List of Other security products
- classification:Other security
931~945 item / All 1989 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
Over 3,000 street cameras installed nationwide, high-quality recording, integrated camera and recording device with no wiring required, SD card recording, utility model obtained.
- Other security
[Ransomware Countermeasures & BCP] Protect important data! Automatically offline backup environments, achieving low-cost and simple measures.
- Other security
- Server monitoring and network management tools
"New collaboration for ransomware countermeasures" - Partnering with Veeam Software for automatic offline storage of backup data to minimize damage.
Allied Telesis, Inc. (Headquarters: Shinagawa-ku, Tokyo; Chairman: Sachie Oshima) has enhanced its service, Net.Pro "AT-Offline Manager," which protects backup data from ransomware attacks, by integrating it with Veeam Software, Inc.'s solution "Veeam Backup & Replication," which combines data backup, recovery, and management. This collaboration strengthens our data protection solution against ransomware and expands our services. *For more details, please refer to the PDF document or related links.
The management of keys is dramatically improved by a high-functioning key box.
- Other security
- cabinet
Toraka Touch Pro has won the Red Dot Award.
The Traka Touch Pro series from Traka, a company based in the UK and part of the ASSA ABLOY Group, has won the Red Dot Product Design Award. Traka is a global leader in intelligent key management solutions, and the Traka Touch Pro series is one of its core products. The Traka Touch Pro series, an intelligent key cabinet system, features a sophisticated modern structure, and its sustainability-focused design establishes a new standard in the industry by creating robust, reliable, and secure solutions. The Red Dot Design Award, established in 1955, is one of the world's most prestigious design competitions, organized by the Design Center North Rhine-Westphalia in Germany. It consists of three categories: Product Design, Brand & Communication Design, and Design Concept, with over 18,000 entries from more than 60 countries worldwide.
If you are having trouble with RI law entry and exit management or access management, this is a key box that complies with the regulations concerning radioactive isotopes and similar substances.
- Other security
- cabinet
Warning of intrusion and unauthorized access
- Other security and surveillance systems
- Other measurement, recording and measuring instruments
- Other security
This explains "cracking," which is something you want to understand when considering security measures for your company's app.
- Other security
Instant measurement of surface temperature. Management of individuals through AI facial recognition is also possible.
- Other security
Authentication enhancement by combining two or more elements! Protecting business and data from security threats.
- Personal authentication
- Other security
Many domestic customers are using it! Introducing 'basic features', 'implementation benefits', and 'authentication methods'.
- Other security
Explaining the advantages and disadvantages of major authentication methods! Introducing 'Raku-nin,' which adopts a multi-authentication method.
- Personal authentication
- Encryption and authentication
- Other security
Strengthening security measures such as multi-factor authentication! Posting alerts from CISA.
- Encryption and authentication
- Other security
User operations are simple! Use a one-time password authentication token.
- Other security
Used like a physical key! No need to enter passwords or passcodes.
- Other security
This is an automatic reporting device that connects to general lines and PBX lines. It is equipped with 4 contact inputs for power failure reporting and power restoration reporting functions.
- Other security
Conduct attack analysis using AI and machine learning, score risk levels based on severity and credibility, and verify the normality of processes and abnormal communications.
- Other security