NATURE

Select introduction example by scene

Please take a look at our ideal security solutions for 10 different scenes/facilities.

Perspective view

Factory

We suggest a security system that features image, authentication and detection functions suitable for each area ranging from the perimeter of the site to the production line.

Perspective view

Distribution Warehouse

We suggest a security system that features image, authentication and detection functions suitable for each area ranging from the perimeter of the site to the picking location.

Perspective view

Financial Institution Hospital

We suggest a system construction in a storage with a high-capacity for long-term recording in accordance with the guidelines of the financial institution.

Perspective view

Hotel

We suggest a security system that not only offers a variety of {i>security<i} applications, but also the benefit of {i>customer service improvement<i} and {i>smooth business performance<i}.

Perspective view

Hospital

We suggest a reliable and effective theft prevention for important goods of hospitals including chemicals, injection needles, medical records, and PCs (important data).

Perspective view

Educational Institution

We suggest a surveillance camera and access control system focusing on identity theft prevention in libraries, PC rooms, archives, laboratories, chemical storages, etc..

Perspective view

Data Center

We suggest a system with an emphasis on thorough access control to the most important areas e.g. access by IC card and biometric authentication.

Perspective view

Apartment

We suggest a surveillance camera system not only as a means of solving crimes and pranks, but to create a comfortable living environment by complying with rules and preventing crimes and pranks.

Perspective view

Parlor

We suggest a surveillance camera system with the main purpose to give clear instructions to employees and as a measure against corruption.

Perspective view

Convenience Store

We suggest a surveillance camera system that has a wide range of applications including theft prevention and video evidence, as well as inventory management and prevention of trouble with customers.

Introduction Examples

Product & Service Information

Access Control System

A strong prevention that has access control and exclusion, but isn’t limited to the deterrent effect

This access control system is a system that we introduce as a physical guard against vandalism and theft e.g. of interior goods, equipment, or information. This system performs a “simple exclusion” that won’t allow outsiders access at all, and a “precise control” of users through strict operating rules. For example, restrictions on the usage and residence time can be set, or, as a measure against internal fraud, a single person cannot enter, but access will only be granted if there are two persons to enter at once. In addition, the system also manages the access history. As an effect of the introduction of our security system, this kind of “access control and exclusion” greatly contributes to creating the ideal environment that will not and cannot allow fraudulent or illegal activities.

Security system GG-2

GG-2

The next generation access control system GG-2 pursues high security performance and a design that harmonizes with the architecture

We are flexible when it comes to building systems. From an electronic lock control system for just one door to a massive system that connects several offices via a network, you can choose whatever functionality you need to solve your current problem. In addition, our systems do not only pursue a high security performance, but also a design that harmonizes with the architectural design. We were awarded the Good Design Award.

GG-2 System Configuration Diagram

The system is mainly configured by an ID terminal, secure panels (control equipment), and a server that has installed Secure Monitor Ⅱ (management software), as well as a client PC.

It is standardly equipped with functions to build a system best suited for the intended operation, from small office security to large-scale business security.

You can start by installing it on one gate, and then expand it to the entire office. And you can even go a step further and expand it to all your branches nationwide without having to redevelop the software.

GG-2 System Configuration Diagram

Product List

Management Software

Secure Monitor PRO Ⅱ

Price
OPEN
  • Top-level model with scalability
  • Connectable number of secure panel control units: 253
  • Maximum connectable number of gates: 12,144
  • Maximum connectable number of clients: 60

Secure Monitor STD Ⅱ

Price
OPEN
  • Standard model that can support up to 1,488 gates via the network
  • Connectable number of secure panel control units: 31
  • Maximum connectable number of gates: 1,488
  • Maximum connectable number of clients: 4

Secure Monitor Client Ⅱ

Price
OPEN

Client that can be operated from the same screen as server

※ You must only perform backup operations on the server.

Secure Monitor LT Ⅱ

Price
OPEN
  • Connectable number of secure panel units: 1
  • Settings, history reference, and monitoring available
ID Terminal

Non-contact card reader

Type No.
NC3-N1:Felica
NC5-N1:TypeD,Felica,MIFARE
Price
OPEN

Dimensional outline drawing download NC3-N1 NC5-N1

  • Identification by reading the necessary information of the card
  • No more worries about forgetting your PIN, and since the registration process is simple, it is ideal for a large number of people
  • Multiple card formats support
  • Complies with the protection level IP43, and can be installed outdoor under the eaves
  • Available in two colors: black or white

Scramble keypad with non-contact card reader

Type No.
TK 1-T1: numeric keypad only
NC 3-T1: numeric keypad + Felica
NC 5-T1: numeric keypad + TypeB, Felica, MIFARE
AS 1-T1: numeric keypad + external authentication device (serial interface)
Price
OPEN

Dimensional outline drawing download TK1-T1,NC3-T1
NC5-T1AS1-T1

  • Identification by entering PIN
  • If verification is done only by PIN, the system can be installed with low costs, because cards are not required
  • It is also possible to use PINs and cards together for verification
  • Complies with the protection level IP43, and can be installed outdoor under the eaves
  • Available in two colors: black or white

Scramble keypad with non-contact card reader

Type No.
TK 1-T2: Scramble keypad only
NC 3-T2: Scramble keypad + Felica
NC 5-T2: Scramble keypad + TypeB, Felica, MIFARE
AS 1-T2: Scramble keypad + external authentication terminal (serial interface)
Price
OPEN

Dimensional outline drawing download TK1-T2,NC3-T2
NC5-T2AS1-T2

  • Identification by entering PIN
  • The numbers on the numeric keypad are displayed randomly for every identification, thus preventing password decryption by using the fingerprints left on the keypad
  • The keypad has a surface structure that makes it difficult to see the display from the side, preventing unauthorized viewing
  • Complies with the protection level IP43, and can be installed outdoor under the eaves
  • Available in two colors: black or white

LCD touch screen reader

Type No.
NC 3-D1: LCD display + Felica
NC 5-D1: LCD display + Felica, MIFARE
AS 1-D1: LCD display + external authentication terminal (serial communication, Wiegand communication)
Price
OPEN

Dimensional outline drawing download NC3-D1NC5-D1AS1-D1

  • A non-contact card reader with a 4.3-inch color LCD touch panel
  • LCD displays, touch panel operations, and card authentication operations can all be done from the same screen
  • Room names, time information, and the security sensor state are displayed on the screen
  • They can also be used as room name signs, diligence operations terminals, or security operations terminals
  • Voice guidance function
  • Complies with the protection level IP43, and can be installed outdoor under the eaves
  • Available in two colors: black or white
Biometric authentication apparatus

No Image

Iris authentication apparatus

Type No.
iCAM7000
iCAM7100
Price
OPEN
Download Data
Catalog

Extremely low acceptance rate of unauthorized users. An iris authentication apparatus with the highest level of accuracy in biometrics

  • Identification by reading the iris of the human eye which does not change during your entire life
  • Among the many biometric authentications there are, it has an extremely high accuracy rate, and an acceptance rate of unauthorized users of less than 1:1200000
  • Without touching the apparatus, the authentication is completed in just 1.5 seconds
  • In 1:N mode, 500-10,000 people can be registered. Also supports large systems