We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Safety features.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Safety features Product List and Ranking from 76 Manufacturers, Suppliers and Companies | IPROS GMS

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

Safety features Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

  1. ビーアイ 本社 Tokyo//Resin/Plastic
  2. UL Japan Tokyo//Testing, Analysis and Measurement
  3. 日本HP Tokyo//IT/Telecommunications
  4. アイセル Tokyo//IT/Telecommunications
  5. 5 NRIセキュアテクノロジーズ Tokyo//IT/Telecommunications

Safety features Product ranking

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

  1. [On-Demand Webinar] Cybersecurity for Medical Devices UL Japan
  2. HP Wolf Security 日本HP
  3. Palm-sized all-in-one security "SG-ONE" アイセル
  4. 4 Account@Adapter for wireless LAN authentication security
  5. 4 [File Transfer Service Case] Sumitomo Life Insurance Company NRIセキュアテクノロジーズ

Safety features Product List

31~60 item / All 183 items

Displayed results

Data Security "ZENMU for Delivery"

For sending and receiving important data and large volumes of data! Even if any fragment leaks during transport, the original data remains safe.

"ZENMU for Delivery" is a data security solution that allows you to easily and securely send and receive important and large data over the internet at a low cost. It reduces the hassle and cost of sending and transporting confidential data. Inexpensive public clouds can be used as transmission routes for confidential data. 【Features】 ■ Transforms the data you want to send into meaningless distributed fragments ■ No need for encryption, passwords, or dedicated lines during transmission ■ Sends distributed fragments via separate routes ■ Original data is restored from the received distributed fragments ■ No installation of dedicated software is required on the receiving side *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information on telework that is more secure, safe, and cost-effective.

Simply connecting for telework is dangerous! We introduce products that can be implemented without changing the environment.

This document introduces "telework that is safer, more secure, and cost-effective." It details the risks of direct connections from home PCs and provides information about our product "monoPack." Safe and secure telework can be implemented without changing the current environment. [Contents] ■ Risks of direct connections from home PCs ■ Solutions with monoPack! ■ monoPack can be used in the current environment! ■ Compatible virtual environments and VPN environments ■ Reference price for monoPack (64bit) ■ Contact information *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Seminar] Security Measures That Medical Institutions and Medical IT Vendors Should Adopt

2024 Medical Fee Revision: A Comprehensive Explanation of Key Areas to be Strengthened in Future Medical Security Policies Based on Related Trends

Our company will hold a seminar titled "Security Measures that Medical Institutions and Medical IT Vendors Should Adopt in Light of the 2024 Medical Fee Revision and Related Trends." In this seminar, we will provide a detailed explanation based on the overall picture of medical security policies related to the items of the medical fee revision, focusing on the medical DX, which is the <accelerator> in the 2024 fee revision. We will discuss what kind of security <brake> is being implemented behind it and how it may compel medical institutions and medical IT vendors to respond in the future. This will serve as a basis for considering what medical security measures should be prioritized at this point in preparation for future revisions. [Seminar Details] ■ Date and Time: May 8 (Wednesday) 13:30 - 15:30 (Doors open at 13:00) ■ Venue: JPI Conference Square ■ Address: 5-2-32 Minamiazabu, Minato-ku, Tokyo, Kowa Hiroo Building ■ Participation Method: In-person, live streaming, archived streaming ■ Speaker: Yusuke Ebihara, Co-founder / Steering Committee Member, Medical ISAC *For more details, please refer to the PDF document or feel free to contact us.

  • Technical Seminar
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AhnLab V3 Security for Business

Security management for small and medium-sized offices!

"AhnLab V3 Security for Business" is software that allows for easy centralized management and protection of management servers and individual devices. It protects the IT environment of small to medium-sized offices by detecting ransomware and zero-day attacks in real-time and blocking unknown security threats through "ASD Cloud Threat Intelligence." 【Features】 ■ Proactive defense through excellent detection rates based on a multidimensional analysis platform ■ Response to new types and variants of malware through cloud-based analysis technology ■ No need for servers or special investments, low cost ■ Monitoring and management of security status via a web-based administrator page ■ Integrated management of multi-OS and multi-device with a single license *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AhnLab EPS

Optimal OT security solutions (industrial, POS terminals, kiosks)

AhnLab EPS (Endpoint Protection System) is a dedicated security solution optimized for industrial control system environments that require the execution of predefined processes and the use of limited applications. It safely protects various industrial control systems such as production facility systems (ICS), POS terminals, kiosks, and automatic issuance machines while maintaining their availability.

  • Other security
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Gateway Security "Check Point"

Achieving high reliability in security while keeping operational costs low.

