List of Safety features products
- classification:Safety features
1081~1140 item / All 3378 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
Will DX be the key to maximizing user satisfaction in the leisure industry?
- Entrance and exit control system
The smart stadium concept leads to revenue contribution and the creation of new value.
- Entrance and exit control system
The benefits of ticketless systems, which are being adopted in the leisure industry, are not just limited to reducing labor costs?
- Entrance and exit control system
The possibilities of "ticket automation" that solves issues and brings various benefits.
- Entrance and exit control system
Simple design with a cable type.
- Other security
With an LED light, the dial is visible even in dark places!
- Other security
Use it with peace of mind anywhere! Comes with protective cushioning to prevent scratches.
- Other security
Instead of starting from the implementation phase, let's first understand the current situation! Achieving effective and efficient security measures.
- Other security
We will conduct an assessment of the current situation, organize technical issues, design the system, and prepare documentation!
- Other security
It is very important to establish a security policy and translate it into a concrete action plan!
- Other security
Implement explanations to the customer's management as necessary, as well as communication and collaboration with external related organizations and groups!
- Other security
Support for solving technical challenges! We can provide flexible proposals tailored to your organization's structure and budget.
- Other security
Achieve an optimal security operation system (CSIRT) tailored to the level of measures required by our customers!
- Other security
NSA-certified high-security shredder. Shreds CDs/DVDs, smartphones/tablets, PC boards, and USB flash drives in just a few minutes!
- Other office supplies
- Data Erasing
- SSD
A new standard for securely destroying documents and optical media. High-security shredders for CDs/DVDs and documents.
- Data Erasing
- Other office supplies
- Office supplies and stationery
Hotron's non-contact entry and exit management system achieves faster facial recognition with high accuracy and automatically sprays disinfectant. It is useful for infection control measures in office...
- Entrance and exit control system
- Other safety equipment
- Surveillance Cameras
【Infection Control Measures】 The Hotron automatic door sensor can be used not only for automatic doors but also for the opening and closing of elevators and for calling them.
Due to the outbreak of infectious diseases, the term "contactless" has gained attention, and new lifestyles are being sought. The contactless operation of doors and elevators, which are touched by a large number of unspecified individuals, as well as the enhancement of security in mask-wearing situations, are areas where Hotron's automatic door sensors can be utilized not only for automatic doors but also for the opening and calling of elevators. ◎ Do you have any of these concerns? - Elevators in facilities and stores are touched by many people, raising hygiene concerns. - When my hands are full with luggage, I want to use my foot to call the elevator. - I'm worried about security because the elevator in my apartment building is used by people other than residents. 【Usage Examples】 ○ Calling the elevator using a contactless switch ○ Calling the elevator using my foot without pressing a button ○ Calling the elevator for specific individuals only through integration with a facial recognition device 【Product Lineup】 ● Infrared Sensor HA Series ● Contactless Switch PF Series ● Microwave Contactless Switch DHS-1 ● Foot Switch PF Series ● Facial Recognition Device DS Series ◎ We are here to address your various concerns and challenges. Please feel free to contact us.
The "DS Series," which installs facial recognition devices in nursing homes and care facilities with dementia patients, allowing only registered staff to call the elevator.
- Entrance and exit control system
- Other safety equipment
- Surveillance Cameras
[Virus and Infectious Disease Measures] Face recognition speed of 0.2 seconds or less, face recognition accuracy of over 99%! Staff can call the elevator in nursing homes and care facilities using face recognition.
The Hotron automatic door sensor can be used not only for automatic doors but also for the opening and closing of elevators and for calling them. We will address various concerns and challenges you may have. 【Challenge】 We want to ensure that only staff can call the elevator in facilities for dementia patients. 【Solution】 Install a facial recognition device that allows only registered individuals to call the elevator. 【Target Products】 ○ Facial Recognition Terminal DS341 ○ Facial Recognition Terminal (Felica compatible) DS372F ○ Facial Recognition Terminal with Temperature Measurement Function DS70MI-T ◎ For more details, please contact us.
Numerous implementation results in municipalities! Smooth and safe entry and exit, preventing unauthorized access. Also reduces management costs.
- Other security
[Notice of Catalog Renewal] Bicycle Parking System "Cycle Gate"
We are pleased to announce that Tokai Giken Co., Ltd. has renewed the catalog for our bicycle parking system, "Cycle Gate." This product does not use electricity as its power source and adopts a simple mechanism, achieving low cost and easy maintenance, making it a safe and user-friendly mechanical gate. For more detailed information, please refer to the related products and catalogs.
