List of Safety features products
- classification:Safety features
1141~1200 item / All 3374 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
A case study on countermeasures against cyber attacks that enables behavior detection even on shared servers has been released!
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
A case study of cyber attack countermeasures that easily visualizes the communication status of multiple securities systems has been released!
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Published case studies on measures against cyber attacks that have gained significant peace of mind through built-in cybersecurity features.
- Other security
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
No limit on the number of applications! HTTPS traffic can be monitored under specific conditions.
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Introducing products that allow for cause analysis when specific troubleshooting is needed!
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
There are six recommended selection points to consider! We will introduce the differences between our NDR system and those of other companies.
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Evolving Cyber Attacks! An Introduction to Challenges and Attempts in Business
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Optimal Solution Selection! Best Practices and Guidelines for Strengthening Security
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Prepare for attacks! Solutions to help build robust cybersecurity.
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Reconsider the old approach and break free from it! Provide scalability in preparation for the future.
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
We have released a case study on measures against cyber attacks that instantly visualized the traffic of the group company network through flow analysis!
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
We have published a case study on measures against cyber attacks, where we built a network visualization system and established a rapid incident response framework!
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
We have published a case study on measures against cyber attacks that achieved full traffic visualization and advanced analysis!
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Responding through "flow analysis" is becoming important! It reduces both time and costs.
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
~ The target PC can be safely operated remotely without load or network connection ~ This is a superior compatible image of Remote Desktop ♪
- Routers, Switches, and Hubs
- Other network tools
- Other security
What is ABM? An explanation of the reasons necessary for MDM integration and management of corporate iOS, iPadOS, and macOS!
- Mobile phones, PHS, data communication cards
- Other security
Add RFID to your system! You can promote efficiency and automation.
- Process Control System
- Entrance and exit control system
- Other information systems
We will exhibit at the 36th Monozukuri World Tokyo from June 19 to June 21, 2024.
We will be exhibiting at the "36th Monozukuri World Tokyo" held from June 19 (Wednesday) to June 21 (Friday), 2024! On the day of the event, we will provide detailed demonstrations of our production management systems and production schedulers. We also welcome individual consultations, so please feel free to visit if you are available. For those who cannot attend on the day of the exhibition, we are still accepting inquiries. Contact Us: https://kaizen-navi.biz/contact-start ◆ Exhibition Overview General Name: Monozukuri World Tokyo Event Name: 36th Monozukuri World Tokyo Dates: June 19 (Wednesday) - June 21 (Friday), 2024 Time: 10:00 AM - 6:00 PM (Ends at 5:00 PM on the final day) Venue: Tokyo Big Sight, East Exhibition Hall & South Exhibition Hall Organizer: RX Japan Co., Ltd. Admission Fee: Free (Pre-registration required) ◆ Our Booth Information Exhibition Hall: South Exhibition Hall, Hall 3-4 Booth Number: [ S23-16 ] Pre-registration is required for attendance, please register through "Visitor Registration." We sincerely look forward to your visit.
Embedded electromagnetic lock for sliding doors / Rated voltage: DC12/24V compatible, holding force: 150Kg
- Entrance and exit control system
- Other security and surveillance systems
- others
Waterproof small electromagnetic lock with built-in locking signal contacts / Rated voltage: DC12/24V compatible, holding force: 200Kg
- Entrance and exit control system
- Other security and surveillance systems
- others
Waterproof small electromagnetic lock, standard product of electromagnetic electric lock / Rated voltage: DC12/24V compatible, holding force: 200Kg
- Entrance and exit control system
- Other security and surveillance systems
- others
[New Product] FeliCa/Mifare Compatible! Outdoor-Compatible Contactless Card Reader [ST-530MF]
The "ST-530MF" is compatible with both FeliCa and Mifare standards, and there is no need to change settings such as switching during use. You can use your employee ID card or transportation IC card as a unlocking key, and the unlocking method can be selected according to the security level. 【Four selectable operation modes】 1. Unlock with card 2. Unlock with PIN 3. Unlock with both card and PIN input 4. Unlock with either card or PIN input It supports DC12V/DC24V, making it easy to build systems with other devices. With an IP64 waterproof rating, it can be installed both indoors and outdoors, and is suitable for system operations combined with outdoor electromagnetic locks. Additionally, it is equipped with two contact outputs: a voltage-free unlocking contact output (Relay 1) and a voltage contact output (Relay 2) that can be used for various applications. It is also possible to connect and utilize external devices such as security contacts. 【Other features】 ◆ Individual registration function by ID number ◆ Easy registration mode through device replacement ◆ Internal forced lock setting ◆ Volume adjustment function ◆ Sequential registration function (only available for the dedicated model "ST-530MF-R") *Dedicated unlocking tags or cards from our company are required.