Gateway security "Check Point" provides robust security from internet connections to VPN connections. It allows for easy and cost-effective operation against evolving threats such as fraudulent sites, ransomware, and unauthorized intrusions. No specialized knowledge is required. 【Security Management】 ■ Antivirus ■ Firewall ■ IPS (Intrusion Prevention System) ■ URL Filtering ■ Anti-bot ■ Application Control *For more details, please download the PDF or feel free to contact us.

  • filtering
  • Firewall and intrusion prevention
  • Other security
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

PC Security 'AppGuard Solo'

Recommended for companies that lack (or do not have) a dedicated information systems administrator.

"AppGuard Solo" is a security product that has established and adopted a patented technology that prevents suspicious programs from causing harm even if they infiltrate. No matter what program intrudes, even if it is unknown malware, it can completely block "malicious behavior." Additionally, it does not require updates for signatures or AI engines, and it operates safely even in environments that are not connected to the network. 【Features】 ■ Can handle unknown threats ■ No need for definition file updates ■ Extremely lightweight for smooth operation *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Store Security Comprehensive Catalog

One step ahead of your ideal! Featuring high-class security systems like the "ASD Smart System."

This catalog introduces "Store Security," handled by Koryinsha. It features a rich lineup, including the standard model "Security Gate," which pursues stability, as well as the area protection anti-theft system "Wi-dimo" and "ASD Smart System." Please use this for selecting products. [Contents] ■ Security Gate ■ Security Gate / Air-C ■ Wi-dimo ■ ASD Smart System ■ Others (Showcase Guard) ■ Security Cameras *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security and surveillance systems
  • Surveillance Cameras
  • Surveillance Camera System
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

V3 Security for Business

Cloud-based endpoint security suitable for corporate PCs' security measures!

"V3 Security for Business" is a cloud-based endpoint security solution for corporations that employs six new detection technologies on a multi-dimensional analysis platform, enabling rapid detection of unknown new strains and variants of malware. Using evaluation information from the ASD server, it detects high-risk files during manual scans, and if it discovers files on the user PC that do not exist on the ASD server, it transfers those files to the ASD cloud. 【Features】 ■ High cost performance ■ An essential tool for the telework era ■ Verified high performance ■ Top-class achievements in endpoint security in South Korea *For more details, please download the PDF or feel free to contact us.

  • others
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A new form of security that does not manifest even if breached.

A new concept in cybersecurity products called "AppGuard" that prevents malicious software such as ransomware from "activating even if it intrudes."

"AppGuard" is an endpoint security product that controls and disables malicious actions that harm the system, regardless of the executing entity, unlike traditional antivirus software. 【Features】 ■ Prevents computer viruses from activating even if they infiltrate ■ Controls and disables malicious actions that harm Windows OS, regardless of the executing entity ■ Malicious actions cannot be triggered under two layers of control ■ Provides reliable protection even in case of user "oversights" ■ Lightweight operation as it does not perform virus scans ■ Prevents the execution of ransomware *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Palm-sized all-in-one security "SG-ONE"

Equipped with antivirus, firewall, and IPS in a palm-sized chassis. It defends the gateway to the internet with powerful security features.

"Are you still worried about the internet environment within your company?" - We have implemented antivirus software on our devices, but as the number of devices increases, management becomes difficult and costs rise. - We have also introduced network security measures such as firewalls, but as these continue to increase in the future, the costs will become challenging. - That said, it would be even more problematic to suffer from virus infections without taking measures, so we want to address this immediately. ◢ With just this one device, you can eliminate the remaining concerns all at once! ◤ Features of SG-ONE: 1. Connect to the router in 5 minutes! Immediate installation! → Simply connect the compact unit to the router, and installation is complete in 5 minutes. No complicated setup work is required from the customer. 2. Protect various aspects with just this one device! All-in-one security! → Antivirus, firewall, IPS, and multiple powerful security features defend at the internet's entry point. 3. Unlimited number of PC connections! No additional fees even if the number of devices increases in the future! → With SG-ONE, there are no limits on the number of devices that can be connected. Smartphones, tablets, as well as IoT devices like network cameras and multifunction printers are all supported.

  • Firewall and intrusion prevention
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Home security

Protecting a healthy and comfortable life! It is also essential for maintaining and enhancing the asset value of important real estate.

Our company offers a "Home Security" service that monitors safety under a 24-hour centralized management system for single-family homes and mid- to high-rise apartments. In "Apartment Security," we centrally manage information related to water supply and drainage systems, elevators, and disaster prevention in apartments, thereby further reducing costs and building a more robust security system. Additionally, we provide a service that acts as a 24-hour telephone reception on behalf of facility managers for apartments without a manager or during times when the manager is absent, such as at night or on holidays. 【Service Details】 ■ Residential Security ■ Apartment Security ■ Telephone Management Agency *For more details, please refer to the related links or feel free to contact us.