Reduce the burden of reception duties with AI character authentication! Implementation can be done at a lower cost.
- Other security
Equipped with a strong closing force, the anti-jump flap prevents unauthorized access, and it is also possible to incorporate a guest card collection device as an option.
- Entrance and exit control system
A design that harmonizes with the entrance space, allowing for the selection of cabinet size according to the installation location.
- Entrance and exit control system
Reasonably introduce multiple-channel flapper gates, with the option to change the top plate color to harmonize with the installation space.
- Entrance and exit control system
Lease monthly fee: 7,800 yen (excluding tax) Improved usability from the customer's perspective UTM "SS7000III" series
- Other security
Improving the moral use of IT resources by employees and eliminating wasteful investments through optimization solutions, along with enhancing IT operational efficiency and reducing costs during troub...
- Other security
Safely retrieve personal information using a vein authentication device and print the necessary information!
- Personal authentication
A case of developing a port monitor for card authentication printing of CAD prints using a multifunction printer!
- Software (middle, driver, security, etc.)
- Encryption and authentication
- Other security
Contec's device security solutions that solve industry-specific challenges!
- Industrial PCs
- Virus software
- Software (middle, driver, security, etc.)
New release of the embedded PC "Box Computer® BX-T3000 Trellix model" equipped with ransomware protection software.
Contec has developed an embedded computer pre-installed with Trellix's endpoint security product, Trellix Application Control, a whitelist-type antivirus software for Microsoft Windows 10 IoT Enterprise, which is designed for embedded devices. We will start accepting orders for a new model of the "Box Computer® BX-T3000 Series" from July 9, 2024.
Free design, short delivery time, low cost. Comprehensive support from design development to manufacturing and after-sales service.
- Processing Contract
- Contract manufacturing
- Other security
This is a newly released smart lock for hinged doors.
- Other security
Case studies available for viewing in photos! EPIC Smart Lock / Lavish Electric Lock
We are introducing examples of our products, such as the retrofittable smart lock brand 'EPIC' and the electric lock security system 'Lavish' that meets a wide range of needs, along with photos of their actual implementation. If you are considering installation or have concerns about security around your doors, please take a look and feel free to contact us. 【Past Installation Achievements】 Entrance auto locks, apartments, condominiums, single-family homes, offices, stores, kindergartens/nurseries, short-term rentals, hotels, rental conference rooms, storage rooms, warehouses, pharmaceutical storage, lockers. 【Unlocking Methods】 Face recognition, QR codes, barcodes, cards (FeliCa, MIFARE, EM, proprietary standards), API, PIN codes, fingerprints, remote controls, apps, buttons, intercoms, business phones. Please check the related links below. ▼
No need for login or logout! Use the cloud safely and securely with "magical" authentication!
- Personal authentication
Easily and quickly automate the analysis of malware, making it useful in various scenarios such as initial investigations of damage and pre-shipment inspections for software products to check for malw...
- Virus software
We defend against targeted attacks that cannot be detected by conventional virus protection using progressive heuristic technology.
- Virus software
Thorough compliance enhancement! Prevention of human errors and reduction of work time are also possible.
- Entrance and exit control system
A white paper explaining the challenges and solutions related to the existence of legacy systems. Vulnerability assessment services are also provided by qualified personnel.
- Other security
Based on the inspection checklist under Article 25 of the Medical Care Act, challenges related to the application of security patches and presentations on Heimdal patches, etc.
- Other security
Security risk analysis 'V-sec' for implementing cost-effective cybersecurity measures!
- Other security
Achieving an unprecedentedly superior cost performance! The diagnostic speed is also overwhelmingly fast, and the price is overwhelmingly low.
- Other security
Reflecting the voices of on-site childcare teachers! Developed with an emphasis on simplicity and usability.
- Entrance and exit control system
We will achieve the digitization of time cards simply and at a low cost!
- Entrance and exit control system
Perfect palm-sized 100x25x20mm for management locks, cabinets, and industrial locks.
- Entrance and exit control system
- Other security and surveillance systems
- others
Detect anomalies at the protocol level / Safely monitor the network
- Server monitoring and network management tools
- Other network tools
- Other security
Improving security awareness comes from training and education. Cybersecurity measures to protect the manufacturing industry from increasingly serious cyber attacks every day!
- Other security
Are you facing any of these issues: 'The cost of replacing a lost key...', 'I want to eliminate the handover of keys', 'I want to streamline key management as part of 5S activities'?
