List of Safety features products
- classification:Safety features
2476~2520 item / All 3241 items
Strong against picking! A security lock that achieves high theft prevention.
- Other security
Implementing internal risk measures such as information leakage and internal misconduct through behavioral analysis! A new corporate risk management approach to prevent risks before they occur.
- Server monitoring and network management tools
- Other security
- Entrance and exit control system
IoT secure authentication technology to prevent "spoofing" in device-to-device communication.
- Encryption and authentication
- Software (middle, driver, security, etc.)
- Embedded Board Computers
Image recognition AI solutions for achieving DX!
- Image analysis software
- Image Processing Equipment
- Other security
It takes time! It's a hassle! But I can't cut corners. If you're struggling with such tasks, this is a must-see. We introduce a revolutionary system that allows you to manage items in an instant!
- Entrance and exit control system
- Production Management System
- Document and Data Management

It takes time! It's a hassle! But I can't cut corners. If you're struggling with such tasks, this is a must-see. We introduce a groundbreaking system from a TV reception manufacturer that allows you to manage items in an instant!
Maspro Denkoh has been manufacturing and developing various television reception devices, including antennas, for many years. By using the groundbreaking management system developed by Maspro Denkoh, you can streamline various tasks that have previously taken a lot of time. * A must-see for those facing these issues! - Managing items by hand - Wanting to accurately manage the inventory of products - Wanting to deter unauthorized removal of items - Wanting to conduct inventory tasks accurately and quickly
To prevent the unauthorized removal of equipment and for security measures! An alarm will notify with sound and light when equipment or products with RF tags are removed!
- Other security
- IC tag
- Other security and surveillance systems

No PC needed! Use RFID for asset management! Prevent unauthorized removal of equipment and enhance security measures! An alarm will notify you with sound and light when equipment or products with RFID tags are removed!
The "Equipment and Product Outgoing Detection Package" handled by Maspro Denkoh is a system that utilizes UHF band RFID to detect the outgoing of equipment and products. 【Issues】 - Managed with a handwritten ledger → Human errors such as omissions occur → Concerns about security, such as unauthorized removals - Managed using security tags → Uncertainty about when to replace the battery; battery replacement is cumbersome The "Equipment and Product Outgoing Detection Package" using UHF band RFID involves attaching tags to the items that need outgoing management. When the tag passes in front of the installed antenna, the antenna reads the tag, and an alarm notifies with sound and light. Additionally, RF tags do not require batteries and can be used semi-permanently. 【Features】 ■ Since all necessary components such as antennas, readers/writers, tags, and software are included in the package, you can easily start the RFID system without a PC as long as you have an AC100V power supply.
Enables safe external use of PCs. Data can be used securely even in locations without a network environment.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Prevent information leaks due to internal misconduct! Eliminate unauthorized use of privileges and rights to take out information to "nothing."
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Using secret dispersal technology to render data meaningless! Safe storage and management on the cloud is possible.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
For sending and receiving important data and large volumes of data! Even if any fragment leaks during transport, the original data remains safe.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Data De-identification Library! A new concept of "de-identification" for data protection and authentication.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
We delivered "Security Box PS-200 (54 doors x 3 units)" to IHI Corporation, Soma Second Factory.
- Personal authentication
- locker
We delivered "Security Box PS-200 (2 units with 54 doors, and 1 unit each with 30 doors, 25 doors, and 6 doors)" to IHI Corporation, Kure Second Factory.
- Personal authentication
- locker
Just by attaching it, you can prevent the stagnation and loss of cart vehicles!
- Other information systems
- Other security
Standard-equipped with a reader-writer and antenna! Indoor RFID reading gate antenna.
- Entrance and exit control system
- Process Control System
- Other production management systems

