List of Safety features products
- classification:Safety features
1351~1380 item / All 3417 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
High-quality standard-compliant smart card token "LOCK STAR-uToken"
- Personal authentication
- Encryption and authentication
- Other security
This is a product that uses a USB security key to prevent information leakage and unauthorized use from computers with easy operation and short implementation time.
- Personal authentication
- Software (middle, driver, security, etc.)
- Encryption and authentication
The USB dongle "LOCK STAR-PK," which prevents unauthorized copying and use of software, protects the assets of software development manufacturers.
- Development support tools (ICE, emulators, debuggers, etc.)
- Software (middle, driver, security, etc.)
- Encryption and authentication
Virtual function-equipped SSL-VPN remote access solution
- Firewall and intrusion prevention
- Encryption and authentication
- Personal authentication
Ideal for BYOD, no dedicated app required, prevents information leakage from smart devices.
Logical Tech Co., Ltd. will start selling its information leakage prevention system "LOCK STAR-SGateM" (Lock Star SGateM), which uses a screen transfer method and is compatible with any terminal and OS, from March 4, 2013. "LOCK STAR-SGateM" is a screen transfer-based security solution built on a Linux server. This solution operates on browsers that support HTML5, eliminating the need for dedicated applications. Additionally, by utilizing free OS, it allows companies to save on the substantial costs associated with licensing fees. Furthermore, by integrating with the currently available integrated security system LOCK STAR-SGate series, it can accommodate various usage scenarios tailored to corporate needs. Groupware such as Notes, which was previously only usable on PCs, can now be used directly on smartphones and tablets (iPhone, iPad, Android devices) without leaving any data on the device, making it easy and cost-effective, thus providing an optimal environment for BYOD (Bring Your Own Device) utilization.
Combine tape libraries with built-in off-network secure vaults!
- Virus software
- Other security
[Essential for those considering or gathering information] Have you found the best selection that suits your company? An explanation of how to choose the optimal facial recognition system!
- Other security and surveillance systems
- Other security
- Entrance and exit control system
Introducing case studies of business improvements using facial recognition systems in the healthcare/welfare industry! This is essential material for those considering it or gathering information.
- Entrance and exit control system
We will act on your behalf to continuously monitor for information leaks on the Dark Web! Unlike one-time investigations from other services, we will keep monitoring the Dark Web at all times.
- Other security
A solution to avoid patient waiting time stress and congestion in medical facilities, suitable for vaccination appointments and more.
- Entrance and exit control system
We provide total support for influenza and COVID-19 vaccination services!
- Entrance and exit control system
What risks are associated with the use of apps in the manufacturing industry? What security measures are necessary? We will explain app security-related knowledge in an easy-to-understand manner.
- Other security
The long-awaited new model "Novel" has been born in the VingCard series of card locks, which have been implemented in over 8 million rooms worldwide!
- Entrance and exit control system
- Encryption and authentication
- Other security
Introducing the latest model of the VingCard series, "Novel"!
It goes without saying that the VingCard non-contact card lock "Novel" combines the latest security technology with usability and will become the representative model of next-generation card locks for accommodation facilities. Novel captivates guests and hoteliers as a modern, beautiful, and powerful electronic card lock. Mobile access, online integration, and Apple Wallet can also be added quickly when needed. Additionally, Novel is fully committed to environmental protection through the use of sustainable raw materials, lightweight product design, minimized packaging volume, and battery-free options.
Iris authentication systems can be easily integrated into kiosk terminals and similar devices. Iris registration is also simple.
- Entrance and exit control system
Equipped with LED indicators on both sides of the main body. Ideal as a display terminal for conference rooms and waiting areas.
- Industrial PCs
- Other PCs and OA equipment
- Entrance and exit control system
No power or network environment required! Easy to install! Wireless compact fixed lens outdoor camera with 4G LTE solar panel.
- Other security
Calico Open Source (Kubernetes CNI Plugin) Security Upgrade
- Other security
Cloud-based Matrix USB key. It can be operated like a physical dongle via API.
- Other security
Prevent worker mistakes and improve operational efficiency with barcode and QR code authentication! Operate with inventory management shelves that maintain the existing box sizes and arrangements!
- Other security
"Over 600 camera design achievements" We select manufacturers and cameras tailored to the installation location and purpose, implementing more effective camera designs.
- Other security
- Color camera
- others
Avoiding risks through training for highly sophisticated "targeted attack emails."
- Firewall and intrusion prevention
[Telework Recommended] Securely log in to Windows using two-factor authentication with a smartphone app. *A document introducing the new features will be provided.
- Personal authentication
Addressing new needs! Security has become an indispensable element among customer challenges.
- Other security
In-house diagnosis of a vast number of websites! Achieving cost reduction and increased scope and frequency of diagnosis.
- Other security
Designed as a comprehensive tool for various astronomical research! Compatible with a wide range of data formats.
- Document and Data Management
- Data Erasing
Easy to use and multifunctional for peace of mind! Protecting grandpa and grandma from scam calls and solicitation calls.
- Other security
- Other PCs and OA equipment
Daily body surface temperature measurement and alcohol check with this one device! Identity verification with AI facial recognition.
- Other measurement, recording and measuring instruments
- Other inspection equipment and devices
- Personal authentication
More advanced, more convenient! Products of professional quality recognized by security experts.
- Other security
Support for the construction of small to medium-sized system infrastructure.
- server
- Storage Backup
- Other security