- Other security
- Safety Door Switch
- others
Equipped with sensors and a buzzer for detection! Compact yet featuring a flapper gate.
- Other security
Matches any environment! Displays status with LEDs on the flapper (blue, green, red).
- Other security
Ideal for locations and events where permanent installation is difficult! Products with the same performance as those used in airports.
- Other security
Available for standalone use! Easy to install and remove with a dedicated stand, and no drilling required.
- Other security
Display status with LED! Cost-effective simple security gate device.
- Other security
Facial recognition attendance management! Simultaneously capable of temperature measurement, clothing disinfection, and hand sanitization with one device.
- Entrance and exit control system
- Personal authentication
- Other safety and hygiene products
Cyberstanc instantly detects cyber threats with advanced technology!
- Other security
Introducing the challenges of encrypted ZIP files and how to choose the right alternative products.
- Other security
Progress's WhatsUp Gold has been named a leader in the G2 Network Monitoring Tools Report.
When it comes to product evaluation, you might imagine observing the product's performance in a lab or office setting, but G2 Software Reviews are not of that kind. G2's reviews are based on evaluations from actual users who regularly use the tools. It is not theoretical; being chosen as a leader in the G2 Grid report (Network Monitoring) based on candid feedback from specific users is a great honor. This is the result of evaluations from 130 customers who use Progress's WhatsUp Gold. You can find more details in the related links below.
Utilizing action analysis algorithms to detect anomalies hidden within network traffic and identify signs of malicious behavior or breaches!
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Standalone appliance! Available as hardware or virtual.
- filtering
New Criteria for Selecting Load Balancers Revealed from the Survey Findings
A load balancer, which distributes access to web servers and prevents system outages and other failures, is an essential tool for companies that operate e-commerce sites and online games. Due to the spread of telecommuting and the increasing use of high-definition images and videos within companies, load balancers are now being used by various industries, businesses, and municipalities. With the expansion of these use cases, signs of change are emerging in the needs of companies and organizations regarding load balancers. You can find more details about the blog through the related links below.
The generated flow statistics are analyzed in detail! Introducing products that can also be used in virtual environments.
- filtering
Progress's WhatsUp Gold has been named a leader in the G2 Network Monitoring Tools Report.
When it comes to product evaluation, you might imagine observing the product's performance in a lab or office setting, but G2 Software Reviews are not of that kind. G2's reviews are based on evaluations from actual users who regularly use the tools. It is not theoretical; being chosen as a leader in the G2 Grid report (Network Monitoring) based on candid feedback from specific users is a great honor. This is the result of evaluations from 130 customers who use Progress's WhatsUp Gold. You can find more details in the related links below.
The core of multi-layered defense against cyber attacks! Introducing the role of NDR.
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Prioritize important network traffic! Introducing case studies of the network traffic monitoring tool "Flowmon."
- filtering
Four Reasons Why NDR is Essential for Cybersecurity
Endpoint protection is the foundation of cybersecurity, but in today's ever-expanding digital environment, endpoints span a wide variety of devices, and traditional endpoint security alone is not sufficient to address the frequent cyberattacks. The proliferation of cloud services, remote work, and expanded system access further amplifies these challenges. In this changing landscape, while additional tools such as Security Information and Event Management (SIEM) systems are used to enhance security, it has become clear that there is a need for an additional cybersecurity stack that should be built through the analysis of attack data and experience. That is where Network Detection and Response (NDR) comes in. In this blog, we will explain four reasons why NDR is necessary. You can find more details in the related links below.
Providing clients with robust security solutions! Publicizing case studies on countermeasures against cyber attacks.
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
IaaS provisioning through network traffic monitoring! Case studies on countermeasures against cyber attacks are now available.
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
A case study on countermeasures against cyber attacks that enables behavior detection even on shared servers has been released!
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
A case study of cyber attack countermeasures that easily visualizes the communication status of multiple securities systems has been released!
- filtering
Infrastructure DNS monitoring
In the early 1990s, it was common to simply register a company name as a domain name, with a straightforward approach of one domain per company, which incurred very little cost. Nowadays, in order to stay ahead of competitors and protect the brand, it is necessary to register domains for one's own services as well. The situation has changed significantly from the past to the present, but the process of registering a domain name remains an important procedure for supporting online business. In this blog, we will start by explaining what the Domain Name System (DNS) is, and then discuss important DNS servers and their monitoring for infrastructure. You can find more details about the blog through the related links below.