List of Safety features products
- classification:Safety features
1321~1380 item / All 3370 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
Cloud-based Matrix USB key. It can be operated like a physical dongle via API.
- Other security
Prevent worker mistakes and improve operational efficiency with barcode and QR code authentication! Operate with inventory management shelves that maintain the existing box sizes and arrangements!
- Other security
"Over 600 camera design achievements" We select manufacturers and cameras tailored to the installation location and purpose, implementing more effective camera designs.
- Other security
- Color camera
- others
Avoiding risks through training for highly sophisticated "targeted attack emails."
- Firewall and intrusion prevention
[Telework Recommended] Securely log in to Windows using two-factor authentication with a smartphone app. *A document introducing the new features will be provided.
- Personal authentication
Addressing new needs! Security has become an indispensable element among customer challenges.
- Other security
In-house diagnosis of a vast number of websites! Achieving cost reduction and increased scope and frequency of diagnosis.
- Other security
Designed as a comprehensive tool for various astronomical research! Compatible with a wide range of data formats.
- Document and Data Management
- Data Erasing
Easy to use and multifunctional for peace of mind! Protecting grandpa and grandma from scam calls and solicitation calls.
- Other security
- Other PCs and OA equipment
Daily body surface temperature measurement and alcohol check with this one device! Identity verification with AI facial recognition.
- Other measurement, recording and measuring instruments
- Other inspection equipment and devices
- Personal authentication
More advanced, more convenient! Products of professional quality recognized by security experts.
- Other security
Support for the construction of small to medium-sized system infrastructure.
- server
- Storage Backup
- Other security
The world's first explosion-proof smartwatch that has passed domestic explosion-proof certification, obtained international explosion-proof standards (IECEx), and can be used in Class 1 hazardous loca...
- Other safety and hygiene products
- others
- Other security
It is a USB card reader compatible with FeliCa/MIFARE standards.
- Other security
- Entrance and exit control system
Easy to install! Nighttime, always-on type. It can be used with solar power in places where power cannot be obtained or during disasters (can be mounted on existing poles or placed directly).
- Other security
Adopting Industry 4.0 with a real-time location information system.
- Entrance and exit control system
- Other information systems
A security camera that can be installed by simply sticking or placing it, allowing you to take pictures from indoors through the window.
- Other security and surveillance systems
- Other security
- Other office supplies
Solar charging and a motion sensor-equipped LED light serve as both a dummy security camera and nighttime lighting.
- Other security
- Other security and surveillance systems
- Surveillance Cameras
Drip-proof mechanism (equivalent to IPX5), slim (13mm) surface-mounted design ◎ Random 10-key display with 7-segment notation.
- Other security
- Entrance and exit control system
Unexpected, yet assured peace of mind. Proven implementation in various industries across the country.
- Other security
It is possible to achieve both safety and convenience! It helps prevent loss and theft, as well as counterfeiting and impersonation. [Free materials available!]
- Other security
Reduce the hassle of registering images to facial recognition terminals. Easily register face photos taken with a tablet PC to the terminal. Data updates can be done using only Excel.
- Personal authentication
Just place it for automatic detection. It can be used by all organizations, companies, and institutions involved with foreigners.
- Personal authentication
An alarm of 90 decibels will sound when the magnetic sensor and the main unit are separated.
- Other security
- Other office supplies
- others
Two tools collaborate! An integrated service for cybersecurity measures and support for work style reform.
- Virus software
- Firewall and intrusion prevention
- Other security
Visualize internal risks and challenges! It is important to raise each individual's security awareness.
- Other security
- Email/Fax transmission
A third-generation antivirus software that utilizes deep learning for cyber attack prevention.
- Virus software
- Firewall and intrusion prevention
- Other security
Image recognition technology establishes a new security standard! Introducing Suprema BioStation3.
- Surveillance Camera System
- Entrance and exit control system
- Recorders
Certification is possible even when wearing goggles in hazardous environments, food factories, laboratories, and more!
- Personal authentication
- Other security and surveillance systems
- Entrance and exit control system
Compact design that can be placed anywhere! Enables operation at low cost.
- Encryption and authentication
- Personal authentication
High-security system achieved at low cost.
- Other security
Access restriction and attendance management application: Fast, contactless, hands-free authentication.
- Image Processing Equipment
- Entrance and exit control system
- Personal authentication
If you are building a new one, it's recommended. It can be unlocked with facial recognition.
- Entrance and exit control system
This is a digital locker lock ideal for delivery boxes. It uses a passcode for locking and unlocking.
- Other security
Introduced with a variety of diverse options! Non-touch frames and semi-self-checkout systems, etc.
- Dedicated IC
- Entrance and exit control system
It is possible to set location restrictions that can be opened individually or by group even without an IC card! It is also suitable for storing important documents such as My Number!
- Other security
The wanderer should report the still images to the caregivers and administrators via email!
- Personal authentication
- Other security and surveillance systems
This is Lavish's new card reader that can be customized for free.
- Other security
- Entrance and exit control system
It is a card reader with a dedicated specification.
- Other security
- Entrance and exit control system
A card reader with a display that supports NFC has arrived!
- Entrance and exit control system
Explosion-proof network IP camera that has passed domestic explosion-proof certification, obtained international explosion-proof standard (IECEx), and can be used in Class 1 hazardous locations (Zone ...
- Other network tools
- Surveillance Cameras
- Other security
We will introduce the benefits of implementing CrackProof and its background.
- Other security
[Product Information Update] Reasons Why CrackProof is Chosen for App Security Measures
We have updated the product information. While introducing the points that have received high praise from our customers, we explained the benefits of implementing CrackProof and the background behind it. Please take a look.
Four different encryption algorithms are supported, including RC4, AES-128 in OFB mode, and AES-128 in CCM mode.
- Other security
We provide a safe business environment with "m-FILTER," which only receives secure emails.
- Email/Fax transmission
- Other security
We provide a safe work environment with "i-FILTER," which allows access only to secure websites.
- filtering
- Virus software
- Other security
Easily implementable AI-equipped systems. Solutions for detecting people, objects, and work conditions. Support available from proof of concept to commercialization.
- Personal authentication
Before Windows apps are affected, various protective features are added to prevent attacks and strengthen security!
- Other security
Before iOS apps are affected, various protective features are added to prevent attacks and strengthen security!
- Other security
Before Android apps are affected, various protective features are added to prevent attacks and strengthen security!
- Other security
Security software that protects applications from cracking (unauthorized analysis and tampering).
- Other security
We will introduce a case where cracking prevention was achieved through actual use!
- Other security
Introducing the security solution product "CrackProof" that protects apps from unauthorized attacks in a manga format!
- Other security
Before Android apps are affected, various protective features are added to prevent attacks and strengthen security!
- Other security
Usable in standalone mode or on a network, a compact and easy-to-use NFC card reader.
- Other security
Utilizing our proprietary know-how! Supporting your product business from cybersecurity.
- Other security
- Other services
Introduction to FIPS 140-2 Level Certified Smart Card-Based Authentication Devices
- Other security
I will explain the comprehensive support system of the app security measure tool "CrackProof."
- Other security
Product Information Update: Follow-up with Customers After the Introduction of 【CrackProof】
We have updated the product information. When selecting security products, many companies place great importance on whether there is a sufficient follow-up system after implementation. We have explained the follow-up system for CrackProof after implementation. Please take a look.