Safety featuresの製品一覧
- 分類:Safety features
496~540 件を表示 / 全 1138 件
Clear visibility with transparent glass! Recommended for store and building entrances.
- Disaster prevention fittings
- Entrance/Exterior Doors
Protect your website with a variety of security tailored to corporate needs, all in one AIONCLOUD!
- WAF
Initial cost 0 yen / Starting from 5,000 yen per month! No installation required - a corporate access control system that simply attaches to existing doors.
- Entrance and exit control system
- Entrance/exit management and personal identification system
- Security locks (windows, front doors, etc.)
An accurate infrared thermal sensing module with a measurement error of ±0.2℃.
- Entrance and exit control system
We are engaged in a wide range of system development, from manufacturing sites to healthcare and security.
- Inventory Management System
- Entrance and exit control system
A group of experts supports your company! We offer two services specialized in expert personnel.
- Firewall
Have you been receiving suspicious emails lately? Fake invoices from impersonation emails created by ChatGPT and others are being sent to your company.
- Security Assessment
Comprehensive operational services to optimize your hybrid IT infrastructure environment.
- Firewall
We will prevent the threat of account information leakage.
- Security Assessment
Effective protective features that are not dependent on the environment.
- WAF
Security risk measures that companies should consider.
- Security Assessment
- Other security systems
We provide essential services for the security measures of small and medium-sized enterprises in a cost-effective package.
- Security Assessment
Many companies implement "obfuscation" as a method of app protection. Can we say that obfuscation alone is sufficient for app security measures?
- Security Assessment
- Other Software
Examples of implementation by major valve manufacturers, taxi associations in various prefectures, and major building material manufacturers are featured!
- Entrance and exit control system
Non-contact and speedy entry and exit authentication. Free licenses available for use.
- Entrance and exit control system
An intelligent terminal that supports a variety of authentication methods, from mobile access cards to RFID cards, QR codes, and barcodes.
- Entrance/exit management and personal identification system
- Other security systems
- Entrance and exit control system
In stock! The perfect product for you looking for a card reader due to the semiconductor shortage! OSDP compatible!
- Entrance and exit control system
- Entrance/exit management and personal identification system
- RFID/IC tags
Equipped with an NPU, it achieves high-precision and high-speed facial recognition. Personal information is also strictly protected. Demo kits are available for loan.
- Entrance and exit control system
Easy and speedy alcohol check with 'AIZE Breath'
- Other office supplies
- Entrance and exit control system
Targeted email training service
- Security Assessment
Streamline operations through cloud management and complete entry and exit management in one stop! Customization options such as feature expansions are also available.
- Entrance and exit control system
Achieving cost reduction for management companies and ensuring safety and convenience for residents in two modes!
- Entrance and exit control system
- Security locks (windows, front doors, etc.)
Leave everything related to your office to us.
- Office furniture
- Entrance and exit control system
- Other office supplies
Just by connecting it to a USB, it analyzes your PC usage history and presents it in an easy-to-read report!
- Security Assessment
- Other Software
AI will effectively guard employees and customer members from internal infection risks.
- Other office supplies
- Entrance and exit control system
A completely new start to store management in an era of crisis.
- Store Analysis System
- Entrance and exit control system
No construction needed! No monthly usage fee! No need to drill holes in the door! Easily manage entry history with the app!
- Entrance and exit control system
Maintaining SPF and DKIM results even after forwarding! We introduce situations where ARC is helpful in our blog.
- Security Assessment
Load balancing through zone transfer! Introducing its importance, structure, procedures, and more in a blog.
- Security Assessment
Phishing targeting specific individuals or organizations! We introduce what is necessary to protect yourself in our blog.
- Security Assessment
A very important factor in preventing email spoofing and impersonation! Introduction to a blog article.
- Security Assessment
DMARC is a key measure against spoofed emails! We will introduce how to identify them in our blog.
- Security Assessment
Answering various questions such as what caller ID spoofing is! Introduction to the blog.
- Security Assessment
Ensure email authentication and protect against external threats! Let's analyze DKIM manually or automatically.
- Security Assessment
An attack that rewrites routes at the DNS level! Knowing how to prevent it is even more important.
- Security Assessment
Targeting the weak security "trash can"! Introducing the mechanisms and benefits in a blog.
- Security Assessment
Mapping a domain to IPv6! An introduction to why it is important and how to add it.
- Security Assessment
Display name impersonation spreading through phishing scams! We introduce the reasons and more in our blog.
- Security Assessment
How to prevent phone number spoofing? Here are some tips for preventing phone number spoofing.
- Security Assessment
Linking domain names and IP addresses! Introducing why it's necessary and how to manage it.
- Security Assessment
A very inconvenient situation for both website visitors and owners! Introduction to the blog.
- Security Assessment
Introducing a perfect article for those who want to know what ping spoofing is.
- Security Assessment
Solved with a few simple steps! Introduction to troubleshooting and more on the blog.
- Security Assessment
Five Tools You Should Set Up to Protect Email Security! Introduction to the Blog
- Security Assessment