[Catalog Now Available] A variety of UHF band RFID antennas made by an antenna manufacturer are featured!
Maspro Denkoh offers a diverse lineup of UHF band RFID antennas by applying the antenna technology cultivated through television reception! *Product lineup - Gate antenna with minimal misreads - Wideband high-gain flat antenna - Sheet antenna with a thinnest part of 1.8mm - Handheld racket antenna And more! ◆ For more details, please refer to the PDF data.
Numerous achievements in upgrades from security gates, archives, and important document management!
- IC tag reader/writer
- Other security
- Entrance and exit control system
Introduction of UHF band RFID laundry/linen supply tags that support compression dehydration and achieve high durability!
- IC tag reader/writer
- Other security
- Internal Control and Operational Management
No need for wire fixation, security with self-sounding tags! Enhanced security with tag and gate alarms!
- IC tag reader/writer
- Other security
For shipping at logistics warehouses and security gates at stores! We will introduce main products and case studies.
- Other security and surveillance systems
- Entrance and exit control system
Always diagnose based on new vulnerability information! Introduction to the cloud-based automatic annual vulnerability diagnosis service.
- Software (middle, driver, security, etc.)
- Server monitoring and network management tools
- Other security
High-security, low-cost, and highly convenient file server security software!
- Software (middle, driver, security, etc.)
- Other security
Ideal for continuous vulnerability monitoring of web applications! Annual diagnostic service for monitored web applications.
- Software (middle, driver, security, etc.)
- Server monitoring and network management tools
- Other security
Integration of deletion logs into the IT asset management system is possible! Complete deletion solution for USB-type HDDs.
- Data Erasing
- Other security
Lever handles that give various expressions to doors. You can choose according to your needs and specifications.
- Other security
- Other safety and hygiene products
Available in 5 types of color variations, allowing for color coordination that suits your interior!
- Other security
- Other safety and hygiene products
Sliding doors are now in the keyless era! With automatic locking, there's no more forgetting to lock the door.
- Other security and surveillance systems
- Other security
Deadlock function with double-sided button type! The handle can be selected between lever type and knob type!
- Other security and surveillance systems
- Other security
Are you missing important keys? Losing keys can lead to unauthorized activities.
- Other security
The number of combinations is 16,384! Mechanical button lock with automatic locking and knob type.
- Other security and surveillance systems
- Entrance and exit control system
Leave the enhancement of web security to us!
- Other security
- Other services
A network that never stops, 24 hours a day, 365 days a year! Supporting smart factories.
- Wireless LAN
- Server monitoring and network management tools
- Other security

Exhibiting at the 6th Smart Factory Expo. Providing an uninterrupted wireless LAN environment and robust security measures for factories. "Supporting factories with a strong network - Promoting DX in the manufacturing industry with Allied Telesis."
Allied Telesis, Inc. (Headquarters: Shinagawa, Tokyo; President: Akira Oshima) will exhibit at the 6th Smart Factory EXPO, which will be held at Tokyo Big Sight (Tokyo International Exhibition Center) from January 19 (Wednesday) to 21 (Friday), 2022. The Smart Factory EXPO, now in its sixth edition, is a trade show focused on the "Manufacturing IoT" sector, which is essential for the rapidly expanding market of "smart factories." In the manufacturing industry, where various challenges such as labor shortages, employee safety management, and responses to production line stoppages are piling up, smart factory implementation and DX (Digital Transformation) are considered to lead to fundamental solutions. At our booth, themed "Supporting Factories with Strong Networks - Promoting Manufacturing DX with Allied Telesis," we will introduce solutions and services to realize DX in the manufacturing industry. We will showcase methods for strengthening networks not only for various devices used within factories but also for connecting between factories and between locations and headquarters. *For more details, please refer to the PDF materials or related links.
Visionline is a server-based access management system that offers ease of use and a wealth of features.
- Other security
- Other network tools
- others

International Hotel and Ryokan 500th Issue Commemorative Seminar
Dates: August 17 (Tuesday) - 18 (Wednesday), 2021 10:00 AM - 4:00 PM * Four courses, a total of eight courses will be offered. Venue: Tokyo Metropolitan Industrial Trade Center, Hamamatsucho Building, 4th Floor Conference Room (2 minutes on foot from Yurikamome Takeshiba Station, 5 minutes on foot from JR Hamamatsucho Station) Simultaneous Event: Tokyo Bridal Academy (Hosted by Bridal Industry Newspaper) "Hotel Access Solutions: Future Prospects of Global Standards" Daiichi Fukao, President and CEO, ASSA ABLOY Global Solutions Japan The card key system adopted in many hotel rooms. The advancement of technology is remarkable, with the IoT-enabled card locks and mobile keys that allow smartphones to be used as room keys. Global hotel chains are incorporating these latest technologies into their hotel programs, leading to smarter check-in processes and seamless guest experiences, thus creating new value for guests. Experts will discuss the latest access solutions closely related to improving hotel operational performance and their potential.
Are you deleting the data on the hard disk when disposing of computers and servers?
- Data Erasing
- Other contract services
It is also possible to change and control the security system settings remotely from the confirmation call!
- Other security
- Other services
This is an all-in-one package that easily creates the necessary environment for telework, aimed at measures against the new coronavirus and Olympic congestion.
- Firewall and intrusion prevention
Security solutions for a highly ICT-oriented society, including AI and autonomous driving.
- Other security
- cabinet
You can manage accounts, organizations, groups, and mailing lists in bulk!
- Software (middle, driver, security, etc.)
- Other security
With button clicks for "arrival at work, leaving work, going out, and returning," you can record time and register attendance!
- Software (middle, driver, security, etc.)
- Entrance and exit control system
Highly supports maritime container transportation! Core business management functions for international freight transport integrated into one system!
- Cost Management System
- Entrance and exit control system
- Other information systems
Quickly detect incidents using artificial intelligence and prevent escalation!
- Other security and surveillance systems
- Other security
A tool for easy implementation and immediate operation of database auditing with auditability and maintainability.
- Data Erasing
- Other security and surveillance systems
USB memory with fingerprint authentication that is safer than password authentication is available for loan.
- Personal authentication