List of Safety features products
- classification:Safety features
1501~1560 item / All 3370 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
This book provides an understanding of cases of damage from unauthorized app modifications and countermeasures.
- Other security
Achieve smooth entry and exit procedures for vehicles and the digitization of records using color codes!
- Entrance and exit control system
Achieve management of workers' entry and exit, location, and movement using color codes!
- Entrance and exit control system
- Other security
- Personal authentication
It is a system that adds a "watermark" to the streaming screen of online events, enhancing security awareness and enabling the identification of the source in case of a leak.
- Other security
Are you worried about broadcasting internal events (such as training sessions and company-wide meetings) that contain confidential information? Our B2B broadcasting service alleviates that concern.
- Other security
The collaboration between a virtual security door and an authentication terminal using a 3D image sensor accurately detects difficult-to-prevent tailgating and prevents unauthorized entry.
- Other security and surveillance systems
- Entrance and exit control system
- Surveillance Camera System
It is an alarm system for safety measures that detects the passage of cars and people at entrance gates and other locations.
- Other security and surveillance systems
- Other security
Safety measures for the site! Alerts for the proximity of people and heavy machinery.
- Other security and surveillance systems
- Other security
A hands-free entry and exit management system that allows for easy authentication just by getting close.
- Entrance and exit control system
- Other information systems
- Other security
Manage "when," "who," and "where" in real-time hands-free using various devices.
- Entrance and exit control system
- Other information systems
- Other security
Over 3,000 street cameras installed nationwide, high-quality recording, integrated camera and recording device with no wiring required, SD card recording, utility model obtained.
- Other security
[Ransomware Countermeasures & BCP] Protect important data! Automatically offline backup environments, achieving low-cost and simple measures.
- Other security
- Server monitoring and network management tools
"New collaboration for ransomware countermeasures" - Partnering with Veeam Software for automatic offline storage of backup data to minimize damage.
Allied Telesis, Inc. (Headquarters: Shinagawa-ku, Tokyo; Chairman: Sachie Oshima) has enhanced its service, Net.Pro "AT-Offline Manager," which protects backup data from ransomware attacks, by integrating it with Veeam Software, Inc.'s solution "Veeam Backup & Replication," which combines data backup, recovery, and management. This collaboration strengthens our data protection solution against ransomware and expands our services. *For more details, please refer to the PDF document or related links.
The management of keys is dramatically improved by a high-functioning key box.
- Other security
- cabinet
Toraka Touch Pro has won the Red Dot Award.
The Traka Touch Pro series from Traka, a company based in the UK and part of the ASSA ABLOY Group, has won the Red Dot Product Design Award. Traka is a global leader in intelligent key management solutions, and the Traka Touch Pro series is one of its core products. The Traka Touch Pro series, an intelligent key cabinet system, features a sophisticated modern structure, and its sustainability-focused design establishes a new standard in the industry by creating robust, reliable, and secure solutions. The Red Dot Design Award, established in 1955, is one of the world's most prestigious design competitions, organized by the Design Center North Rhine-Westphalia in Germany. It consists of three categories: Product Design, Brand & Communication Design, and Design Concept, with over 18,000 entries from more than 60 countries worldwide.
If you are having trouble with RI law entry and exit management or access management, this is a key box that complies with the regulations concerning radioactive isotopes and similar substances.
- Other security
- cabinet
Introducing examples of "anywhere" unmanned check-in systems in accommodation facilities!
- Entrance and exit control system
Warning of intrusion and unauthorized access
- Other security and surveillance systems
- Other measurement, recording and measuring instruments
- Other security
This explains "cracking," which is something you want to understand when considering security measures for your company's app.
- Other security
High security is possible! An access control system that can manage up to 2,560 gates.
- Entrance and exit control system
- Personal authentication
Instant measurement of surface temperature. Management of individuals through AI facial recognition is also possible.
- Other security
It is a compact security appliance that allows anyone to easily manage devices connected to the network.
- Firewall and intrusion prevention
Authentication enhancement by combining two or more elements! Protecting business and data from security threats.
- Personal authentication
- Other security
Many domestic customers are using it! Introducing 'basic features', 'implementation benefits', and 'authentication methods'.
- Other security
Explaining the advantages and disadvantages of major authentication methods! Introducing 'Raku-nin,' which adopts a multi-authentication method.
