List of Safety features products
- classification:Safety features
226~270 item / All 3249 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
While preventing the leakage of confidential document information, important manufacturing know-how such as technical materials and drawings can be safely shared!
- Other security
- Document and Data Management
You can safely share information while protecting important manufacturing know-how such as technical documents and drawings!
- Other security
- Document and Data Management
"Don't miss disaster information, heatstroke warnings, and emergency information emails!" Alerts anywhere via Wi-Fi | Important email notification system for schools and public facilities.
- Other environmental equipment
- Other security
- Data Logger
Immediate response to the "Heat Stroke Warning Alert"! Urgent proposal of heat stroke prevention products that can be used on-site right now.
In response to the "Special Heat Stroke Warning Alert" and the "Mandatory Heat Stroke Measures" that began full-scale operation in June 2025, we are reintroducing our IoT heat stroke countermeasure solutions. The target products are the three series: "Meru Maru-kun + Heat Stroke Alert," "Miharukun PRO," and "Momoko and Ayaka." With this system revision, heat stroke measures have changed from "effort obligations" to "obligations" for all businesses employing workers. As measures are required across all industries and sites, including government agencies, educational institutions, welfare facilities, distribution, and construction, ISA supports the creation of a safe and secure environment through existing products that can be operated immediately. ■ Introduction of three heat stroke countermeasure products (1) Meru Maru-kun + Heat Stroke Warning Alert Email Distribution Service (2) Miharukun PRO (WBGT compatible model) (3) Momoko and Ayaka Environmental Monitoring Solution (environmental monitoring, recording, alerts) ◆ Main industries and achievements of implementation Local governments (offices, evacuation centers, nurseries) Educational institutions (playgrounds, gymnasiums, classrooms) Medical and welfare facilities (nursing homes, disability support facilities) Distribution and construction industries (warehouses, job sites, delivery hubs) General companies (reception areas, warehouses, employee break rooms)
Introducing email threats that bypass gateway security!
- Other security
Easy unlocking with facial recognition! Next-generation IP auto-lock system.
- Other security and surveillance systems
- Entrance and exit control system
Centralized management of employee entry and exit using RFID. A reliable method leveraging DX achievements.
- Entrance and exit control system
- RFID related products and IC tag services
- RFID/IC tags
Packed with tips to improve production efficiency! We have released "30 Case Studies of DX Implementation in Logistics and Inventory Management"!
[Announcement of New Content] We have released "30 Selected Case Studies of DX Implementation in Logistics and Inventory Management"! To those struggling with operational efficiency and cost reduction―― We have published "30 Selected Case Studies of DX Implementation in Logistics and Inventory Management," filled with hints for improving production efficiency. This document clearly presents how actual companies have solved challenges and achieved results through DX (Digital Transformation). It is also packed with the latest trends in the manufacturing and logistics industries. Please make use of it as a reference for improving your company's operations!
Convenient for aggregating data from multiple locations, such as entry and exit data and stamp rallies!
- 2D Code Reader
- Entrance and exit control system
Good for the seller, good for the buyer, good for society! Our simple entry and exit management records have received positive feedback.
- 2D Code Reader
- Entrance and exit control system
For zone management within the facility! In addition to simple applications, it can also be linked with automatic doors and door locks.
- 2D Code Reader
- Other security
Integration with infrared body temperature measurement is also possible! It contributes to improving productivity in event operations.
- 2D Code Reader
- Personal authentication
You can clearly understand the flow of people and goods! It can be used for various purposes such as regional tourism and revitalization of local shopping districts.
- 2D Code Reader
- Entrance and exit control system
Supports both QR codes and FeliCa! Widely applicable for attendance management and entry management.
- 2D Code Reader
- Entrance and exit control system
Effective for preventing ticket resale! In addition to the information in a standard two-dimensional code, hidden characters can be included.
- 2D Code Reader
- Other security
- Encryption and authentication
Data transfer in a network-isolated environment as an alternative to USB memory.
- Data Erasing
Targeted OT networks. How to protect the "invisible areas" of the manufacturing site.
- Firewall and intrusion prevention
- Other security
Implementing internal risk measures such as information leakage and internal misconduct through behavioral analysis! A new corporate risk management approach to prevent risks before they occur.
- Server monitoring and network management tools
- Other security
- Entrance and exit control system
Explaining the specific settings for the screensaver and points to be aware of during the setup!
- Other security
Explaining the high probability of successful unauthorized access known as "trashing"!
- Other security
I will explain in detail the measures that cloud server administrators should take!
- Other security
Points for maintaining a safe internet environment! An explanation of the types and risks when not used properly.
- Other security
A detailed explanation of definitions, types, and countermeasures. This is useful information for those using IT equipment in the workplace.
- Other security
Targeted attack emails are successful if they infect just one person. Let's conduct a participatory training exercise for everyone.
- Other security
It is possible to compile a summary of each employee's clock-in and clock-out times and breakdown of work hours necessary for management!
- Entrance and exit control system
Would you like to prepare for compliance with the Cyber Resilience Act using 'Black Duck SCA', which supports OSS risk management and SBOM creation?
