List of Other security products
- classification:Other security
1501~1515 item / All 1984 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
Simplifying data collection settings on the monitoring server!
- Other security
Temperature calibration device * Fever detection (body temperature measurement) accessory for thermal camera GJ-IP2617BF-THS/PA
- Other security
4 Megapixel Fever Detection (Body Temperature Measurement) Thermal Camera Series
- Other security
Maximize the effectiveness of existing tools and departmental output through orchestration and automation!
- Software (middle, driver, security, etc.)
- Other security
Web application vulnerabilities can be easily mitigated without specialized knowledge!
- Software (middle, driver, security, etc.)
- Other security
Automatically assess and understand the risks across the entire infrastructure.
- Software (middle, driver, security, etc.)
- Other security
Enables quicker and more accurate decision-making throughout the entire lifecycle of risk detection and response.
- Software (middle, driver, security, etc.)
- Other security
Car security linked type! Front + interior dual camera dashcam.
- Video Recorder
- Other security
You can definitely search and find it with a minimum error of 50 cm.
- Other security
Strong against picking! A security lock that achieves high theft prevention.
- Other security
Image recognition AI solutions for achieving DX!
- Image analysis software
- Image Processing Equipment
- Other security
To prevent the unauthorized removal of equipment and for security measures! An alarm will notify with sound and light when equipment or products with RF tags are removed!
- Other security
- IC tag
- Other security and surveillance systems
No PC needed! Use RFID for asset management! Prevent unauthorized removal of equipment and enhance security measures! An alarm will notify you with sound and light when equipment or products with RFID tags are removed!
The "Equipment and Product Outgoing Detection Package" handled by Maspro Denkoh is a system that utilizes UHF band RFID to detect the outgoing of equipment and products. 【Issues】 - Managed with a handwritten ledger → Human errors such as omissions occur → Concerns about security, such as unauthorized removals - Managed using security tags → Uncertainty about when to replace the battery; battery replacement is cumbersome The "Equipment and Product Outgoing Detection Package" using UHF band RFID involves attaching tags to the items that need outgoing management. When the tag passes in front of the installed antenna, the antenna reads the tag, and an alarm notifies with sound and light. Additionally, RF tags do not require batteries and can be used semi-permanently. 【Features】 ■ Since all necessary components such as antennas, readers/writers, tags, and software are included in the package, you can easily start the RFID system without a PC as long as you have an AC100V power supply.
Enables safe external use of PCs. Data can be used securely even in locations without a network environment.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Prevent information leaks due to internal misconduct! Eliminate unauthorized use of privileges and rights to take out information to "nothing."
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Using secret dispersal technology to render data meaningless! Safe storage and management on the cloud is possible.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security