List of Safety features products
- classification:Safety features
1486~1530 item / All 3439 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
Stylish design! Easy on-site installation is possible with the quick-in method.
- Entrance and exit control system
The specially designed textile demonstrates excellent dust resistance and water absorption.
- Entrance and exit control system
Create a management key for the Windows server to enhance security, collect operation logs, and log on to Windows users simply by inserting the key.
- Other security
- Other server related
- Other operation management software
A new standard for biometric authentication!
- Other security
Are you only feeling secure with security measures for the app and network protection?
- Other security
[Product Information Update] Is that security measure sufficient? - Vulnerabilities in app attacks and their countermeasures -
We have updated the product information. Are you only feeling secure with security measures for the app and network protection? Even if you have strong security measures for the network, there is a risk that cracking of the app (unauthorized analysis and tampering of the app) could enable attacks on the server. We explain this danger. Please take a look.
Protect your system more safely! The best solution for two-factor authentication.
- Encryption and authentication
- Personal authentication
Products developed through various tests to protect important devices from theft!
- Other security
This is a solution for resilience measures (decontamination) for local governments!
- Other security
- Other security and surveillance systems
We will introduce case studies of companies that have implemented our product CrackProof and how to protect applications and software from attacks.
- Other security
[Product Information Update] Security Incident Cases in the Manufacturing Industry and Their Countermeasures
We have updated the product information. We will introduce case studies of companies that have implemented our product, CrackProof, and how to protect applications and software from attacks. Please take a look.
CIVAMS for video analysis, including facial recognition, access control, attendance management, vehicle management, and suspicious person detection.
- Entrance and exit control system
- Personal authentication
- Firewall and intrusion prevention
No need to worry if you don't have an information systems department! If you consult with us about data storage and operations, we will provide you with an environment suitable for your company.
- Firewall and intrusion prevention
Fire alarm with 'flashing lights'! Effective not only for fires but also in factories and facilities where alarm sounds are difficult to recognize due to noise and other factors. [*Installation case s...
- Other safety equipment
- Other security
Meal Reservation Cloud System
- Other operation management software
- Purchasing Management System
- Entrance and exit control system
Meal Reservation Cloud System
- Other operation management software
- Purchasing Management System
- Entrance and exit control system
Meal Reservation Cloud System
- Other operation management software
- Purchasing Management System
- Entrance and exit control system
Examples of RFID usage and various product specifications are included! (Total of 59 pages) Worker proximity detection, indoor location detection, touchless entry and exit management, wandering detect...
- Entrance and exit control system
It is a system that can be customized according to the scale of implementation and usage style. In addition to doors, it can also be linked with other devices.
- Entrance and exit control system
Compact and lightweight, 2.45GHz active tag capable of long operation time, usable for location management, inventory management, and hands-free entry and exit.
- Entrance and exit control system
Identify individuals through walkthroughs! Integration with surveillance camera systems is also possible.
- Personal authentication
Comprehensive support from selection and replacement of computers to maintenance and support.
- Other security
We propose a review of measures against information leaks and unauthorized access.
- Other security
Please take advantage of our IT solutions that accelerate business with the latest technology.
- Other security
We offer a wide range of services from LED lighting to digital signage installation.
- Other security
Kitting support! Total support from setup to reporting.
- Other security
Peace of mind with remote support tools! We also accommodate relocations and office layout changes!
- Other security
Count people easily and at low cost! An application that automatically calculates and displays the number of people present.
- Entrance and exit control system
We provide a platform related to personal authentication. How about using it for time rental operations of unmanned stores such as shared offices and fitness clubs?
- Encryption and authentication
Just connect to the target computer! Significantly reduce virus check time.
- Virus software
Integrating network functions and security functions in the cloud! High independence through dedicated containers.
- Other security
Install UTM (gateway security) at the network entrance for malware protection!
- Other security
- Other information systems
- Software (middle, driver, security, etc.)
Initial cost 0 yen / Starting from 5,000 yen per month! No construction required - a corporate access control system that simply attaches to existing doors.
- Entrance and exit control system
VIC292 securely connects low-power devices such as sensors to the network using TLS.
- Dedicated IC
- Encryption and authentication
A vehicle access control system using UHF band RFID cards, with a traffic regulation gate that allows vehicles to pass through without stopping and hands-free.
- Entrance and exit control system
[Case Study] "Toyosu Market" Touchless Gate System
We would like to introduce a case study of the "Touchless Gate System" being used in the produce area parking lot at Toyosu Market, Tokyo.
We provide services for responding to ransomware infections, including incident response and breach diagnosis investigation services. We also handle responses for overseas locations and in short timef...
- Other security
- Virus software
Who was the last person to open that safe? A trump card against impersonation and the risk of losing the key.
- Encryption and authentication
- Personal authentication
A group of experts supports your company! We offer two services specialized in expert personnel.
- Firewall and intrusion prevention
- Other security
- Distance learning/E-learning
Providing an integrated supply chain through secure and seamless device onboarding.
- Other security
- Other network tools
Achieving IoT Security! Explaining challenges and security by design, among other topics.
- Other security
We can provide safe products and services that comply with the highest class of cybersecurity standards!
- Other security
- Other network tools
By sending training emails that simulate targeted attacks to employees and staff, we will develop the ability to respond to the increasingly concerning issue of targeted attacks!
- Other security
Search for and manage files containing personal information such as My Number and credit card numbers from PCs, file servers, and network drives!
- Encryption and authentication
- Data Erasing
It detects abnormal signals from various connected sensors and notifies abnormalities through sensor lights and external outputs. A reliable low-cost system.
- Other security
This is a new smart lock for sliding doors from the Flassa series.
- Other security
- Entrance and exit control system
【First EPIC Guide】Introducing the features and operation methods of smart locks!
The guide for the smart lock brand EPIC has been completed. In this issue, we introduce the battery-operated smart lock 'FACEY,' which features Japan's first facial recognition technology, as well as the functions and attractions of the popular high-functionality series 'Flassa,' and information about the convenient cloud feature 'Watchkey.' We also provide detailed proposals for various operational patterns and installation examples regarding the recently upgraded Flassa 1J. ◆What is Flassa 1J? Ideal for rental management Restorative to original condition Compatible with swinging and sliding doors If you have concerns about security or are considering introducing a smart lock, or even if you are not, we encourage you to take a look.