List of Safety features products
- classification:Safety features
2281~2310 item / All 3417 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
We will achieve safe and efficient data transfer in a network-isolated environment!
- Data Erasing
Enhanced security measures. Cutting-edge surveillance systems for home and business use.
- Other security
- Color camera
Are you still going to continue handling complicated and troublesome IT security measures in-house?
- Other security
Blockchain as a platform for society Concurrent publication: The forefront of Fintech transforming financial services
- Encryption and authentication
- Server monitoring and network management tools
The best facial recognition performance achieved with Suprema's fusion matching technology.
- Entrance and exit control system
- Personal authentication
Access control and thermal AI cameras capable of managing people through AI facial recognition.
- Entrance and exit control system
Application protection from memory to the web! Detect fileless attacks and memory corruption attacks within milliseconds.
- Other network tools
- Server monitoring and network management tools
- Other security
Protect your assets from "Zero-Day" attacks! All-in-one "SaaS-type" vulnerability management tool!
- Other network tools
- Server monitoring and network management tools
- Other security
Save time and costs! Providing an open and scalable threat intelligence platform.
- Other network tools
- Server monitoring and network management tools
- Other security
Combination of vulnerability scanners and penetration testing tools! A vulnerability management solution that addresses real risks.
- Other network tools
- Server monitoring and network management tools
- Other security
Maximize the use of security infrastructure! We support users in making the most of their security investments.
- Other network tools
- Server monitoring and network management tools
- Other security
Real-time cyber security visualization! It helps improve reliability and safety.
- Other network tools
- Server monitoring and network management tools
- Other security
Strongly prevent the leakage and hacking of important data such as personal information!
- Other security
- Document and Data Management
- server
A blockchain chip that has achieved miniaturization of blockchain systems that can be implemented in IoT devices and other applications.
- Other security
- Embedded Board Computers
- Communications
Educational materials for cultivating blockchain engineers, whose demand is certain to expand in the future【Sees Sandbox System】.
- Other security
- Other services
- Distance learning/E-learning
No recorder needed, tampering prevention, protection against theft of recorded data! High-security [blockchain surveillance camera].
- Other security
- Surveillance Cameras
- Other information systems
Pre-built blockchain with various categories of decentralized applications (DApps).
- Other security
- Document and Data Management
- Other information systems
Protect your documents and data files from tampering and leakage with robust security!
- Other security
- Software (middle, driver, security, etc.)
Verify performance and proactively avoid business risks! We meet customer needs with a rich lineup.
- Other security
- Other network tools
Completely block external hacking! Essential for organizations that handle various confidential data!
- Other security
- Other network tools
To CISOs, SOCs, CSIRTs, and security personnel! Real-time analysis of behaviors that impact critical assets!
- Other security
- Other network tools
Packet capture without packet loss up to 40Gbps! A revolutionary platform that serves four roles in one device.
- Other security
- Other network tools
Enhance website security! Block 99.9% of fraudulent bots without affecting users!
- Other security
- Other network tools
Automating IT/OT security operations! Facilitating the smooth delivery of incident/threat information.
- Other security
- Other network tools
Covers various attacks that include "IT + OT"! Always provides 21 different new attack vectors.
- Software (middle, driver, security, etc.)
- Other security
- Other network tools
A network video recorder with a redundant system for peace of mind, suitable for large surveillance camera systems. It can connect up to 254 cameras.
- Surveillance Camera System
- Other security
We have prepared a plan to automate the lending and storage of keys within the factory, enabling improved operational efficiency and history management.
- Entrance and exit control system
- Other security
Manage up to 128 entry and exit groups and 1000 readers! Providing a reliable and physical access control solution.
- Entrance and exit control system
- Other security
Edge computing processing is possible! Solutions for various segments.
- Other security
Shut out viruses and malware with a whitelist that has no loopholes!
- Other security
- filtering