List of Safety features products
- classification:Safety features
751~780 item / All 3370 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
The third option following USB dongles and software licenses. With CodeMeter, three types can be used together!
- Encryption and authentication
- Software (middle, driver, security, etc.)
We will exhibit at Hannover Messe 2025 and showcase technologies that comply with the new EU cyber resilience regulations.
Wibu-Systems will showcase its comprehensive CRA-compliant solutions at the exhibition venue. - Protection of software and data integrity The CodeMeter Protection Suite provides a comprehensive security framework equipped with encryption and obfuscation technologies, integrity checks, anti-debugging features, and tamper resistance mechanisms. - Secure authentication The CodeMeter API features encryption technologies such as symmetric and asymmetric encryption and digital signature procedures, enabling seamless integration with digital products and protection against tampering. - Compliance-oriented licensing CodeMeter License Central is a database-based licensing and entitlement management solution that automates the processes of license creation, distribution, and management. This allows for tracking software usage, managing compliance, and conducting software recalls when necessary. Additionally, the handling of personal information and business data complies with the principle of "data minimization."
Introducing a thermal camera that measures body surface temperature and monitors temperature to detect signs of fire!
- Other safety equipment
- Other security
Enhancement of cybersecurity protection and improvement of the return on investment for continuous state monitoring programs.
- Other security
- Other services
Introducing the role of the privacy policy within PMS and the necessity of its creation!
- Other security
A monitoring system (measuring device + application) that can measure current, power, and temperature from the distribution board of electrical equipment.
- Other electronic measuring instruments
- Other security
- Other operation management software
[Notice of Video Posting] Current, Power, Temperature, and Other Monitoring System (F&M-Portal)
We are pleased to announce that a YouTube video has been published on the page for our product, the "Current, Power, and Temperature Monitoring System (F&M-Portal)." This product is a monitoring system (measurement device + application) that can measure current, power, and temperature from the distribution board of power equipment. You can find more details from the related products below. Please check the YouTube video as well.
Safe and secure Japanese-made! Certification OK even when wearing a mask and glasses!
- Other office supplies
- Entrance and exit control system
- Personal authentication
By connecting the contacts, it can work in conjunction with electric locks and automatic doors, allowing for unlocking instructions! Achieve stress-free authentication!
- Other office supplies
- Entrance and exit control system
- Personal authentication
Authentication OK in 0.2 seconds! We provide stress-free facial recognition!
- Other office supplies
- Entrance and exit control system
- Personal authentication
Explaining how to "specify as much as possible" the provisions under the Personal Information Protection Act and the purpose of use.
- Personal authentication
Introducing what information is included in personal data and points to consider when obtaining it.
- Personal authentication
Explaining how to obtain and the uses of the My Number Card (Individual Number Card).
- Personal authentication
A detailed introduction to the goals of "realizing a fair and just society," "improving the efficiency of administration," and "enhancing the convenience for citizens."
- Personal authentication
Companies need to establish a system to protect personal information, implement it, and have a mechanism for continuous improvement.
- Personal authentication
Specialized analysts monitor the configuration, operation, and status of security devices such as UTM and IPS 24 hours a day, 365 days a year.
- Firewall and intrusion prevention
- Integrated operation management
Eliminate all files and remove malware! The number one decontamination solution in the domestic market.
- Other security
- Virus software
The email sanitization "Active! zone" collaborates with the attachment sanitization "VOTIRO Disarmer," set to be released in spring 2021.
Qualityia Inc. announces that it will begin releasing its collaboration with Azgent Inc., which primarily provides email sanitization "Active! zone" and network security, for the file sanitization solution "VOTIRO Disarmer" starting in the spring of 2021.
Achieve phishing email countermeasures that do not burden administrators or employees. Compatible with G Suite and Office 365.
- Email/Fax transmission
- Other security
Phishing email countermeasure solution "IRONSCALES" wins the CYBER DEFENSE GLOBAL AWARDS.
The phishing email countermeasure solution "IRONSCALES," sold by Azgent, has won the CYBER DEFENSE GLOBAL AWARDS. IRONSCALES is a phishing email countermeasure solution that performs message delivery, detection, and remediation in the inbox, which is the most affected area by phishing. It not only detects advanced impersonation emails using machine learning but also has the capability to share phishing email information within the organization and isolate it from mailboxes, making phishing countermeasures easy and seamless for both security administrators and employees (email recipients). Additionally, it offers mobile applications for iOS and Android, allowing security administrators to access the IRONSCALES dashboard via the internet while on the go and respond with a single click, thereby reducing the response time for phishing email incidents. [Contact Information] Azgent Inc. E-mail: info@asgent.co.jp
Enhance security simply by adding it as an extension to your familiar browser!
- Other information systems
- Other security
★Free materials available! We have summarized the advantages and disadvantages of facial recognition entrance doors, widely adopted in homes, offices, and commercial facilities, in a simple manner tha...
- Other security and surveillance systems
- Personal authentication
[Expert Explanation] A Must-See! We will teach you the advantages and disadvantages of facial recognition entrance doors!
The facial recognition entrance door is an advanced security system that uses each individual's face as a key, replacing traditional keys and cards. We have prepared a document that clearly summarizes the "advantages of facial recognition doors" and "disadvantages of facial recognition doors." It also includes examples of how to implement it in offices and commercial facilities, as well as its applications in accommodation and nursing facilities, so please use it for consideration of implementation and selection of products suitable for your site.
Compatible with narrow frames that cannot be handled by other products! With a stylish design and high performance, it supports operations tailored to various scenes.
- Entrance and exit control system
We will introduce essential safety measures to prevent accidental information leaks!
- Other security
Introducing safety management measures related to information systems that serve as the business infrastructure of companies!
- Other security
We also introduce cases where individuals are excluded from personal information handling businesses!
- Other security
Many businesses are required to properly protect personal information!
- Other security
We will also introduce information to which "rights regarding personal information" do not apply!
- Other security
Shut out the entry of unrelated vehicles and suspicious vehicles, as well as the leakage of sensitive information!
- Other security
Cardless and online for easy management! Managing and aggregating clock-in and clock-out times is simple.
- Other operation management software
- Entrance and exit control system
- Mobile phones, PHS, data communication cards
Next-Generation Forensics Pioneered by the SQLite Forensic Toolkit
- Virus software
Don't miss "companionship" with AI! Achieving high-performance entry and exit management.
- Entrance and exit control system
Achieve vehicle entry and exit management for factories and facilities!
- Entrance and exit control system