List of Safety features products
- classification:Safety features
2026~2070 item / All 3693 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
LCD Type Fingerprint Verification OPG-TP2-PX
- Entrance and exit control system
Door open/close signal magnet switch, outdoor, ODC-59B
- Entrance and exit control system
Fingerprint authentication terminal with display, standalone support, and outdoor compatibility.
- Entrance and exit control system
Would you like to try "Server Disk Shredder 2" on your PC server? You can check the startup and estimate the time for data erasure.
- Data Erasing
- Other server related
Data erasure software for PC servers compliant with the new guidelines from the Ministry of Internal Affairs and Communications.
- Data Erasing
- server
Would you like to try the data erasure software 'USB Disk Shredder' on your Windows device? You can estimate the expected time for erasure.
- Data Erasing
Data erasure software to prevent information leakage from USB memory and external HDDs.
- Data Erasing
- Other security
- Other PCs and OA equipment
Would you like to try the data deletion software "Disk Shredder 7" on your computer? You can check the startup and estimate the deletion time.
- Data Erasing
Disk Shredder 7 Product Introduction Seminar to be held on February 22 (Wednesday)
Invitation to the Product Introduction Seminar (Free) This is a product introduction seminar for the data erasure software "Disk Shredder 7." We will provide an explanation of the product while demonstrating actual erasure operations using the real device. ○ Target Audience - Customers considering measures against information leakage for recycled or discarded computers - Customers currently evaluating information leakage measures in IT asset management - Customers thinking about switching from other erasure software or services - Customers currently using Disk Shredder * Participation for educational or training purposes related to information security is also welcome. * Participation from competitors may be declined. ○ Main Content - What is Disk Shredder (Why is data erasure necessary?) - Comparison with previous versions - Comparison with other companies' data erasure software - Case studies - Product demonstration using actual devices (we will erase SSDs/HDDs) - Q&A session ○ Participation Benefits - We will provide a working verification disk for Disk Shredder 7.
We provide IT security services that contribute to risk avoidance!
- Other security
We will develop a safety device that utilizes technology, not relying solely on human strength. Scheduled for sale in spring 2023.
- Other security
This is a pseudo touchless plate for a wireless touch switch.
- Entrance and exit control system
Alert and reporting status is clear at a glance! A multi-channel controller with an integrated graphic panel.
- Entrance and exit control system
Alert and reporting status is clear at a glance! A multi-channel controller with an integrated graphic panel.
- Entrance and exit control system
Secure Slim Reader NVII GGS-NC71
- Entrance and exit control system
Secure Slim Reader NIII GGS-NC31
- Entrance and exit control system
Next-generation access control system
- Entrance and exit control system
Multi-remote control switch transmitter DMR-10T
- Entrance and exit control system
A compact laser sensor that detects in three dimensions with a 4-column laser curtain. It can be easily adjusted and set up with a dedicated remote control.
- Entrance and exit control system
The position of the numbers on the keypad changes every time you use it; it is a high-security keypad.
- Entrance and exit control system
Every time you use it, the position of the numbers on the panel's keypad changes; it is a high-security keypad.
- Entrance and exit control system
Every time you use it, the position of the numbers on the panel's keypad changes; it is a high-security keypad.
- Entrance and exit control system
A smart padlock that can be opened with a smartphone app! Introducing a padlock system that supports your company's digital transformation (DX).
- Other security
- Other security and surveillance systems
From diagnosis to countermeasures for the security environment! We provide total support for information security systems in the office.
- Integrated operation management
- Other security
- Firewall and intrusion prevention
Achieve automatic PC locking when away! Accurately track PC operating time! Implement labor management and security measures with a single card!
- Entrance and exit control system
- Personal authentication
- Personnel and Labor
Achieve automatic PC locking when away! Accurately track PC operating time! Implement labor management and security measures with a single card!
- Entrance and exit control system
- Personal authentication
- Personnel and Labor
Automate business processes with appropriate judgment through log acquisition! Achieve labor management and security measures simultaneously!
Do you have any concerns regarding labor management and security measures? When you are suddenly called away from your PC in the office, there is a worry about information leakage due to forgetting to lock Windows when stepping away while working in an external space. Additionally, there are challenges related to management in telework, long working hours, and inefficient working times... issues arising from the diversification of work styles. For those facing such concerns, we recommend the PC Auto Lock Smart Card "Iltone," which automatically locks your PC when you step away for a few seconds and automatically logs you in when you return. With this one card, you can simultaneously solve your worries about labor management and security measures! We would greatly appreciate your consideration.
100% protection that does not rely on detection. Enterprise-level endpoint security! Thoroughly protect your PC from malware threats.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
"Network separation" enables work style transformation, BYOD, and telecommuting! It connects various communication methods and systems centered around people.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
The position of the numbers on the keypad changes every time you use it; it is a high-security keypad.
- Entrance and exit control system
All-in-one necessary security measures! Comprehensive network security with high-performance UTM.
- filtering
- Virus software
- Firewall and intrusion prevention
Detect unknown malware that has bypassed traditional antivirus software and minimize damage to the greatest extent possible!
