List of Other security products
- classification:Other security
721~780 item / All 1917 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
High-quality standard-compliant smart card token "LOCK STAR-uToken"
- Personal authentication
- Encryption and authentication
- Other security
Combine tape libraries with built-in off-network secure vaults!
- Virus software
- Other security
[Essential for those considering or gathering information] Have you found the best selection that suits your company? An explanation of how to choose the optimal facial recognition system!
- Other security and surveillance systems
- Other security
- Entrance and exit control system
We will act on your behalf to continuously monitor for information leaks on the Dark Web! Unlike one-time investigations from other services, we will keep monitoring the Dark Web at all times.
- Other security
What risks are associated with the use of apps in the manufacturing industry? What security measures are necessary? We will explain app security-related knowledge in an easy-to-understand manner.
- Other security
The long-awaited new model "Novel" has been born in the VingCard series of card locks, which have been implemented in over 8 million rooms worldwide!
- Entrance and exit control system
- Encryption and authentication
- Other security
Introducing the latest model of the VingCard series, "Novel"!
It goes without saying that the VingCard non-contact card lock "Novel" combines the latest security technology with usability and will become the representative model of next-generation card locks for accommodation facilities. Novel captivates guests and hoteliers as a modern, beautiful, and powerful electronic card lock. Mobile access, online integration, and Apple Wallet can also be added quickly when needed. Additionally, Novel is fully committed to environmental protection through the use of sustainable raw materials, lightweight product design, minimized packaging volume, and battery-free options.
No power or network environment required! Easy to install! Wireless compact fixed lens outdoor camera with 4G LTE solar panel.
- Other security
Calico Open Source (Kubernetes CNI Plugin) Security Upgrade
- Other security
Cloud-based Matrix USB key. It can be operated like a physical dongle via API.
- Other security
Prevent worker mistakes and improve operational efficiency with barcode and QR code authentication! Operate with inventory management shelves that maintain the existing box sizes and arrangements!
- Other security
"Over 600 camera design achievements" We select manufacturers and cameras tailored to the installation location and purpose, implementing more effective camera designs.
- Other security
- Color camera
- others
Addressing new needs! Security has become an indispensable element among customer challenges.
- Other security
In-house diagnosis of a vast number of websites! Achieving cost reduction and increased scope and frequency of diagnosis.
- Other security
Easy to use and multifunctional for peace of mind! Protecting grandpa and grandma from scam calls and solicitation calls.
- Other security
- Other PCs and OA equipment
More advanced, more convenient! Products of professional quality recognized by security experts.
- Other security
Support for the construction of small to medium-sized system infrastructure.
- server
- Storage Backup
- Other security
The world's first explosion-proof smartwatch that has passed domestic explosion-proof certification, obtained international explosion-proof standards (IECEx), and can be used in Class 1 hazardous loca...
- Other safety and hygiene products
- others
- Other security
It is a USB card reader compatible with FeliCa/MIFARE standards.
- Other security
- Entrance and exit control system
Easy to install! Nighttime, always-on type. It can be used with solar power in places where power cannot be obtained or during disasters (can be mounted on existing poles or placed directly).
- Other security
A security camera that can be installed by simply sticking or placing it, allowing you to take pictures from indoors through the window.
- Other security and surveillance systems
- Other security
- Other office supplies
Solar charging and a motion sensor-equipped LED light serve as both a dummy security camera and nighttime lighting.
- Other security
- Other security and surveillance systems
- Surveillance Cameras
Drip-proof mechanism (equivalent to IPX5), slim (13mm) surface-mounted design ◎ Random 10-key display with 7-segment notation.
- Other security
- Entrance and exit control system
Unexpected, yet assured peace of mind. Proven implementation in various industries across the country.
- Other security
It is possible to achieve both safety and convenience! It helps prevent loss and theft, as well as counterfeiting and impersonation. [Free materials available!]
- Other security
An alarm of 90 decibels will sound when the magnetic sensor and the main unit are separated.
- Other security
- Other office supplies
- others
Two tools collaborate! An integrated service for cybersecurity measures and support for work style reform.
