List of Safety features products
- classification:Safety features
2521~2565 item / All 3247 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Leave the enhancement of web security to us!
- Other security
- Other services
A network that never stops, 24 hours a day, 365 days a year! Supporting smart factories.
- Wireless LAN
- Server monitoring and network management tools
- Other security
Exhibiting at the 6th Smart Factory Expo. Providing an uninterrupted wireless LAN environment and robust security measures for factories. "Supporting factories with a strong network - Promoting DX in the manufacturing industry with Allied Telesis."
Allied Telesis, Inc. (Headquarters: Shinagawa, Tokyo; President: Akira Oshima) will exhibit at the 6th Smart Factory EXPO, which will be held at Tokyo Big Sight (Tokyo International Exhibition Center) from January 19 (Wednesday) to 21 (Friday), 2022. The Smart Factory EXPO, now in its sixth edition, is a trade show focused on the "Manufacturing IoT" sector, which is essential for the rapidly expanding market of "smart factories." In the manufacturing industry, where various challenges such as labor shortages, employee safety management, and responses to production line stoppages are piling up, smart factory implementation and DX (Digital Transformation) are considered to lead to fundamental solutions. At our booth, themed "Supporting Factories with Strong Networks - Promoting Manufacturing DX with Allied Telesis," we will introduce solutions and services to realize DX in the manufacturing industry. We will showcase methods for strengthening networks not only for various devices used within factories but also for connecting between factories and between locations and headquarters. *For more details, please refer to the PDF materials or related links.
Visionline is a server-based access management system that offers ease of use and a wealth of features.
- Other security
- Other network tools
- others
International Hotel and Ryokan 500th Issue Commemorative Seminar
Dates: August 17 (Tuesday) - 18 (Wednesday), 2021 10:00 AM - 4:00 PM * Four courses, a total of eight courses will be offered. Venue: Tokyo Metropolitan Industrial Trade Center, Hamamatsucho Building, 4th Floor Conference Room (2 minutes on foot from Yurikamome Takeshiba Station, 5 minutes on foot from JR Hamamatsucho Station) Simultaneous Event: Tokyo Bridal Academy (Hosted by Bridal Industry Newspaper) "Hotel Access Solutions: Future Prospects of Global Standards" Daiichi Fukao, President and CEO, ASSA ABLOY Global Solutions Japan The card key system adopted in many hotel rooms. The advancement of technology is remarkable, with the IoT-enabled card locks and mobile keys that allow smartphones to be used as room keys. Global hotel chains are incorporating these latest technologies into their hotel programs, leading to smarter check-in processes and seamless guest experiences, thus creating new value for guests. Experts will discuss the latest access solutions closely related to improving hotel operational performance and their potential.
Are you deleting the data on the hard disk when disposing of computers and servers?
- Data Erasing
- Other contract services
It is also possible to change and control the security system settings remotely from the confirmation call!
- Other security
- Other services
This is an all-in-one package that easily creates the necessary environment for telework, aimed at measures against the new coronavirus and Olympic congestion.
- Firewall and intrusion prevention
Security solutions for a highly ICT-oriented society, including AI and autonomous driving.
- Other security
- cabinet
You can manage accounts, organizations, groups, and mailing lists in bulk!
- Software (middle, driver, security, etc.)
- Other security
With button clicks for "arrival at work, leaving work, going out, and returning," you can record time and register attendance!
- Software (middle, driver, security, etc.)
- Entrance and exit control system
Highly supports maritime container transportation! Core business management functions for international freight transport integrated into one system!
- Cost Management System
- Entrance and exit control system
- Other information systems
Quickly detect incidents using artificial intelligence and prevent escalation!
- Other security and surveillance systems
- Other security
A tool for easy implementation and immediate operation of database auditing with auditability and maintainability.
- Data Erasing
- Other security and surveillance systems
USB memory with fingerprint authentication that is safer than password authentication is available for loan.
- Personal authentication
Small transmitter
- Remote Control
- Other PCs and OA equipment
- Entrance and exit control system
We will shut out suspicious individuals and outsiders!
- Other security
I want to manage visitor access in a commercial building!
- Other security
I want to be able to report automatically in case of an emergency!
- Other security
Easily prevent laptop theft even while on business trips or outings!
- Other security
The definitive version of the security wire! It is effective in preventing theft of the computer itself.
- Other security
The wire is coiled, making it convenient to carry and not cumbersome when transporting.
- Other security
MicroSaver DS Security Cable featuring high-performance flat keys.
- Other security
The definitive security wire! You can manage two devices with one key.
- Other security
Shutting out suspicious individuals and outsiders! Strict restrictions on visitor access will be enforced.
- Entrance and exit control system
- Encryption and authentication
- Other security
It can be put into operation on the same day simply by installing it on the target client PC and performing the initial setup.
- Other security
- Firewall and intrusion prevention
You can avoid the risk of virus infection via USB memory.
- Other security
Proactive security measures! Effective against targeted attacks that exploit vulnerabilities!
- Firewall and intrusion prevention
Compatible with PCs and mobile phones! A monitoring and control device that can respond quickly even in emergencies.
- VPN/Wide Area Ethernet
- Other security
- Other security and surveillance systems
Centralized management of Apple’s Mac, iPhone, and iPad with Microsoft’s Active Directory!
- Other operation management software
- Other services
- Personal authentication
Prioritizing comfort and convenience for people working in the office.
- Other security
- Other information systems
By simply connecting a USB, it is possible to investigate the possession of personal information! It prevents the leakage of confidential information in advance!
- Other security
We propose IoT-focused consulting backed by the experience and achievements of a group of security experts.
- Other security
- Other services
Automatic collection and visualization of access rights + audit support made easy and low-cost.
- server
- Other security
Protects the company's PC from vulnerabilities when there are no users present.
- Software (middle, driver, security, etc.)
- Entrance and exit control system
- Other security
An event registration system that does not store "customer information" in the cloud. Easy to implement as it is more likely to receive internal approval [Catalog available].
- Entrance and exit control system
- Other information systems
- SFA/Sales Support System
Introducing LTE-X technology! LTE technology can now be provided across various infrastructures!
- Encryption and authentication
- Other network tools
- Server monitoring and network management tools
You can utilize a wide range of features such as history management and prevention of unauthorized access due to loss!
- Other security
- Other security and surveillance systems
Instant automatic recovery from tampering in less than 0.1 seconds! SaaS-based instant tampering detection and recovery service.
- Server monitoring and network management tools
- Other security
Patent obtained! Endpoint security that does not seek threats.
- Firewall and intrusion prevention
- Other security
Cloud-era security archive application for Windows!
- Other security
High-precision defense with AI! Utilizing artificial intelligence algorithms to achieve predictive defense and prevention against cyber attacks.
- Other security and surveillance systems
- Other security