Excellent scalability suitable for facilities operation of various sizes.
- Entrance and exit control system
A completely wireless automatic authentication machine without a rotating bar will welcome you, allowing for easy movement anywhere within the venue.
- Entrance and exit control system
Explaining examples of "supply chain attacks" lurking in the manufacturing industry and the necessity of security measures. Including the case of Volkswagen! A guidebook is being offered!
- Firewall and intrusion prevention
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Leave the security measures for solar power plants to Alvatec.
- Other security
Realizing instant locking and unlocking with a solenoid system / Rated voltage: Compatible with DC 12/24V
- Entrance and exit control system
- Other security and surveillance systems
- others
A slim design that fits into limited spaces. The auto-lock adds convenience and peace of mind!
- Other security
- Safety Door Switch
Safety and reliability! An automatic ticket gate with a rotating bar that can be selected according to the usage scenario.
- Entrance and exit control system
Tohoku Rakuten Golden Eagles provides the entry and exit management system from Ski Data Co., Ltd. to Vissel Kobe. The system will start operation at "Rakuten Seimei Park Miyagi" from the home game on July 14 (Tuesday)!
Ski Data Inc. (Headquarters: Chiyoda-ku, Tokyo; Representative Director: Biane Eckard, hereinafter referred to as Ski Data) has provided the software "Handshake.Logic" as an entry and exit management system, along with the checkpoint device "Flex.Gate Refit" and the mobile checkpoint "Mobile.Gate" to the Tohoku Rakuten Golden Eagles (hereinafter referred to as Rakuten Eagles) and Vissel Kobe, both part of the Rakuten Group. A total of 44 units of Flex.Gate Refit have been installed at the Rakuten Eagles' home ground "Rakuten Seimei Park Miyagi," and 30 units at Vissel Kobe's home ground "Noevir Stadium Kobe." Additionally, 86 units of Mobile.Gate have been provided to the Rakuten Eagles and 36 units to Vissel Kobe. The entry and exit management system from Ski Data is scheduled to be fully operational starting from the home game on July 14 (Tuesday) at "Rakuten Seimei Park Miyagi." (At "Noevir Stadium Kobe," it began operation on February 12 during the AFC Champions League 2020 and was further implemented on February 23 during the Meiji Yasuda Life J1 League, Round 1.)
We can promote your company's image! It is possible to use various data carriers in combination.
- Entrance and exit control system
Leave the theft prevention measures for solar power plants to Alvatec.
- Other security
We have a lineup suitable for various environments!
- Other security
Can be installed with double-sided tape. Battery-operated, no wiring required!
- Entrance and exit control system
Atlassian Guard: A defender that enhances security in cloud environments.
- Other security
Crytech Japan is a company that provides top-level iris authentication technology.
- Personal authentication
Google's AI-powered threat intelligence, one of the largest in the world, includes malicious judgment information on files, IPs, domains, etc.
- Other security
Comprehensive support for managing security and amenities at various facilities with a multifunctional electric lock control panel.
- Entrance and exit control system
For those struggling with the procurement of multi-line control panels.
