PCs, can now be used directly on smartphones and tablets (iPhone, iPad, Android devices) without leaving any data on the device, making it easy and cost-effective, thus providing an optimal environment for BYOD (Bring Your Own Device) utilization.
Combine tape libraries with built-in off-network secure vaults!
- Virus software
- Other security
[Essential for those considering or gathering information] Have you found the best selection that suits your company? An explanation of how to choose the optimal facial recognition system!
- Other security and surveillance systems
- Other security
- Entrance and exit control system
Introducing case studies of business improvements using facial recognition systems in the healthcare/welfare industry! This is essential material for those considering it or gathering information.
- Entrance and exit control system
We will act on your behalf to continuously monitor for information leaks on the Dark Web! Unlike one-time investigations from other services, we will keep monitoring the Dark Web at all times.
- Other security
A solution to avoid patient waiting time stress and congestion in medical facilities, suitable for vaccination appointments and more.
- Entrance and exit control system
We provide total support for influenza and COVID-19 vaccination services!
- Entrance and exit control system
What risks are associated with the use of apps in the manufacturing industry? What security measures are necessary? We will explain app security-related knowledge in an easy-to-understand manner.
- Other security
The long-awaited new model "Novel" has been born in the VingCard series of card locks, which have been implemented in over 8 million rooms worldwide!
- Entrance and exit control system
- Encryption and authentication
- Other security
Introducing the latest model of the VingCard series, "Novel"!
It goes without saying that the VingCard non-contact card lock "Novel" combines the latest security technology with usability and will become the representative model of next-generation card locks for accommodation facilities. Novel captivates guests and hoteliers as a modern, beautiful, and powerful electronic card lock. Mobile access, online integration, and Apple Wallet can also be added quickly when needed. Additionally, Novel is fully committed to environmental protection through the use of sustainable raw materials, lightweight product design, minimized packaging volume, and battery-free options.
Iris authentication systems can be easily integrated into kiosk terminals and similar devices. Iris registration is also simple.
- Entrance and exit control system
Equipped with LED indicators on both sides of the main body. Ideal as a display terminal for conference rooms and waiting areas.
- Industrial PCs
- Other PCs and OA equipment
- Entrance and exit control system
No power or network environment required! Easy to install! Wireless compact fixed lens outdoor camera with 4G LTE solar panel.
- Other security
Calico Open Source (Kubernetes CNI Plugin) Security Upgrade
- Other security
Cloud-based Matrix USB key. It can be operated like a physical dongle via API.
- Other security
"Over 600 camera design achievements" We select manufacturers and cameras tailored to the installation location and purpose, implementing more effective camera designs.
- Other security
- Color camera
- others
Avoiding risks through training for highly sophisticated "targeted attack emails."
- Firewall and intrusion prevention
[Telework Recommended] Securely log in to Windows using two-factor authentication with a smartphone app. *A document introducing the new features will be provided.
- Personal authentication
Addressing new needs! Security has become an indispensable element among customer challenges.
- Other security
In-house diagnosis of a vast number of websites! Achieving cost reduction and increased scope and frequency of diagnosis.
- Other security
Designed as a comprehensive tool for various astronomical research! Compatible with a wide range of data formats.
- Document and Data Management
- Data Erasing
Easy to use and multifunctional for peace of mind! Protecting grandpa and grandma from scam calls and solicitation calls.
- Other security
- Other PCs and OA equipment
Daily body surface temperature measurement and alcohol check with this one device! Identity verification with AI facial recognition.
- Other measurement, recording and measuring instruments
- Other inspection equipment and devices
- Personal authentication
More advanced, more convenient! Products of professional quality recognized by security experts.
- Other security
Support for the construction of small to medium-sized system infrastructure.
- server
- Storage Backup
- Other security
The world's first explosion-proof smartwatch that has passed domestic explosion-proof certification, obtained international explosion-proof standards (IECEx), and can be used in Class 1 hazardous loca...
- Other safety and hygiene products
- others
- Other security
It is a USB card reader compatible with FeliCa/MIFARE standards.
- Other security
- Entrance and exit control system
Easy to install! Nighttime, always-on type. It can be used with solar power in places where power cannot be obtained or during disasters (can be mounted on existing poles or placed directly).
- Other security
Adopting Industry 4.0 with a real-time location information system.
- Entrance and exit control system
- Other information systems
A security camera that can be installed by simply sticking or placing it, allowing you to take pictures from indoors through the window.
- Other security and surveillance systems
- Other security
- Other office supplies
Solar charging and a motion sensor-equipped LED light serve as both a dummy security camera and nighttime lighting.
- Other security
- Other security and surveillance systems
- Surveillance Cameras
Drip-proof mechanism (equivalent to IPX5), slim (13mm) surface-mounted design ◎ Random 10-key display with 7-segment notation.
- Other security
- Entrance and exit control system
Unexpected, yet assured peace of mind. Proven implementation in various industries across the country.
- Other security
It is possible to achieve both safety and convenience! It helps prevent loss and theft, as well as counterfeiting and impersonation. [Free materials available!]
- Other security