- Virus software
- Firewall and intrusion prevention
- Other security
Visualize internal risks and challenges! It is important to raise each individual's security awareness.
- Other security
- Email/Fax transmission
A third-generation antivirus software that utilizes deep learning for cyber attack prevention.
- Virus software
- Firewall and intrusion prevention
- Other security
High-security system achieved at low cost.
- Other security
This is a digital locker lock ideal for delivery boxes. It uses a passcode for locking and unlocking.
- Other security
It is possible to set location restrictions that can be opened individually or by group even without an IC card! It is also suitable for storing important documents such as My Number!
- Other security
This is Lavish's new card reader that can be customized for free.
- Other security
- Entrance and exit control system
It is a card reader with a dedicated specification.
- Other security
- Entrance and exit control system
Explosion-proof network IP camera that has passed domestic explosion-proof certification, obtained international explosion-proof standard (IECEx), and can be used in Class 1 hazardous locations (Zone ...
- Other network tools
- Surveillance Cameras
- Other security
We will introduce the benefits of implementing CrackProof and its background.
- Other security
[Product Information Update] Reasons Why CrackProof is Chosen for App Security Measures
We have updated the product information. While introducing the points that have received high praise from our customers, we explained the benefits of implementing CrackProof and the background behind it. Please take a look.
Four different encryption algorithms are supported, including RC4, AES-128 in OFB mode, and AES-128 in CCM mode.
- Other security
We provide a safe business environment with "m-FILTER," which only receives secure emails.
- Email/Fax transmission
- Other security
We provide a safe work environment with "i-FILTER," which allows access only to secure websites.
- filtering
- Virus software
- Other security
Before Windows apps are affected, various protective features are added to prevent attacks and strengthen security!
- Other security
Before iOS apps are affected, various protective features are added to prevent attacks and strengthen security!
- Other security
Before Android apps are affected, various protective features are added to prevent attacks and strengthen security!
- Other security
Security software that protects applications from cracking (unauthorized analysis and tampering).
- Other security
We will introduce a case where cracking prevention was achieved through actual use!
- Other security
Introducing the security solution product "CrackProof" that protects apps from unauthorized attacks in a manga format!
- Other security
Before Android apps are affected, various protective features are added to prevent attacks and strengthen security!
- Other security
Usable in standalone mode or on a network, a compact and easy-to-use NFC card reader.
- Other security
Utilizing our proprietary know-how! Supporting your product business from cybersecurity.
- Other security
- Other services
Introduction to FIPS 140-2 Level Certified Smart Card-Based Authentication Devices
- Other security
I will explain the comprehensive support system of the app security measure tool "CrackProof."
- Other security
Product Information Update: Follow-up with Customers After the Introduction of 【CrackProof】
We have updated the product information. When selecting security products, many companies place great importance on whether there is a sufficient follow-up system after implementation. We have explained the follow-up system for CrackProof after implementation. Please take a look.
Are you worried or troubled about your company's response to app security? "CrackProof" will solve it!
- Other security
【Product Information Update】Resolving concerns about in-house app security! "CrackProof"
We have updated our product information. Do you have any concerns or worries about your company's handling of app security? We compared the advantages and disadvantages of having an in-house app security system and partnering with a specialized company that has app protection technology to implement measures. Please take a look.
Preparing for security threats starts with "monitoring the health of your IT environment." Are you aware of your company's IT health status?
- Other security
- Server monitoring and network management tools
- Integrated operation management
After implementation, security information will be automatically updated! A package of security measures necessary for small and medium-sized enterprises.
- Other security
Multi-layered defense measures against information leakage suitable for small and medium-sized enterprises! Protecting a company's information assets from external and internal threats.
- Other security
Solving issues such as missed detections and over-detections through the use of AI! Visualizing various communications.
- Other security
Covering the lifecycle of security measures with a single agent!
- Other security
It's easy to consider how to advance measures toward realization! Providing specific examples of measures based on risks.
- Other security
Leave the operation to us for a reduced burden! Please leave the management after implementation to our company as well.
- Other security
Achieving low prices through the use of cloud platforms! A high-quality automated cyber attack analysis system.
- Other security