List of Safety features products
- classification:Safety features
1621~1650 item / All 3437 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
A single device can register data for up to 6,000 people! Early detection of feverish individuals helps avoid droplet and contact infections at close range.
- Entrance and exit control system
Product information for the outdoor-installable facial recognition terminal "SmileOkay-HO" has been registered. *Demo/loan available.
The "SmileOkay-HO" is not only capable of outdoor installation but also achieves high-speed and high-precision facial recognition using deep learning algorithms. The "SmileOkay-HO" is waterproof and dustproof, making it a facial recognition terminal that can be installed outdoors as well as indoors. The facial recognition time is just 0.2 seconds, and it authenticates at a distance of 1.5 meters from the camera. It can authenticate while walking without the need to stop. The facial recognition accuracy is also very high, at ≧99%. Additionally, with the utility software developed independently by IT Sec, bulk registration of user data and easy transfer of facial registration data can be performed, allowing for centralized management of multiple terminals. For indoor installation, we also offer the facial recognition and body temperature measurement systems "SmileOkay-HT" and "SmileOkay-DT," as well as the iris recognition, facial recognition, and body temperature measurement system "SmileOkay-iNX," which also includes a temperature measurement function. *Demo units are available for loan for all models! *For more details, please download the PDF from the related product page or contact us.
To areas with few passengers or unmanned stations.
- Entrance and exit control system
- Other security and surveillance systems
- others
An Attack Tree is a threat analysis tool that assists in measures to protect autonomous vehicles from threats such as hacking.
- Other security
This is a card reader dedicated to your company that achieves low cost and high security.
- Other security
- Entrance and exit control system
We will notify parents via email or other means about their child's arrival/departure from the facility. The method used to authenticate the child employs the latest facial recognition technology.
- Personal authentication
- Entrance and exit control system
Support for Azure AD multi-factor authentication with hardware tokens! Choose products that suit your needs. *Free trial available.
- Other security
Enhance your security level! Introducing ways to prevent information leaks on the blog.
- Encryption and authentication
It's possible to save costs! Introducing the benefits of passwordless authentication in a blog.
- Encryption and authentication
Enjoy the convenience of the cloud! Introducing security enhancement through device authentication in our blog.
- Personal authentication
Introducing edge devices with diverse features and excellent scalability in our blog!
- Personal authentication
- Encryption and authentication
It is possible to avoid troubles! Introducing the facial recognition system in the blog.
- Personal authentication
- Entrance and exit control system
Introducing a facial recognition system on the blog that also enhances security!
- Entrance and exit control system
- Personal authentication
Demonstrating high authentication accuracy! Introducing an AI facial recognition terminal that can also measure temperature in a blog.
- Entrance and exit control system
Effective for enhancing security! By combining 'multi-factor authentication,' it is also possible to increase safety further.
- Encryption and authentication
Ensuring safety! Introducing security solutions in our blog.
- Encryption and authentication
Optimization of management resources is also possible! Introducing cashless solutions with IoT devices in our blog.
- Other security
You can keep track of the expiration date! An effective way to prevent license violations is introduced in the blog.
- Other security
Equipped with a facial recognition engine that can recognize faces even with masks on!
- Personal authentication
Authentication credentials are available! Introducing security keys in our blog.
- Other security
Achieving a robust security network! Introducing Zero Trust in our blog.
- Encryption and authentication
Prevent unauthorized login by impersonation! Introducing appropriate MFA devices in our blog.
- Encryption and authentication
To ensure that "it's already too late by the time you realize it!" is definitely prevented! We will significantly reduce operational burdens and operational costs.
- Virus software
Campaign extension decided! Until December 31, 2022. Strong support for vulnerability assessments and incident response training! Take advantage of this special package to combat increasingly malicious cyber attacks.
Allied Telesis, Inc. (Headquarters: Shinagawa-ku, Tokyo; Chairman: Akira Oshima) announces the extension of its ongoing "Pentest Campaign," which targets web server diagnostic services and phishing email training services, until December 31, 2022 (for orders received). As digital transformation (DX) progresses across various markets, cyberattacks such as "targeted attacks" primarily using email and "website tampering" exploiting network vulnerabilities are becoming increasingly malicious, and the expansion of their damage has become a global issue. In the event of an attack, not only could business and services be halted, but there is also the potential for significant damage that threatens business continuity due to the leakage of confidential information and loss of trust. To protect organizations from these threats, it is essential to conduct vulnerability assessments to prevent damage in advance, improve employees' security literacy through training, and provide incident response education to appropriately handle emergencies. *For more details, please refer to the PDF materials or related links.*
We propose a suitable plan! Security measures advanced through "diagnosis and investigation" and "countermeasures and strengthening."
- Software (middle, driver, security, etc.)
- Other security
News 2023/2/14: A new outdoor security camera system to prevent frequent thefts and vandalism.
- Surveillance Cameras
- Surveillance Camera System
- Other security
1CH H.265 4K (3840×2160/60fps) compatible video server
- Video Recorder
- Other security
- Other security and surveillance systems
We will introduce numerous examples of how standardization and efficiency improvements have significantly increased work efficiency! You can create IC cards easily and cheaply.
- Entrance and exit control system
- Personal authentication
- Personnel and Labor
Identity verification using IC card + fingerprint without a dedicated authentication server or fingerprint authentication device.
- Dedicated IC
- Personal authentication
- Encryption and authentication
Reduction of key management burden / Improvement of information and safety management / Measures for personal information protection law
- Encryption and authentication
- Entrance and exit control system
- Personal authentication
Touch panel LCD integrated with entry and exit controller non-contact IC card reader.
- Entrance and exit control system
- Personal authentication
- Encryption and authentication
A fingerprint authentication IC card that realizes two-factor authentication with "ownership authentication via IC card" and "biometric authentication via fingerprint" on a single card.
- Dedicated IC
- Personal authentication
- Encryption and authentication