List of Safety features products
- classification:Safety features
766~810 item / All 1112 items
Manage jack pressure and remotely check hydraulic and water pressure measurements without manual intervention! Quickly and safely obtain data without entering the installation site!
- Other measuring instruments
Even with water, you can stick it as is! This sheet is also excellent in weather resistance. It can reduce the time and effort needed for repairing joints and cracks.
- Reinforcement and repair materials
- Renovation and repair methods
By seriously considering information security, you can improve the organization's constitution.
- Security Assessment
We provide information security audits based on the Ministry of Economy, Trade and Industry's "Information Security Audit System."
- Security Assessment
Vulnerability assessment service using cloud service infrastructure!
- Security Assessment
Controller-integrated touch panel LCD non-contact IC card reader!
- Entrance and exit control system
- Entrance/exit management and personal identification system
The entrance and exit management device has become "smaller" and "more stylish" up to this point.
- Entrance and exit control system
- Entrance/exit management and personal identification system
A detailed explanation of brain-like (neuromorphic) computing, which is fundamental to the advancement of AI technology and the basis for neurochips!
- Other Software
- Security Assessment
Thoroughly eliminate photo hacking of facial recognition! "Impersonation detection technology" to determine whether it is biometric or not.
- Entrance and exit control system
- Digital Certificate
- IoT
[Patent Obtained] We have obtained patents related to gaze detection technology and biometric (spoofing) determination technology.
We have obtained a patent related to gaze detection technology and biometric (spoofing) determination technology.
Changing the common sense of telework device management and IT asset management! We can visualize work processes!
- Security Assessment
- Other Software
Equipped with various features such as log management and device restrictions! A case where centralization led to a reduction in man-hours.
- Security Assessment
- Other Software
A one-stop solution for corporate fraud prevention that is considerate of users and strict on attackers!
- Security Assessment
- Other Software
Evolving security measures made safer and simpler! We offer a variety of advanced features to meet diverse needs.
- Security Assessment
You can't just say you didn't know! Introducing solutions to prepare for the revised Personal Information Protection Law.
- Other security systems
- Other Software
- Security Assessment
A safe business environment on the web without the need to be aware of security. Web security with numerous implementation results.
- Security Assessment
Leave it to us for support with the "SECURITY ACTION" declaration!
- Security Assessment
- Other Software
The definitive version of vehicle entry and exit management!
- Security guards and entrance/exit management
- Entrance and exit control system
- Vehicle Management System
Count the number of people in the facility using the people counting feature.
- Entrance and exit control system
- Security cameras and surveillance systems
- Video Monitoring System
If you're unsure about IT asset management tools, choose SS1.
- Traceability
- Entrance and exit control system
In addition to managing people's entry and exit to each security area, we manage presence information. We support the enhancement of security, safety, and peace of mind, as well as the improvement of ...
- Entrance and exit control system
It is said that a small nameplate type was impossible with UHF band RFID! In addition to attendance management, presence tracking, and flow management, it can also be used for roll calls during disast...
- Entrance and exit control system
We will support you in minimizing security damage!
- Other Software
- Security Assessment
Providing continuous operational services tailored to the customer's environment!
- Security Assessment
- Other Management Services
The first step in security measures is a security assessment!
- Security Assessment
Providing solutions for the collection and analysis of security logs, visualization of LAN communications, and risk response!
- Security Assessment
We will assist you with the new standard BIMI for displaying brand icons in emails, including measures against spoofing emails and issuing logo certificates.
- Digital Certificate
Significantly contributes to countermeasures against spoofed emails by combining DMARC/25 with diagnostic consulting services.
- Security Assessment
Streamlining the complex management of ID cards, such as access rights. Reducing the risk of unauthorized entry due to security laxity.
- Entrance and exit control system
To prepare for the increasing risk of information leaks due to cyber attacks! Flexible responses are possible!
- Other Software
- Security Assessment
Realize the QR code conversion of large-capacity data such as important documents, videos, and audio! It enables high-security operations with just a smartphone and a QR code!
- Entrance and exit control system
Up to 1500 registered users! Unlock and lock with facial recognition! A low-cost and compact access control system.
- Entrance/exit management and personal identification system
- Entrance and exit control system
Face recognition with mask on, request to wear a mask, entry refusal possible due to abnormal body temperature! Compact AI face recognition access control system equipped with a thermal camera.
- Entrance and exit control system
Large-scale user-oriented thin client system!
- Security Assessment
- Knowledge Sharing System
- Other Software
Supporting risk measures to protect the organization's critical data!
- Security Assessment
- Other Management Services
- Labor Management System
A new entry and exit management system that provides only valuable information!
- Security guards and entrance/exit management
- Entrance and exit control system
Utilize our personnel to reduce costs for SIRT collection!
- Security Assessment
- Firewall
4.3-inch touch screen, face recognition distance 0.5m-1.5m, 500 faces + cards, wall mount + table stand
- Other measuring instruments
- Entrance and exit control system
This is a handheld thermal imaging camera specially designed for temperature measurement. It can quickly detect temperature anomalies and equipment abnormalities.
- Other measuring instruments
- Nursing care products
- Security Assessment
Specially designed for body temperature measurement with a measurement range of 30 to 45°C and an error of ±0.5°. AI features such as facial recognition prevent false detection. Most other products ar...
- Other measuring instruments
- Nursing care products
- Security Assessment
The introduction of temperature measurement using thermography in Hakusan City, Ishikawa Prefecture was featured on NHK News.
In Hakusan City, Ishikawa Prefecture, an article was featured on "NHK News" about the implementation of temperature checks for visitors at entrances using handheld thermal imaging devices sold by our company as a measure against the novel coronavirus in government buildings. Handheld thermal imaging devices are portable and can instantly measure high temperatures, making them ideal for temperature checks at the entrances of various facilities. As a measure against the novel coronavirus, the introduction of temperature checks using thermal imaging is increasing in schools, hospitals, and businesses.
Designed specifically for temperature measurement, with a measurement range of 30 to 45°C and an error margin of only ±0.5°. It can also prevent false detections using facial recognition AI.
- Other measuring instruments
- Nursing care products
- Security Assessment
Abolishing the mailing of USB memory! Introducing a case that achieves safe and speedy handover (Crypto Delivery).
- Firewall
- others
Achieving a speed-up in business! Introducing a case where the production time for design was significantly shortened (Crypto Delivery).
- Firewall
- others
Introducing a case study that achieved enhanced security and single sign-on with the internal information infrastructure! (Crypto Delivery)
- Firewall
- others
Send all documents encrypted with TLS! A case study of achieving secure file transfer (Crypto Delivery)
- Firewall
- others
Achieve minimization of information risk due to misdelivery by utilizing a closed transmission function for the transfer of personal information of insurance subscribers (Crypto Mail).
- Firewall
- others
Secure transfer of personal information and automation of file sending and receiving! Achieving significant cost reduction and improved operational efficiency (Crypto Delivery).
- Firewall
- others
Abolish the transfer of personal information on physical media such as CD-ROMs and USB drives! Significantly reduce the risk of leaks and the burden of media management!
- Firewall
- others