List of Safety features products
- classification:Safety features
316~360 item / All 3246 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
- Mastered minimal design - iPad floor stand "T5+" Ideal for unattended reception guidance reservation system stand.
- Entrance and exit control system
- Other operation management software
We would like to introduce a case where facial recognition devices were installed at four office entrance doors!
- Personal authentication
By outputting the information from the read card directly as Wiegand, it can be used with controllers and readers compatible with controller modes!
- Personal authentication
From the detection of authentication data to the authentication decision takes about 1 second! It is possible to prevent impersonation using photo images and other means.
- Personal authentication
Encrypt user data! Advanced hardware and software optimized for facial recognition.
- Personal authentication
Modern threats that cannot be prevented by perimeter defense alone! The importance of internal network monitoring.
- Firewall and intrusion prevention
Autonomous security operations & GRC platform "Simbian AI" for 24-hour cyber defense
- Other security
Improve the significant security vulnerability of "people"! Protect employees and the business.
- Software (middle, driver, security, etc.)
- Other security
Improve productivity with simple integrated endpoint management! Protection from mobile threats.
- Software (middle, driver, security, etc.)
- Integrated operation management
- Other security
Introducing a system that allows you to easily create, apply for, approve, and manage work schedules!
- Entrance and exit control system
Leave My Number management within your company to Critem. [Agents wanted]
- Entrance and exit control system
- Surveillance Camera System
- Other security and surveillance systems
Make it easier to lead to Oasis! A new color 'Black' has been added to the panel colors [Agents Wanted].
- Entrance and exit control system
Cybersecurity Solutions - NDR, CTI, and SOC Automation for Advanced Threat Detection 'Gatewatcher'
- Other security
Security measures for OT networks. Dynamically prevent malicious cyber threat activities with IPS/IDS.
- Firewall and intrusion prevention
Introducing the relationship between the Privacy Mark and My Number, along with two points to note and guidelines for safety management measures!
- Other security
We will also introduce the benefits of obtaining a P mark and the personal information held by web production companies and how it is handled!
- Other security
We will also explain the methods of robocalls, the risks for companies, and key countermeasures!
- Other security
I will also explain the advantages and disadvantages of obtaining ISMS!
- Other security
It will also explain how the business size classification for the P mark is determined.
- Other security
Construction and maintenance support for communication and network components! You can leave it to us.
- Other network tools
- Other security
- Communications
You can rely on us for internet connection/VPN setup and maintenance support! No need to worry even without a dedicated person.
- Wireless LAN
- Other security
- Communications
The threat of impersonation: Don't overlook it! The significant risks posed by Active Directory's permission management. Reliable defense achieved by ASM.
- Other security
Interpretation of the Ministry Ordinance establishing technical standards for electrical appliances (R06.05.31) corresponds to Appendix 12!
- Encryption and authentication
- LED fluorescent lamp
Prevent unauthorized access and information leaks! Reliable low-cost support for both setup and maintenance.
- Other contract services
- Other security
DNS monitoring to prevent hacking! If you're new to implementing a WAF, you can trust us to handle it with ease.
- Other security
- Other network tools
A network that can withstand large-scale DDoS attacks! It has a proven track record of defending against 100 Gbps attacks for 9 hours.
- Other security
- Other network tools
For home medical support services and IoT systems like chatting robots, leave it to us!
- Entrance and exit control system
- Production Management System
- Other core systems
Easy integration with high-quality 720P module. Business card size, wiring completed in 10 minutes! Certified for technical standards, no license required, made in Japan, "100% no delay" for optimal p...
- Entrance and exit control system
Real-time aerial footage from a radio-controlled aircraft equipped with a super compact transmission module.
A super compact 2.4GHz high-definition video transmission module (Model = GTV-24TMS, Weight = 60g, Size = approximately 6cm square, Current consumption = 0.25A) is mounted on a remote-controlled aircraft to conduct aerial photography, allowing for real-time playback of video without delay on the ground receiver. ★ It is optimal for professional aerial photography applications with high-definition video! ● For more details about the playback video, you can click on the "Related Information" section below to view it on YouTube. This video is provided with the cooperation of Photec Co., Ltd., which is engaged in aerial photography and image data analysis related to aerial surveying operations. ● Contact email address for inquiries regarding this video = kodama@photec.co.jp
A detailed explanation from the formulation of the information security policy to its operational methods!
- Other security
There is also malicious adware that collects personal information and hacks systems!
- Other security
A Complete Explanation of Distributed Denial of Service Attacks That Even Beginners Can Understand! Introducing Useful Information to Prevent DDoS Attacks.
- Other security
Explanation of the flow of ISMS audits and how to handle non-conformities!
- Other security