List of Safety features products
- classification:Safety features
1201~1260 item / All 3372 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
Log management software for security operations developed by a SOC provider capable of ransomware countermeasures.
- Other security
What are the risks of using apps in the manufacturing industry? What security measures are necessary? We will explain app security-related knowledge in an easy-to-understand manner!
- Other security
"Key Station" is a key management system handled by Seiko Maintenance Co., Ltd.
- Encryption and authentication
Explaining why certificate authentication is effective against security threats both inside and outside the organization.
- Other security
Explaining the necessary security measures to prevent shadow IT and unauthorized access.
- Other security
What is necessary to make remote work secure and safe?
- Other security
With SeciossLink, you can log in to the academic authentication service using your Microsoft Entra ID account information.
- Other security
Ideal for realizing the GIGA School Concept. An access control service necessary for the next generation of school administrative DX. Creating an environment where students can learn safely and staff ...
- Other security
No changes to VPN devices or network configuration are necessary. Secure remote connections to Windows OS and Linux OS are achieved.
- Other security
This is an ASP service that notifies via email about abnormalities and operational status of terminal devices.
- Other network tools
- Other security
- Other security and surveillance systems
We will be exhibiting at the "2nd Manufacturing Industry DX Exhibition" within the Monozukuri World.
Dear Sir/Madam, I hope this message finds you in good health and spirits. We are pleased to announce that our company will be exhibiting at the "2nd Manufacturing DX Exhibition" within the Manufacturing World, which will be held at Tokyo Big Sight from June 19, 2024. ■ Exhibition Dates June 19 (Wednesday) - 21 (Friday), 2024 ■ Venue Tokyo Big Sight, South Hall 2 ■ Highlights of Our Exhibition - A SaaS-based monitoring system ideal for remote monitoring of multi-site equipment. - ASP services for abnormal monitoring of industrial machinery such as pumps and boilers. - A power data collection system utilizing B-route of smart meters (ECHONet Lite specification). - We will introduce various monitoring systems and data collection devices aimed at the digital transformation and labor reduction of equipment monitoring. ■ Booth Number S15-9 (South Hall 2) We warmly invite you to visit our booth. Our staff looks forward to welcoming you.
Leave automotive security consulting to us.
- Other security
Share important files securely! Solve security issues like the PPAP problem.
- Encryption and authentication
Suprema's new flagship device BioStation3
- Other security
We offer two types of aisle widths! Compact and simple, making it suitable for labor-saving in various locations.
- Other security
By balancing safety and usability, we have achieved a security gate that is easy for anyone to use!
- Other security
Create an open space that integrates with the entrance, allowing everyone to spend time comfortably!
- Other security
Excellent cost performance! Introducing our flapper gate.
- Entrance and exit control system
For labor-saving tasks such as ticket validation! An LCD display is built into the ticketing section.
- Entrance and exit control system
A classic model of the flapper gate! It has numerous achievements in public racing venues nationwide.
- Entrance and exit control system
Enhancing security using biometric information from finger veins while also achieving labor-saving during passage! A timer function allows for the setting of access restrictions as well.
- Personal authentication
Realizing various services and SSO integration.
- Other security
Software for centralized management of IDs scattered across multiple systems.
- Other security
Possessing achievements and experience/skills in the international market! Responding immediately to unknown threats, detecting zero-day attacks, and proactively defending.
- Firewall and intrusion prevention
Devices facing the internet, such as firewalls and mail servers!
- Other security
Over 1,600 high-quality diagnoses annually! Re-diagnosis is possible as many times as needed with one year of after-support.
- Other security
AI technology to detect zero-day attacks! Conducting inspections through a unique four-phase process.
- Other security
Supporting safe business operations! A specialized team provides centralized monitoring of all networks.
- Other services
- Firewall and intrusion prevention
[Introduced in a comic] What is the best protective frame for renovation work in family apartments?
- others
- Firewall and intrusion prevention
We will share and accumulate data on the entry and exit situation at the site.
- Entrance and exit control system
Why we are promoting DX! An explanation of the risks of not promoting it and key points for success.