- filtering
- Virus software
- Firewall and intrusion prevention
Dedicated Outdoor Box ACS-BOX
- Entrance and exit control system
Rain cover, communication type random keypad model ACS-11T.BK
- Entrance and exit control system
Introducing an IP camera that complies with waterproof standard IP66! It features 360° continuous pan rotation.
- Other security and surveillance systems
- Other security
- Surveillance Cameras
What should we do against increasingly sophisticated cyber attacks? Introducing measures to prevent the spread of viruses!
- Routers, Switches, and Hubs
- Other security
<Security Measures> Introducing measures to prevent the spread of viruses.
We are offering a document summarizing the security measures implemented by SubGate Co., Ltd. It includes "Things to Address in 2022," "Security Measures for 2022," and "Necessary Measures for Supply Chain Attack Prevention," among other virus prevention strategies. Our security switch, 'SubGate,' protects your network. [Offered Materials] ■ Things to Address in 2022 ■ Security Measures for 2022 ■ Necessary Measures for Supply Chain Attack Prevention ■ [Fear Newspaper] True Scary Stories, Episode 1 ■ [Fear Newspaper] True Scary Stories, Episode 2 *For more details, please refer to the related products and catalog, or feel free to contact us.
A security solution that enables intuitive network operations.
- Other security
Security solution "SubGate"
"SubGate" is a network internal security solution that automatically detects and blocks security threats occurring within the network, enhancing the stability of network services and the convenience of operations. It protects the network with patented technology from Special Publication 2011-523822 "Access Level Security Device and Security System." The MDS engine analyzes traffic based on behavior and automatically detects and blocks harmful traffic without degrading switch performance. *For more details, please refer to related products and catalogs, or feel free to contact us.
We will introduce the key points of issues that require strengthened measures and security switches!
- Routers, Switches, and Hubs
- Other security
Things to address in 2022
In preparation for the day when measures to prevent the spread of viruses become even more essential, we would like to introduce the actions to be taken in 2022. Key points for strengthening measures include the "amendment of the Personal Information Protection Law," the "amendment of the Electronic Bookkeeping Law," and "measures for telework PCs." Our security switch, 'SubGate,' allows for easy internal measures. It is suitable for preventing the spread of computer viruses, detecting and blocking harmful traffic, and preventing eavesdropping on internal IP phones and confidential data. *For more details, please refer to related products and catalogs, or feel free to contact us.
Supply chain attacks are on the rise! Real-time detection and prevention of the spread of worms, viruses, and more.
- Routers, Switches, and Hubs
- Other security
What is necessary for countering supply chain attacks
There has been a rapid increase in supply chain attacks that target the group companies, contractors, and suppliers of a target, using them as a foothold to infiltrate the target company. Since it is difficult to penetrate large corporations with strong security measures, attackers often aim for smaller companies that have less comprehensive security measures. Therefore, we recommend 'SubGate' for supply chain attack countermeasures. *For more details, please refer to the related products and catalog, or feel free to contact us.
The fear of dangerous supply chain attacks! Use the ultimate technique of excellent behavior detection to contain the fierce attacks!
- Routers, Switches, and Hubs
- Other security
Terrifying News: A Truly Scary Story - Episode 1
In the horror news, we introduce truly scary stories. The first story is about "The Fear of Dangerous Supply Chain Attacks." "There were attacks targeting the supply chains of major Japanese manufacturers," and "a subsidiary's subcontractor messed up," leading to damage that spread from subcontractors to subsidiaries and then to parent companies. In such times, the security switch 'SubGate' protects the network. With its excellent behavior detection capabilities, it can block harmful traffic, prevent the spread of viruses, and stop data theft. *For more details, please refer to related products and catalogs, or feel free to contact us.*
The damage that occurred just from bringing the telework PC back to the company! Containing the cluster with a special move!
- Routers, Switches, and Hubs
- Other security
Terrifying News: A Truly Scary Story, Episode 2
In the horror news, we introduce truly scary stories. The second episode is about "Just bringing the telework PC back to the company...". There have been incidents such as "connecting the telework PC to the company's LAN," "the fear of home clusters," and "the emergence of corporate clusters from returned PCs." In such times, the security switch 'SubGate' protects the network. With its excellent behavior detection capabilities, it can block harmful traffic, prevent the spread of viruses, and stop data theft. *For more details, please refer to the related products and catalog, or feel free to contact us.
We are introducing how to prevent sophisticated cyber attacks and what should be done!
- Routers, Switches, and Hubs
- Other security
[Data] Security Measures in 2022
This document introduces security measures for 2022 on how to address increasingly sophisticated cyber attacks such as EMOTET, ransomware, and supply chain attacks. It includes sections on "What is EMOTET," "Attack Methods," and "Examples of Attacks on Major Manufacturing Supply Chains." Additionally, it introduces 'SubGate,' which helps prevent the spread of viruses. Please make use of this information for your countermeasures. *For more details, please refer to related products and catalogs, or feel free to contact us.
This is a card reader dedicated to the entry and exit management system ACsmart/ACsmart2.
- Entrance and exit control system
This is a card reader specifically for the entry and exit management system ACsmart/ACsmart2.
- Entrance and exit control system
Investigating major vulnerabilities that are easily exploited and have a significant impact!
- Other security