- Personal authentication
- Encryption and authentication
- Other security
Strengthening security measures such as multi-factor authentication! Posting alerts from CISA.
- Encryption and authentication
- Other security
User operations are simple! Use a one-time password authentication token.
- Other security
Used like a physical key! No need to enter passwords or passcodes.
- Other security
On-site management of who entered and exited, and when! A case where smooth entry and exit became possible.
- Personal authentication
- Entrance and exit control system
A case where reception management became smoother due to the introduction! Additional implementation has also been decided since April 2023.
- Personal authentication
- Entrance and exit control system
This is an automatic reporting device that connects to general lines and PBX lines. It is equipped with 4 contact inputs for power failure reporting and power restoration reporting functions.
- Other security
Conduct attack analysis using AI and machine learning, score risk levels based on severity and credibility, and verify the normality of processes and abnormal communications.
- Other security
★Free webinar on cybersecurity measures to be held in April, now accepting reservations! An explanation of managed security services and vulnerability measures for network devices.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Regularly hold individual consultation sessions with network security professionals.
We will hold individual consultation sessions every Tuesday, where we will accept inquiries regarding issues and countermeasures related to network security. The target audience includes both end-user companies considering service implementation and companies considering sales partners. ■Overview of Individual Consultation Sessions Capacity: 1 group per week Target: ● Companies considering their own implementation and wishing to consult on issues and countermeasures related to network security ● Companies considering sales partners for security products
1CH H.264 4K (3840×2160/28fps) compatible video server
- Video Recorder
- Other security
- Other security and surveillance systems
With non-contact scanning, it is possible to perform matching tasks even when hands are occupied or when wearing gloves! Achieving safe and accurate entry and attendance management.
- Entrance and exit control system
We will prevent the loss or unauthorized removal of important documents and samples!
- Other security
- Entrance and exit control system
Cloud-based corporate cafeteria DX for real-time viewing of meal management and statistics.
- Other operation management software
- Purchasing Management System
- Entrance and exit control system
Achieve faster and more accurate authentication with a 64-bit CPU and new algorithms! Various applications are possible.
- Entrance and exit control system
Introducing practical log management tips compiled by a SOC operator with 20 years of experience.
- Other security
- Integrated operation management
- Server monitoring and network management tools
Cyber attacks occur every 13 seconds! Here is a guide to a white paper explaining security measures that do not create operational gaps!
- Integrated operation management
- Server monitoring and network management tools
- Other security
Start immediately with SaaS! Visualize security risks and work conditions from Microsoft 365 logs!
- Other security
- Other operation management software
- Server monitoring and network management tools
Ideal for IT security of manufacturing line management PC terminals! Standalone PC operation log management and device control software!
- Other security
Analyzing the logs of highly productive employees! Efficient shortcut settings and more become apparent.
- Other security
Smart lock with 3D facial recognition
- Personal authentication
- Encryption and authentication
- Other security
Attendance management is conducted using facial recognition to prevent fraudulent attendance. It eliminates the "impersonation" weakness associated with IC card systems and roll call methods.
- Other core systems
- Entrance and exit control system
To manage attendance using facial recognition, which is becoming more widespread, it can be easily implemented on a low budget. There is no need for card updates or issuance, which also helps reduce o...
- Other core systems
- Entrance and exit control system
Sweden, an advanced IT country, is moving away from digital textbooks, and the use of ICT devices should be "appropriate."
In Sweden, an advanced IT country, the movement away from digital textbooks is progressing, and in the new school term starting in August 2023, more emphasis is being placed on reading time and handwriting practice, while the time spent using computers and tablets is being reduced. Additionally, Sweden's Minister of Education, Lotta Edholm, has announced the government's intention to overturn the National Agency for Education's decision to mandate the use of digital devices in kindergartens, and reports indicate that the government plans to completely abolish digital learning for children under six years old. The international assessment of reading comprehension for fourth graders, known as the Progress in International Reading Literacy Study (PIRLS), has revealed that between 2016 and 2021, the reading skills of Swedish students have declined. Politicians and experts have raised concerns that the highly digitized education system may have contributed to this decline in foundational skills, and it seems that Minister Lotta Edholm has responded by initiating a move towards de-digitalization. For more details, click here: https://t-lenon.com/info/education/9031/
Mitigating cyber threats to the entire Moxa system! A detailed explanation of the methods used.