- Other services
- Other security
Reduce the risk of external intrusion! Cut labor costs through automation and unmanned operations! Also useful for understanding and managing the number of people in the facility!
- Entrance and exit control system
We protect information assets with authentication via IC cards and encryption technology!
- Encryption and authentication
Protect your information assets from the latest threats. UTM for small businesses.
- Other security
Equipped with an intuitive and easy-to-understand touch screen! Authentication management with a PIN code.
- Entrance and exit control system
Introducing how facial recognition will become rooted in our lives in a column format!
- Personal authentication
Introducing the future prospects of facial recognition technology in a column, incorporating specific examples!
- Personal authentication
Drip-proof mechanism (equivalent to IPX5), slim (13mm) surface-mounted ◎ Can be installed in various locations, both outdoors and indoors.
- Other security
- Entrance and exit control system
To set an appropriate password! An explanation of weak passwords and attack methods.
- Encryption and authentication
- Other security
Explaining examples of dangerous passwords and methods to prevent unauthorized access by third parties!
- Encryption and authentication
- Other security
The reality of password management in companies! A column explaining the measures that should be taken.
- Other security
- Integrated operation management
- Encryption and authentication
A detailed explanation of the importance and key points of password management in a column!
- Other security
- Integrated operation management
- Encryption and authentication
Explaining safe password management methods! Also introducing recommended password management tools.
- Other security
- Integrated operation management
- Encryption and authentication
Introduction to the necessity of access control, its basic functions, and types of control methods!
- Encryption and authentication
- Other security
Explaining the causes of damage, examples of damage, and the measures taken by users and companies!
- Other security
An overview and explanation of single sign-on features! We are comparing major tools.
- Encryption and authentication
- Personal authentication
- Other security
A column explaining the advantages and disadvantages of implementation, as well as the methods of single sign-on!
- Encryption and authentication
- Personal authentication
The benefits of single sign-on using SAML authentication! Explanation of the differences with OAuth as well.
- Encryption and authentication
- Personal authentication
Introducing the cloud-based and on-premises types! Also explaining the main features and how to choose.
- Encryption and authentication
- Personal authentication
- Other security
Explaining methods and usage examples! We will also introduce the system for achieving single sign-on.
- Encryption and authentication
- Personal authentication
Explaining the six authentication methods and mechanisms of single sign-on, as well as the four benefits of its implementation!
- Encryption and authentication
- Personal authentication
Explaining the differences between IdP and SP, the flow of the authentication process, and the benefits of IdP!
- Encryption and authentication
- Other security
An introduction to IDaaS, including an explanation of what it is and why it has gained attention!
- Integrated operation management
- Other security
Comparison of recommended IDaaS products! An overview of IDaaS, its benefits, and how to choose, explained in a column.
- Integrated operation management
- Other security
Introducing the features, advantages, disadvantages, and key points to consider when choosing IDaaS!
- Integrated operation management
- Encryption and authentication
The difference between "SSO" and "IDaaS"! Introducing the benefits of implementation and recommended services.
- Other security
- Integrated operation management
Cloud-based IT asset management and information leak prevention. It's easy to start managing work hours and laptops taken home for telework.
- Other security
Gain visibility into complex infrastructure! Introducing the case study of the network traffic monitoring tool "Flowmon."
- filtering
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Enhancing incident response for large-scale networks with the introduction of the network traffic monitoring tool "Flowmon"! Case study of our product implementation.
- filtering
How far have hospitals progressed in their ransomware countermeasures? - Progress Software conducts a reality survey.
Due to a series of ransomware attacks targeting hospitals, there has been a growing interest in cybersecurity among medical institutions. For example, in October 2022, a ransomware attack on a hospital in Osaka rendered electronic medical records unusable, halting outpatient services and taking two months to restore the system using backup data. Given the detailed reports of the serious damage, many inquiries have been received by the agencies (SIers) handling "Flowmon ADS," a ransomware countermeasure solution offered by Progress Software. You can find more details in the related links below.