List of Other security products
- classification:Other security
601~630 item / All 1916 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
Just connect to the target device for a virus scan! You can also choose the scanning method and how to save the logs.
- Other security
Windows 7 support has ended! After support ends, security risks will increase.
- Other security
We will explain the security measures for exchanging technical information with external parties such as joint ventures and contractors using our own software in product development and production ope...
- Other security
Waterproof and compliant with IP66, this leader is resistant to strong rain, wind, and dust.
- Other security
Also for automatic doors and glass doors! Waterproof and wireless, it can be installed in various locations.
- Other security
Simple design with a cable type.
- Other security
With an LED light, the dial is visible even in dark places!
- Other security
Use it with peace of mind anywhere! Comes with protective cushioning to prevent scratches.
- Other security
Instead of starting from the implementation phase, let's first understand the current situation! Achieving effective and efficient security measures.
- Other security
We will conduct an assessment of the current situation, organize technical issues, design the system, and prepare documentation!
- Other security
It is very important to establish a security policy and translate it into a concrete action plan!
- Other security
Implement explanations to the customer's management as necessary, as well as communication and collaboration with external related organizations and groups!
- Other security
Support for solving technical challenges! We can provide flexible proposals tailored to your organization's structure and budget.
- Other security
Achieve an optimal security operation system (CSIRT) tailored to the level of measures required by our customers!
- Other security
Numerous implementation results in municipalities! Smooth and safe entry and exit, preventing unauthorized access. Also reduces management costs.
- Other security
[Notice of Catalog Renewal] Bicycle Parking System "Cycle Gate"
We are pleased to announce that Tokai Giken Co., Ltd. has renewed the catalog for our bicycle parking system, "Cycle Gate." This product does not use electricity as its power source and adopts a simple mechanism, achieving low cost and easy maintenance, making it a safe and user-friendly mechanical gate. For more detailed information, please refer to the related products and catalogs.
Reduce the burden of reception duties with AI character authentication! Implementation can be done at a lower cost.
- Other security
Lease monthly fee: 7,800 yen (excluding tax) Improved usability from the customer's perspective UTM "SS7000III" series
- Other security
Improving the moral use of IT resources by employees and eliminating wasteful investments through optimization solutions, along with enhancing IT operational efficiency and reducing costs during troub...
- Other security
A case of developing a port monitor for card authentication printing of CAD prints using a multifunction printer!
- Software (middle, driver, security, etc.)
- Encryption and authentication
- Other security
Free design, short delivery time, low cost. Comprehensive support from design development to manufacturing and after-sales service.
- Processing Contract
- Contract manufacturing
- Other security
This is a newly released smart lock for hinged doors.
- Other security
Case studies available for viewing in photos! EPIC Smart Lock / Lavish Electric Lock
We are introducing examples of our products, such as the retrofittable smart lock brand 'EPIC' and the electric lock security system 'Lavish' that meets a wide range of needs, along with photos of their actual implementation. If you are considering installation or have concerns about security around your doors, please take a look and feel free to contact us. 【Past Installation Achievements】 Entrance auto locks, apartments, condominiums, single-family homes, offices, stores, kindergartens/nurseries, short-term rentals, hotels, rental conference rooms, storage rooms, warehouses, pharmaceutical storage, lockers. 【Unlocking Methods】 Face recognition, QR codes, barcodes, cards (FeliCa, MIFARE, EM, proprietary standards), API, PIN codes, fingerprints, remote controls, apps, buttons, intercoms, business phones. Please check the related links below. ▼
A white paper explaining the challenges and solutions related to the existence of legacy systems. Vulnerability assessment services are also provided by qualified personnel.
- Other security
Based on the inspection checklist under Article 25 of the Medical Care Act, challenges related to the application of security patches and presentations on Heimdal patches, etc.
- Other security
Security risk analysis 'V-sec' for implementing cost-effective cybersecurity measures!
- Other security
Achieving an unprecedentedly superior cost performance! The diagnostic speed is also overwhelmingly fast, and the price is overwhelmingly low.
- Other security
Detect anomalies at the protocol level / Safely monitor the network
- Server monitoring and network management tools
- Other network tools
- Other security
Improving security awareness comes from training and education. Cybersecurity measures to protect the manufacturing industry from increasingly serious cyber attacks every day!
- Other security