Are you having trouble procuring multi-line electric lock control panels? At JEI, we are ready to prepare for immediate shipment for multi-line systems with 8 gates or more. Since delivery times vary by line, please contact your nearest sales office for delivery confirmations or any other requests. (8 lines) Electric lock control panel CB-8 (12 lines) Electric lock control panel CB-12 (16 lines) Electric lock control panel CB-16 (20 lines) Electric lock control panel CB-20 (24 lines) Electric lock control panel CB-24A (28 lines) Electric lock control panel CB-28 (32 lines) Electric lock control panel CB-32 (36 lines) Electric lock control panel CB-36 (40 lines) Electric lock control panel CB-40 These products are available in stock as standard. [Contact Information for Each Sales Office] - Tokyo Sales Office: 03-5735-5780 - Osaka Sales Office: 06-6628-3331 - Fukuoka Sales Office: 092-477-1331 Alternatively, you can reach us 24 hours a day through the "Contact Us" section.
Basic knowledge, uses, and case studies about ventilation locks are published! *Materials available.
- Entrance and exit control system
Basic knowledge, applications, and case studies regarding anti-panic features are published!
- Entrance and exit control system
Detection, tracking, and jamming of various UAV threats realized in a single system.
- Other security
Equipped with UV sterilization function! The keypad operation and menu are displayed on the screen for easy visibility, making it an excellent user-friendly finger vein authentication system.
- Other security
Anyone can easily verify a driver's license! It is effective in preventing and deterring counterfeit driver's licenses.
- Personal authentication
- Other security
Can be installed in various vending machines such as "tobacco vending machines" and "alcohol beverage vending machines"!
- Personal authentication
- Other security
Verify your identity more quickly and accurately. Simply insert your card to easily check for counterfeits and alterations!
- Personal authentication
- Other security
Countermeasures against cyber attacks that can lead to factory shutdowns! Protecting web servers while maintaining advanced defense capabilities with AI engines!
- Other security
The reality of security diagnostics! This is an introduction to a service that investigates vulnerabilities present in information systems such as websites.
- Other security
Data erasure software for smartphones developed by Japanese data recovery technicians.
- Data Erasing
- Mobile phones, PHS, data communication cards
- Data Logger
Data erasure software for storage devices such as PCs and memory media developed by Japanese data recovery technicians.
- Data Erasing
- Desktop PC
- Notebook PC
We provide visualization and optimization support for comfortable use of Wi-Fi environments, as well as prevention of information leaks due to unauthorized use and cyber attacks.
- Other security
The cloud-based Wi-Fi security solution WiSAS introduces the "Wi-Fi Diagnostic Analysis Series" with a BATTERY PACK.
Spline Network Co., Ltd. (Headquarters: Shibuya, Tokyo; CEO: Yoichi Yukino) will begin offering "BATTERRY PACK" as part of its vulnerability assessment series for the cloud-based Wi-Fi security solution "Wi-Fi Security Assurance Series" (hereinafter referred to as WiSAS), which the company plans and sells, starting from March 6 (Wednesday) as a measure against information leakage in the Wi-Fi domain.
An access control system that unlocks electric locks with card authentication and PIN entry, and retrieves access history.
- Encryption and authentication
An access control system that unlocks electric locks with a card touch and records entry and exit history. It accurately remembers entry and exit times with a built-in clock.
- Entrance and exit control system
A time recorder that records clock-in and clock-out times just by touching a card and notifies you of the time stamp with a voice prompt.
- Entrance and exit control system
A access control system that unlocks electric locks with card authentication and PIN input, and can obtain history, suitable for outdoor installation.
- Entrance and exit control system
A time recorder that records attendance history just by touching the card to the main unit.
- Entrance and exit control system
Access control system for medium to small facilities that can manage up to 40 channels (40 doors).
- Entrance and exit control system
Supports both wall-mounted and tabletop installation. Ready-to-use attendance management system TKE-1【Mint】.
- Entrance and exit control system
An access control system that unlocks electric locks with a card touch and retrieves entry and exit history.
- Entrance and exit control system
Manufactured under perfect quality management! A stylish access control solution with a monthly fee of ¥0.
- Entrance and exit control system
Manufactured under perfect quality management! A stylish access control solution with a monthly fee of ¥0.
- Entrance and exit control system
Manufactured under perfect quality management! A stylish access control solution with a monthly fee of ¥0.
- Entrance and exit control system