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Health management without contact! Easily usable with smartphones and car cameras, simple measurement.
- Other Software
- Personnel and Labor
- Personal authentication
Grasp the full picture of the network! Integrated monitoring and monitoring solution.
- Integrated operation management
- Server monitoring and network management tools
- Firewall and intrusion prevention
Protecting AI safety! Real-time monitoring and defense to ensure compliance with corporate security and ethical standards.
- Firewall and intrusion prevention
- EAI/ETL/WEB application server
Introducing examples that have made significant contributions to strengthening information security! Achieving high security with minimal burden on users. *Trial version available.
- Software (middle, driver, security, etc.)
- Encryption and authentication
The weather-resistant and waterproof permanent adhesive seal that can be used outdoors allows for the management of outdoor equipment, materials, and assets.
- Other security
- label
- Packaging materials
Achieving faster and smarter investigations: "CCL Digital Forensic Software"
- Other security
[Free trial set available!] A USB dongle for license authentication that protects software and prevents unauthorized copying.
- Encryption and authentication
- Software (middle, driver, security, etc.)
We will exhibit at Hannover Messe 2025 and showcase technologies that comply with the new EU cyber resilience regulations.
Wibu-Systems will showcase its comprehensive CRA-compliant solutions at the exhibition venue. - Protection of software and data integrity The CodeMeter Protection Suite provides a comprehensive security framework equipped with encryption and obfuscation technologies, integrity checks, anti-debugging features, and tamper resistance mechanisms. - Secure authentication The CodeMeter API features encryption technologies such as symmetric and asymmetric encryption and digital signature procedures, enabling seamless integration with digital products and protection against tampering. - Compliance-oriented licensing CodeMeter License Central is a database-based licensing and entitlement management solution that automates the processes of license creation, distribution, and management. This allows for tracking software usage, managing compliance, and conducting software recalls when necessary. Additionally, the handling of personal information and business data complies with the principle of "data minimization."
A useful tool for protecting and encrypting Python applications that are easily decipherable by third parties due to being interpreted.
- Software (middle, driver, security, etc.)
- Encryption and authentication
- Other image-related equipment
We will exhibit at Hannover Messe 2025 and showcase technologies that comply with the new EU cyber resilience regulations.
Wibu-Systems will showcase its comprehensive CRA-compliant solutions at the exhibition venue. - Protection of software and data integrity The CodeMeter Protection Suite provides a comprehensive security framework equipped with encryption and obfuscation technologies, integrity checks, anti-debugging features, and tamper resistance mechanisms. - Secure authentication The CodeMeter API features encryption technologies such as symmetric and asymmetric encryption and digital signature procedures, enabling seamless integration with digital products and protection against tampering. - Compliance-oriented licensing CodeMeter License Central is a database-based licensing and entitlement management solution that automates the processes of license creation, distribution, and management. This allows for tracking software usage, managing compliance, and conducting software recalls when necessary. Additionally, the handling of personal information and business data complies with the principle of "data minimization."
★ High-performance demodulation processing device. Optimal for long-range pseudo-spread spectrum codes that are difficult with IC/LSI! An option to enhance secure communication.
- Personal authentication
"Technical documentation for transmitting images via radio waves" now available all at once!
★ We are releasing a wealth of technical information that includes experience and know-how related to radio laws, antennas, transmitters and receivers, installation, etc., when transmitting video via radio waves. A must-read for all stakeholders! ● When transmitting video via radio waves, we provide a clear explanation of legal considerations, antenna selection, performance evaluation of transmitters and receivers, the latest digital wireless technologies, and installation precautions. ● In explaining video transmission via wireless, we aim to avoid using formulas as much as possible, instead providing clear explanations through text and photos that are easier to understand than formulas. This is essential reading for researchers and salespeople involved in radio operations! ● The author has been involved in wireless operations for 30 years and explains the know-how gained from experience in research, design, manufacturing, and on-site installation in an easily understandable manner within limited pages. ● As we are in an era of energy conservation and efficiency, we hope you will utilize this material to review products related to wireless equipment. ● Considering various individuals engaged in wireless-related fields, we have tried to explain things with minimal use of formulas. We hope this can serve as a helpful resource for enhancing everyone's knowledge.
Monitoring the number of people in a specific area at low cost! What are the benefits of understanding the number of people?
- Other security
Eliminating the need for applying to take out digital cameras and transferring data to PCs increases work efficiency!
- Other security
- Image Transmission Equipment
Installing network infrastructure to support complex digital video transmission at each subway station!
- Routers, Switches, and Hubs
- Other security
- Firewall and intrusion prevention
Security diagnosis to prevent cyber attacks.
- Firewall and intrusion prevention
We would like to introduce a case where the speed of information sharing within the company has significantly improved, allowing us to thoroughly implement the rules for handling shooting data!
- Other security
Safe and secure to use even for telework! Prevents information leaks in advance and strengthens your business.
- Other security
No data is left on the device! Even if the device is lost, it can prevent the risk of information leakage.
- Other security