List of Safety features products
- classification:Safety features
451~495 item / All 3436 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
Mapping a domain to IPv6! An introduction to why it is important and how to add it.
- Other security
- Server monitoring and network management tools
Load balancing through zone transfer! Introduction to its importance, structure, procedures, and more in the blog.
- Other security
- Server monitoring and network management tools
How to prevent phone number spoofing? Here are some tips to prevent phone number spoofing.
- Other security
- Server monitoring and network management tools
- Email/Fax transmission
A very important factor in preventing email spoofing and impersonation! Introduction to a blog article.
- Other security
- Server monitoring and network management tools
- Email/Fax transmission
Here’s a perfect article for those who want to know what ping spoofing is.
- Other security
- Server monitoring and network management tools
- Email/Fax transmission
Answering various questions such as what caller ID spoofing is! Introduction to the blog.
- Other security
- Server monitoring and network management tools
- Email/Fax transmission
Starting with invoices and compliance with PCI DSS 4.0. It is related to phishing emails.
- Other security
The rapid increase in cyber attacks from abroad! The targets are the intellectual properties of small and medium-sized enterprises, such as technology, designs, and patents. If we don't protect oursel...
- Virus software
Low cost and initial expenses starting from zero yen! Already compatible with many various cloud services.
- Encryption and authentication
Software for preventing email misdelivery and encryption
- Other security
- Email/Fax transmission
We provide a total solution from marketing and sales proposals!
- Software (middle, driver, security, etc.)
- Other security
- others
Targeted attack emails are successful if they infect just one person. Let's conduct a participatory training exercise for everyone.
- Other security
One-stop solution for unauthorized login issues! A SaaS-based one-stop security service that also prevents fraudulent registrations, transactions, and transfers by bots.
- Other security
- Software (middle, driver, security, etc.)
- Other security and surveillance systems
I want to keep the emails of customer interactions! @Securemail Plus series
- Email/Fax transmission
- Other security
Smart security testing. PenTest.WS automates everything from diagnosis to report creation!
- Other security
Achieve safe and seamless remittance, investment, and account management on mobile!
- Encryption and authentication
Scheduled to exhibit various biometric devices from December 10 (Wednesday) to December 12 (Friday), 2025!
- Other security
We handle integrated security platforms and contactless biometric authentication devices!
- Other security
- Software (middle, driver, security, etc.)
- Other security and surveillance systems
Universal design that is easy to use for large package deliveries and wheelchair users.
- Other security
- Other security and surveillance systems
Integrated leader design! With a simple structure and connection design, maintenance is also easy.
- Other security
- Other security and surveillance systems
Achieving an advanced security environment with a slim-designed speed gate.
- Other security
- Other security and surveillance systems
Equipped with a multi-card module! Android LCDP for third-party app integration.
- Personal authentication
8-inch TFT color touchscreen with a narrow bezel design! Supports IEEE 802.3af/at PoE power supply.
- Personal authentication
It can be equipped with an optional removable backup battery, making it suitable for temporary site management and other uses.
- Personal authentication
Supports visible light facial recognition and palm recognition! Prevents spoofing with photos, videos, and 3D masks.
- Personal authentication
Achieving high-precision biometric authentication! Demonstrating stable and high-precision authentication performance even in different environments and various lighting conditions.
- Personal authentication
A dual camera with a visible light camera and an infrared camera captures palm prints and palm veins in high quality.
- Personal authentication
Equipped with high-performance on-chip storage, supporting large-capacity face registration and matching.
- Personal authentication
Supports various card types and mobile authentication! Flexible security operations are possible.
- Personal authentication
Information on data erasure services to prevent important data leaks.
- Data Erasing
Solving labor issues and human errors in manual work with solutions utilizing IIoT! In Volume 6, we will introduce the [Monitoring Edition].
- Other security
【New Version Release!】 The smart lock key management service "Key's Lock Service" has significantly evolved.
- Entrance and exit control system
A comprehensive explanation of the importance and challenges of factory reception, and how reception systems can address these issues.
- Entrance and exit control system
- Other information systems
Introducing specific methods to solve challenges in the entry procedures of factories and logistics centers and to promote digitalization!
- Entrance and exit control system
- Other information systems
Explaining preventable risks, checkpoints during implementation, and actual implementation examples!
- Entrance and exit control system
- Other information systems
An explanation of the basics of factory visualization, implementation steps, useful tools, success stories, and precautions to avoid failure!
- Entrance and exit control system
- Other information systems
You can set up unique reception items for the factory! Additional customization is possible if needed.
- Entrance and exit control system
- Other information systems
Direct contact with the person in charge via phone notification from the iPad! Introducing the issues that the iPad unattended reception system can solve.
- Entrance and exit control system
- Other information systems
It is also possible to automate and unmanned many of the reception tasks!
- Entrance and exit control system
- Other information systems
Automatically record and manage the entry and exit history of all visitors in the system!
- Entrance and exit control system
- Other information systems
Smooth check-in with iPad and QR codes! Reducing waiting time for visitors.
- Entrance and exit control system
- Other information systems
No dedicated drivers or software needed! An IC card reader that can be used immediately by connecting via USB.
- Other PCs and OA equipment
- Personal authentication