List of Safety features products
- classification:Safety features
1771~1800 item / All 3437 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
We will introduce the key points of issues that require strengthened measures and security switches!
- Routers, Switches, and Hubs
- Other security
Things to address in 2022
In preparation for the day when measures to prevent the spread of viruses become even more essential, we would like to introduce the actions to be taken in 2022. Key points for strengthening measures include the "amendment of the Personal Information Protection Law," the "amendment of the Electronic Bookkeeping Law," and "measures for telework PCs." Our security switch, 'SubGate,' allows for easy internal measures. It is suitable for preventing the spread of computer viruses, detecting and blocking harmful traffic, and preventing eavesdropping on internal IP phones and confidential data. *For more details, please refer to related products and catalogs, or feel free to contact us.
Supply chain attacks are on the rise! Real-time detection and prevention of the spread of worms, viruses, and more.
- Routers, Switches, and Hubs
- Other security
What is necessary for countering supply chain attacks
There has been a rapid increase in supply chain attacks that target the group companies, contractors, and suppliers of a target, using them as a foothold to infiltrate the target company. Since it is difficult to penetrate large corporations with strong security measures, attackers often aim for smaller companies that have less comprehensive security measures. Therefore, we recommend 'SubGate' for supply chain attack countermeasures. *For more details, please refer to the related products and catalog, or feel free to contact us.
The fear of dangerous supply chain attacks! Use the ultimate technique of excellent behavior detection to contain the fierce attacks!
- Routers, Switches, and Hubs
- Other security
Terrifying News: A Truly Scary Story - Episode 1
In the horror news, we introduce truly scary stories. The first story is about "The Fear of Dangerous Supply Chain Attacks." "There were attacks targeting the supply chains of major Japanese manufacturers," and "a subsidiary's subcontractor messed up," leading to damage that spread from subcontractors to subsidiaries and then to parent companies. In such times, the security switch 'SubGate' protects the network. With its excellent behavior detection capabilities, it can block harmful traffic, prevent the spread of viruses, and stop data theft. *For more details, please refer to related products and catalogs, or feel free to contact us.*
The damage that occurred just from bringing the telework PC back to the company! Containing the cluster with a special move!
- Routers, Switches, and Hubs
- Other security
Terrifying News: A Truly Scary Story, Episode 2
In the horror news, we introduce truly scary stories. The second episode is about "Just bringing the telework PC back to the company...". There have been incidents such as "connecting the telework PC to the company's LAN," "the fear of home clusters," and "the emergence of corporate clusters from returned PCs." In such times, the security switch 'SubGate' protects the network. With its excellent behavior detection capabilities, it can block harmful traffic, prevent the spread of viruses, and stop data theft. *For more details, please refer to the related products and catalog, or feel free to contact us.
We are introducing how to prevent sophisticated cyber attacks and what should be done!
- Routers, Switches, and Hubs
- Other security
[Data] Security Measures in 2022
This document introduces security measures for 2022 on how to address increasingly sophisticated cyber attacks such as EMOTET, ransomware, and supply chain attacks. It includes sections on "What is EMOTET," "Attack Methods," and "Examples of Attacks on Major Manufacturing Supply Chains." Additionally, it introduces 'SubGate,' which helps prevent the spread of viruses. Please make use of this information for your countermeasures. *For more details, please refer to related products and catalogs, or feel free to contact us.
This is a card reader dedicated to the entry and exit management system ACsmart/ACsmart2.
- Entrance and exit control system
This is a card reader specifically for the entry and exit management system ACsmart/ACsmart2.
- Entrance and exit control system
Investigating major vulnerabilities that are easily exploited and have a significant impact!
- Other security
With the single-camera 2D authentication method, high-speed walkthrough authentication of approximately 30 people per minute is possible.
- Entrance and exit control system
With the single-camera 2D authentication method, high-speed walkthrough authentication of approximately 30 people per minute is possible.
- Entrance and exit control system
Sophisticated design, feature-rich card reader. Smart design that allows for immediate operation with simple setup.
- Entrance and exit control system
Detection of attempts to misuse! Visualization of vulnerabilities in layers lower than the OS (i.e., firmware).
- Software (middle, driver, security, etc.)
- Server monitoring and network management tools
- Other security
Matrix Corporation (Chuo Ward, Osaka City) is pleased to announce that it has begun development of a safety device (tentative) to support the prevention of leaving passengers behind on buses.
- Other security
- Safety Sensors
- Other safety equipment
We propose a high-precision and affordable hybrid location information solution that takes the best of BLE and UWB! The setup is really easy as well.
- IC tag
- Entrance and exit control system
- Other information systems
This is a face recognition module suitable for embedded development in various devices. By integrating it into machine tools and factory equipment, it is also possible to restrict the operations of wo...
- Personal authentication
- Other embedded systems (software and hardware)
- Other electronic parts
Achieve strong two-factor authentication with simple operations! You can choose a product that suits your needs. *Free trial version available.
- Other security
- Encryption and authentication
Easily eliminate the frustration of waiting times! A queue management system to assist with reception tasks.
- Entrance and exit control system
If the temperature is normal, tapping the unlock icon will unlock the door where the visitor is! It can also be used for factory security measures with facial recognition terminals.
- Entrance and exit control system
Implement RFID in the optimal form according to usage and environment! A wide variety of tags and devices are also available!
- Production Management System
- Entrance and exit control system
- IC tag
Notice of Participation in the 20th Automatic Identification Comprehensive Exhibition
We will be exhibiting at the "20th Comprehensive Automatic Identification Exhibition" to be held at Tokyo Big Sight in September 2018! There will be plenty of hints for introducing RFID and advancing IoT! We sincerely invite you to visit our booth during this opportunity. 【Date】 September 12 (Wednesday) - 14 (Friday), 2018 10:00 AM - 5:00 PM 【Booth Number】 West Hall 4 C-21 *This is a joint exhibition by Ace Industry, Nippon Steel & Sumitomo Metal Corporation, and our company.
We offer various training on security.
- Other security
- Other services
For matters related to information security, please contact our company.
- Other information systems
- Other security
Cybersecurity tool that collects information from multiple sources.
- Other security
No initial costs and no long-term contracts required for comprehensive cybersecurity measures for your entire business!
- Firewall and intrusion prevention
- Rental/lease
Detects fire sources and notifies! Fire source detection cameras for reducing fire risk are now on sale!
- Other security
- Surveillance Camera System
Introducing products suitable for environmental maintenance, visualization measures, security measures, and labor management!
- Other security
Compact and battery-free for long-lasting use! The ePaper iCard with a 2.9-inch electronic paper can be rewritten multiple times.
- Entrance and exit control system
- Office supplies and stationery
- Business Intelligence and Data Analysis
Cloud services that can be implemented immediately! Proven track record in companies requiring high security, such as banks.
- Firewall and intrusion prevention
The high-precision IC tag detects passengers on board when the bus passes through the gate. It also helps prevent leaving people behind on the bus.
- Entrance and exit control system
- IC tag
- Personal authentication
How to break away from the culture of "password-protected zip files," as introduced in the blog.
- Firewall and intrusion prevention