List of Other security products
- classification:Other security
1351~1395 item / All 2112 items
Heat resistant up to 1200℃. We will custom-make high-performance insulation covers that ensure safety in the working environment!
- Glass
The number of test items is approximately 20,000! There is a differential report feature that allows comparison with the previous scan results.
- Other security
- Other contract services
24/7 real-time monitoring! Rapid reporting in case of detected alerts with potential dangers.
- Other security
- Integrated operation management
Next-generation SIEM! By creating a parser using regular expressions, it is possible to collect device logs without restrictions.
- Other security
- Integrated operation management
Introducing our services, including managed security services!
- Other security
- Integrated operation management
- Other contract services
Easy operation with a sophisticated settings screen! We provide security features developed for enterprises.
- Other security and surveillance systems
- Other security
We propose and build various systems utilizing QR codes. First, download the catalog. Please feel free to contact us.
- Other security
- Entrance and exit control system
- Production Management System
Management system using two-dimensional codes.
We have published an introduction page for a management system utilizing two-dimensional codes. A two-dimensional code is a code that holds information in both horizontal and vertical directions, meaning it has information in two dimensions. In contrast, a one-dimensional code (barcode), which is currently widespread, holds information only in the horizontal (or width) direction. Barcodes primarily function as identification (ID) codes for products or goods. Two-dimensional codes can embed information about products or goods directly within the code itself. This enables a comprehensive management system for both items and information. Please take a look!
Collaborate with gatekeepers of facilities that handle confidential data! Authentication with fingerprints and ID cards.
- Other security
- Entrance and exit control system
- Personal authentication
Record access logs for PCs and files! A solution that helps in tracking investigations of issues.
- Other security
- Personal authentication
No server needed! Authentication can be done with a 2D code and fingerprint without registering fingerprint data on the device itself.
- Other security
- Entrance and exit control system
Rectangular (horizontal) format is possible! Suitable for security fields that handle facial photos, fingerprint information, etc.
- Other security
- Entrance and exit control system
- Production Management System
We regularly diagnose the security level of AWS and propose configurations that comply with best practices.
- Other security
Equipped with motion detection! Compatible with a variety of camera control protocols.
- Video Recorder
- Other security
- Other security and surveillance systems
Detects multiware intrusions and suspicious communications to external sources! Quickly isolates infected devices from the network.
- Other security
A power supply unit with a control relay, also capable of connecting to a battery! It also has a convenient startup switch that automatically starts charging and using the battery!
- Other security
- Entrance and exit control system
Supports PoE and allows recording via external storage! Compatible with various protocols.
- Other security
- Other security and surveillance systems
- Surveillance Cameras
Achieve high-efficiency video transmission with H.265! The housing is compliant with IP67.
- Other security
- Surveillance Cameras
- Surveillance Camera System
Achieve high-efficiency video transmission with H.265! The housing is compliant with IP67.
- Other security
- Other security and surveillance systems
- Surveillance Cameras
Basic security 'key management'! You can save the history of who took out the key, when, and when it was returned.
- Other security and surveillance systems
- Other security
High reliability and security performance! Used in offices, public facilities, industrial facilities, and educational institutions around the world.
- Other security
- Entrance and exit control system
- Other safety equipment
Examples of the introduction of entrance and exit management, quality control cameras, emergency push buttons, etc.!
- Other security and surveillance systems
- Entrance and exit control system
- Other security
Increased security × enhanced design × integrated solutions! Introducing case studies of Oari.
- Other security
Achieving low-cost biometric authentication with the "Oari" face recognition unit × access control system!
- Other security
Compact and simple! Basic functions are well-equipped! A card reader with excellent cost performance.
- Other security and surveillance systems
- Entrance and exit control system
- Other security
Enhance the reliability of security and mechanical security equipment! DC uninterruptible power supply.
- Other security
- power supply
- Board materials
As a street crime prevention storage box, it has been made more compact for easier installation. Specialized in various functions!
- Other security
Easy installation with general standard cases and compatibility with drivers! Can be easily replaced with a battery-operated IC card lock.
- Other security
- Entrance and exit control system
- Other safety and hygiene products
Achieving high security performance and flexible operation through the fusion of mechanical technology and electronic technology!
- Other security
- Other security and surveillance systems
This is a padlock made with carefully selected materials, outstanding design, and a high-level protection structure.
- Other security
- Other security and surveillance systems
Many facilities that prioritize security have adopted it! Promises reliable operation even in harsh environments.
- Other security
- Other security and surveillance systems
Easy! Reduce the risk of information leakage! Prevent screen captures, screenshots, and unauthorized printing. Mitigate the risk of information leakage from PC screens and printed materials.
- Other security
2 million pixel auto-focus IP bullet camera with 10x optical zoom
- Other security
Easily manage your software supply chain with "HERCULES SecSAM."
- Software (middle, driver, security, etc.)
- Other security
We will exhibit at the 23rd Automatic Identification Comprehensive Exhibition with the new EAS (anti-theft) system using xSpan and the R700 reader/writer!
- IC tag
- Other security and surveillance systems
- Other security
Can be mounted on various devices and equipment! Reference model for information terminals for embedded devices.
- Other information systems
- Other security
We offer a service that detects, notifies, and shares information about illegally parked vehicles using "AI + security cameras" at a low price!
- Other security
This is an essential tool for white hat hackers, featuring a palm-sized Raspberry Pi 4B equipped with the well-known vulnerability testing tool Kali.
- Other security
Access is not allowed until all workers on the project remove the padlock!
- Other security and surveillance systems
- Other security
- Other safety and hygiene products
Provides maximum security when used in combination with the 312 series padlock!
- Other security
- Other security and surveillance systems
- Other safety and hygiene products
Achieve a discreet and smart installation with embedded design! Up to 2000 users can be registered!!
- Other security
- Entrance and exit control system
Achieve a discreet and smart installation with embedded setup! Up to 3000 users can be registered!!
- Other security
- Entrance and exit control system