List of Safety features products
- classification:Safety features
316~360 item / All 3436 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
Solve high-risk backups, backup restoration, and inspection management by utilizing information system outsourcing services! From building backup systems to maintenance.
- Other information systems
- Other services
- Data Erasing
With the end of maintenance support for Windows 10, we will assist you in the early transition to Windows 11.
- Other information systems
- Other services
- Data Erasing
We collect, assess, and purchase unwanted used home appliances, computers, and computer peripherals. We can also pick up metal products.
- Other information systems
- Other services
- Data Erasing
Not a backup, not EDR, the third option! Quickly recover even in the event of damage!
- Other security
Completely protect all users from threats that impact the business with managed service providers and their IT staff!
- Other security
Microsoft's MSP is standardly adopted to protect customer companies' systems and data! Significantly reduces recovery time and costs.
- Other security
A U.S. machining manufacturer that has faced multiple attacks achieves robust protection against cyber attacks!
- Other security
A major U.S. healthcare technology company adopts measures for data protection! Providing a revolutionary approach to data protection.
- Other security
A software solution designed with the premise of suffering from ransomware rather than defending against it!
- Other security
Monitor and tack Gate Access accurately and no need to touch!
- Entrance and exit control system
All-in-one solution for entrance and exit management "correct answer"
- Entrance and exit control system
Providing support for authentication, testing, verification, planning, advisory, etc.
- Other security
- Other contract services
- Public Testing/Laboratory
I want to know about this! Cybersecurity standards for medical devices IEC 81001-5-1.
- Public Testing/Laboratory
- Other security
- Contract Inspection
From participant registration to the issuance of the QR code! Both printed codes on paper and codes displayed on smartphones are possible.
- 2D Code Reader
- Entrance and exit control system
The only hardware you need is your smartphone! It will be used as a QR code reader for reception.
- 2D Code Reader
- Entrance and exit control system
- Personal authentication
It is an attack technique to discover vulnerabilities in Japanese language DNN models.
- Other security
Upper Collision Warning System for Unic Vehicles
- Other safety and hygiene products
- Other safety equipment
- Other security
Seamless security, simultaneous management with weight and IC tags! Reducing workload by 1/5.
- Cabinets and Boxes
- cabinet
- Other security
High security! Automation of inventory management and integration with existing systems.
- Cabinets and Boxes
- cabinet
- Other security
Data erasure software for computers that anyone can easily use.
- Data Erasing
Disk Shredder 7 Product Introduction Seminar to be held on February 22 (Wednesday)
Invitation to the Product Introduction Seminar (Free) This is a product introduction seminar for the data erasure software "Disk Shredder 7." We will provide an explanation of the product while demonstrating actual erasure operations using the real device. ○ Target Audience - Customers considering measures against information leakage for recycled or discarded computers - Customers currently evaluating information leakage measures in IT asset management - Customers thinking about switching from other erasure software or services - Customers currently using Disk Shredder * Participation for educational or training purposes related to information security is also welcome. * Participation from competitors may be declined. ○ Main Content - What is Disk Shredder (Why is data erasure necessary?) - Comparison with previous versions - Comparison with other companies' data erasure software - Case studies - Product demonstration using actual devices (we will erase SSDs/HDDs) - Q&A session ○ Participation Benefits - We will provide a working verification disk for Disk Shredder 7.
It is a bidirectional proximity warning system that detects the approach of heavy machinery and workers using "ultrasonic" and "radio waves."
- Other security
- Laser Components
- Other safety and hygiene products
For those who want to reduce communication volume and achieve stable video surveillance, or for those who want to reduce the load on IP cameras! Achieve high-quality and stable video transmission.
- Surveillance Camera System
- Other security and surveillance systems
- Other security
The smallest and safest smart lock "tedee".
- Other PCs and OA equipment
- Other security
[Presentation of Materials] What is Barrier-Free? An Explanation of the Basics of Accommodations for Wheelchair Users
- Other security
- Safety Sensors
- Area Sensor
AI facial recognition, employee management solution, attendance and labor management, entry and exit management, strengthening internal controls, reliable construction and maintenance system, retail i...
- Entrance and exit control system
- Personal authentication
Improving system stability through OSS management, also compliant with the Cyber Resilience Act.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Manage OSS vulnerability risks in game development and create safe games.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Reduce copyright risks of entertainment content through OSS/SBOM management.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
OSS/SBOM management tool to enhance personal information protection.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
An OSS/SBOM management tool that supports the secure management of customer data.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Supporting compliance for financial institutions through OSS management and SBOM creation.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
We support risk management of OSS and the creation of SBOM, protecting communication infrastructure.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Support risk management of OSS and creation of SBOM to enhance security.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Support OSS management and SBOM creation to reduce supply chain risks.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
A tool for managing OSS/SBOM that protects patient information security.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
From project management to tool management, readable across a wide range! For efficient and accurate production line construction.
- antenna
- Document and Data Management
- Entrance and exit control system
A clear explanation of how to obtain a technical standards conformity certification!
To sell and use products that utilize wireless technology in Japan, it is necessary to obtain a national certification called "Technical Standards Conformity Certification (Giteki)." So, "how do you obtain Giteki?" 【Step 1】 What products require Giteki? Devices that communicate using wireless technology that emits radio waves are subject to this requirement, such as smartphones, Wi-Fi routers, Bluetooth earphones, wireless mice, wireless transceivers, IoT devices, etc. 【Step 2】 Where can you get the assessment done? The assessment for Giteki is conducted by a third-party organization recognized by the government, called a "Registered Certification Body." Examples include the Telecommunications Engineering Center (TELEC) and the Japan Maritime Bureau (JCI). 【Step 3】 What do you need to submit? For the assessment, you need to submit documents and samples such as the following, to check for "signal strength," "frequency accuracy," and "radio interference": Product technical specifications (such as frequency and output), circuit diagrams or design drawings, and the actual product (or prototype). 【Step 4】 If you pass the test, you will receive the "Giteki mark"! 【Step 5】 After that, you can freely sell and use the product!
Improving the quality and safety of the manufacturing process through OSS/SBOM management.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
This seminar will provide the latest information on cybersecurity and compare the mainstream security standards and frameworks.
- Firewall and intrusion prevention
Introducing a system for managing entry and exit to management locations using a touch panel display!
- Entrance and exit control system
Achieve hands-free and smooth entry and exit management! Real-time monitoring is possible even from a distance.
- Entrance and exit control system