List of Safety features products
- classification:Safety features
2341~2370 item / All 3417 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
COMODO is a cloud-based solution that can be easily integrated into existing email infrastructure.
- Virus software
- filtering
- Other security
Cloud-based solution that blocks advanced threats such as endpoints from COMODO.
- Virus software
- filtering
- Other security
A security platform that meets all requirements such as memory area encryption and reducing the burden on users!
- Encryption and authentication
Fire Detection System FDS
- Other temperature and humidity measuring instruments
- Image analysis software
- Other security
The administrator only makes decisions, while AIO automatically monitors, analyzes, and optimizes the network! It solves issues related to talent and skill shortages as well as management costs.
- VPN/Wide Area Ethernet
- Integrated operation management
- filtering
To those who think it's not necessary to go that far! Introducing the necessity of complete physical destruction.
- Data Erasing
- Crusher
- Fine grinding machine
Catch the river conditions in real-time! Utilizing high-quality, IP66, low-cost cameras. Can be installed even in mountainous areas.
- Other security
Quickly respond to critical issues! We won't miss serious errors in infrastructure equipment.
- Other security
The arrival of "IoT" in apartment living! A monitoring center will continue to watch over your life.
- Remote Control
- Surveillance Camera System
- Other security
No need for patrol monitoring! Work style changes because you can check from anywhere with your smartphone.
- Remote Control
- Surveillance Camera System
- Other security
Reduce processing time by 30% compared to fingerprint authentication! Accurately track attendance at construction sites using facial recognition!
- Entrance and exit control system
- Other security
All-in-one security solution that integrates all features.
- Other security and surveillance systems
- Other security
Equipped with multiple authentication modes! An access control management system that significantly alleviates inventory pressure.
- Other security
- Other security and surveillance systems
- Personal authentication
Compatible with 3.5in HDD! A high-power shredder that balances security and urban mining recycling.
- Data Erasing
Officially designated for central government agencies. Office media shredder compatible with SSDs, USBs, semiconductors, HDDs for laptops, smartphones, and more, designed for 100V specifications.
- Data Erasing
- Other PCs and OA equipment
- Crusher
Urban mining recycling dedicated crusher (integrated crushing and material separation)
- Data Erasing
- Crusher
- Crusher
Effective use of a single card key for energy-saving measures! Introduction of electric-type switches.
- Entrance and exit control system
Shared area access available with an analog card key! Introducing the Sherlock key switch.
- Entrance and exit control system
A lineup of card keys that can be differentiated based on management and operation differences, such as mixed-use tenants!
- Entrance and exit control system
Utilize objective records to grasp work conditions! It can be useful for employee health management.
- Personnel and Labor
- Other security
- Software (middle, driver, security, etc.)
[Held on 11/19] 'e-Employment OasiS Solves the Challenges of Attendance Management Environment Changing in the Telework Era!'
This webinar will focus on the theme of "e-Employment OasiS × Telework," introducing how we can solve the challenges of attendance management during telework with e-Employment OasiS. ◆ Webinar Overview ◆ - Seminar Title: "e-Employment OasiS" Solves the Challenges of Attendance Management in the Era of Telework! - Date: November 19 (Friday) 13:00 - 13:30 * This will be a 30-minute seminar, so please feel free to join. - Cost: Free - Application Deadline: November 18 (Thursday) 18:00 【Recommended for】 ■ Those who want to obtain objective records of employees during telework ■ Those who want to know who is working on-site even during telework ■ Those who want to reimburse commuting expenses based on actual costs rather than a fixed amount ■ Those who want to clock in safely and securely even when coming to the office 【How to Apply】 Please visit the e-Employment OasiS website. https://www.nds-tyo.co.jp/e-oasis/ * This webinar will use the web conferencing system Zoom. We will send the webinar URL via email later. We sincerely look forward to your participation.
Selectable spray time. Spray without using your hands with the foot pedal!
- Personal authentication
- Other safety and hygiene products
A lineup of card issuance software tailored to various applications!
- Other security
- Personal authentication
- Other security and surveillance systems
AI technology patented analyzes malware at the DNA level!
- Software (middle, driver, security, etc.)
- Other security
Experts will take on the minimum necessary security! We are starting a shared security service.
- Other security
- Other services
- Temporary staffing business
Support for building a system to respond to security incidents!
- Other security
- Other services
It is possible to understand situations deemed vulnerable and analyze the business impact of identified risks.
- Other security
- Other services
It is possible to carry out operations with awareness of information security and to maintain security levels.
- Other security
- Other services
We can reduce security incidents and maintain and improve information security activities.
- Other security
- Other services