- Other security
Testing three types of alarm sensors: radar, laser, and missile.
- Testing Equipment and Devices
- Other security
- Other safety and hygiene products
"Who? When? What?" Things that must not be lost by the company. Why not manage them with TAGMATCH?
- Storage
- Other security
- Other operation management software
Further acceleration of authentication speed! Utilize the iris and facial recognition system with a 64-bit CPU for efficient, smooth, and accurate access control and attendance management!
- Entrance and exit control system
Is the management information for the facial recognition terminal user-friendly? SmileOkay-MU allows for the registration of names in kanji and notifications via images and audio.
- Entrance and exit control system
Not only can it be installed outdoors, but it also achieves fast and high-precision facial recognition using deep learning algorithms.
- Entrance and exit control system
Product information for the outdoor-installable facial recognition terminal "SmileOkay-HO" has been registered. *Demo/loan available.
The "SmileOkay-HO" is not only capable of outdoor installation but also achieves high-speed and high-precision facial recognition using deep learning algorithms. The "SmileOkay-HO" is waterproof and dustproof, making it a facial recognition terminal that can be installed outdoors as well as indoors. The facial recognition time is just 0.2 seconds, and it authenticates at a distance of 1.5 meters from the camera. It can authenticate while walking without the need to stop. The facial recognition accuracy is also very high, at ≧99%. Additionally, with the utility software developed independently by IT Sec, bulk registration of user data and easy transfer of facial registration data can be performed, allowing for centralized management of multiple terminals. For indoor installation, we also offer the facial recognition and body temperature measurement systems "SmileOkay-HT" and "SmileOkay-DT," as well as the iris recognition, facial recognition, and body temperature measurement system "SmileOkay-iNX," which also includes a temperature measurement function. *Demo units are available for loan for all models! *For more details, please download the PDF from the related product page or contact us.
Accurate attendance management by the individual is possible! It is easy to exchange registered data between facial recognition terminals.
- Entrance and exit control system
A single device can register data for up to 6,000 people! Early detection of feverish individuals helps avoid droplet and contact infections at close range.
- Entrance and exit control system
Product information for the outdoor-installable facial recognition terminal "SmileOkay-HO" has been registered. *Demo/loan available.
The "SmileOkay-HO" is not only capable of outdoor installation but also achieves high-speed and high-precision facial recognition using deep learning algorithms. The "SmileOkay-HO" is waterproof and dustproof, making it a facial recognition terminal that can be installed outdoors as well as indoors. The facial recognition time is just 0.2 seconds, and it authenticates at a distance of 1.5 meters from the camera. It can authenticate while walking without the need to stop. The facial recognition accuracy is also very high, at ≧99%. Additionally, with the utility software developed independently by IT Sec, bulk registration of user data and easy transfer of facial registration data can be performed, allowing for centralized management of multiple terminals. For indoor installation, we also offer the facial recognition and body temperature measurement systems "SmileOkay-HT" and "SmileOkay-DT," as well as the iris recognition, facial recognition, and body temperature measurement system "SmileOkay-iNX," which also includes a temperature measurement function. *Demo units are available for loan for all models! *For more details, please download the PDF from the related product page or contact us.
To areas with few passengers or unmanned stations.
- Entrance and exit control system
- Other security and surveillance systems
- others
An Attack Tree is a threat analysis tool that assists in measures to protect autonomous vehicles from threats such as hacking.
- Other security
This is a card reader dedicated to your company that achieves low cost and high security.
- Other security
- Entrance and exit control system
We will notify parents via email or other means about their child's arrival/departure from the facility. The method used to authenticate the child employs the latest facial recognition technology.
- Personal authentication
- Entrance and exit control system
Support for Azure AD multi-factor authentication with hardware tokens! Choose products that suit your needs. *Free trial available.
- Other security
Enhance your security level! Introducing ways to prevent information leaks on the blog.
- Encryption and authentication
It's possible to save costs! Introducing the benefits of passwordless authentication in a blog.
- Encryption and authentication
Enjoy the convenience of the cloud! Introducing security enhancement through device authentication in our blog.
- Personal authentication