  • Other security and surveillance systems
  • Other services
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Comprehensive Security "FortiGate"

Always provides a high level of defense! Achieves high throughput with the uniquely developed processor FortiASIC.

"FortiGate" is a comprehensive security solution that provides robust protection against external threats such as DoS attacks. It achieves high throughput through the uniquely developed FortiASIC processor. With real-time update capabilities against viruses and malware, it consistently offers a high level of defense. [Features] - Network switches and wireless LAN can be managed with FortiGate - Detailed visualization and analysis are possible with the addition of analyzers - Even with a small number of IT administrators, everything from network to security can be managed with a single FortiGate unit - Easy to operate even with just one administrator *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Other security
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

McAfee Embedded Security with Whitelisting Functionality

McAfee Whitelisting Technology

- The dynamic whitelist has low overhead to eliminate manual work. - It does not affect system performance. - Low CPU and memory requirements. - The whitelist feature and change management prevent unauthorized changes to devices in advance, reducing costs.

  • Software (middle, driver, security, etc.)
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Access Control System: High Security through Integration with Camera Footage

Compatible with megapixel high-definition cameras! It captures faces clearly.

GeoVision Inc. provides a one-stop solution from entry systems to cameras and image analysis. Our "Access Control" system can be integrated with camera footage as a standard feature. Not only can you access entry and exit history logs, but you can also verify the comings and goings of individuals through video. 【Features】 ■ Captures images of individuals during entry and exit ■ Broad compatibility with major surveillance camera standards ■ A lineup of network camera series that can be chosen based on installation location and usage *For more details, please refer to the PDF document or feel free to contact us.

  • Surveillance Cameras
  • Surveillance Camera System
  • Other security and surveillance systems
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email Security "Matrix Scan APEX III"

Top-class spam and malware protection in Japan! Concentrated capture of Japan-specific spam emails to achieve a secure email environment.

The "Matrix Scan APEX III" is an email security appliance designed to combat spam emails and malware. The domestically developed "msec technology" is a patented proprietary technology. The variable algorithms used for detecting and determining spam emails effectively evolve to counter the ever-changing nature of spam. It focuses on capturing spam emails unique to Japan, ensuring a secure email environment. ■ Basic Features - AI Anti-Spam (in-house developed engine) - AI Anti-Virus (in-house developed engine) - IP Reputation ■ Offered (Appliance) Models - Entry Model (Low Range Model) - 1U Rack Mount Type - Transparent type specification can be supported with an optional addition (BypassNIC) - Standard Model (Mid Range Model) - 1U Rack Mount Type - RAID1 - BypassNIC transparent type support - Enterprise Model (High Range Model) - 1U Rack Mount Type - RAID10 - BypassNIC transparent type support * Multi-unit configurations are supported for any of the models.

  • Software (middle, driver, security, etc.)
  • Other security
  • Other server related
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Integrated Email Gateway Security "Matrix Gate"

Integrated gateway security products that protect businesses from various threats in email and the web!

"Matrix Gate" is an appliance-type security product that provides both email security during transmission and reception, as well as web security during internet browsing. By adopting advanced AI technology, it can supplement security measures such as preventing misdelivery, and it is capable of countering targeted attacks, spam emails, and ransomware. In the event that a PC becomes infected with a virus, it also provides exit measures via email and the web to protect companies from threats. 【Features】 ■ Detection of zero-day attacks ■ Countermeasures against targeted attack emails and unknown virus emails ■ Misdelivery prevention features (automatic encryption of attachments, temporary holding of sent emails, supervisor approval) ■ Email sanitization features (macro removal, conversion of attachments to images or text, etc.) ■ Personal information protection filter (recognizes and filters My Number and personal information) ■ Simple archiving function (in conjunction with sanitization features, etc.) ■ URL filtering (available only with Security Pack) *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security
  • Other server related
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Device Security "Digi TrustFence"

Digi TrustFence is an out-of-the-box device security framework that simplifies the securing of connected products.

Digi TrustFence, designed for mission-critical applications, enables easy integration of device security, device identification, and data privacy features. By embedding security into IoT devices, Digi TrustFence can address new and evolving threats.

  • Other security
  • Communications
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[On-Demand Webinar] Cybersecurity for Medical Devices

I want to know about this! Cybersecurity standards for medical devices IEC 81001-5-1.

In domestic medical device regulations, comprehensive cybersecurity measures will be required starting April 2024. As a result, understanding and addressing security risks will be essential for the development of new products. This on-demand webinar will introduce the standard for cybersecurity in medical devices, IEC 81001-5-1, through a dialogue format with security experts, explaining terms and concepts. We hope this will help you understand the content of cybersecurity standards. The content is designed to address the specific interests of those responsible, blending perspectives on security and medical devices to be practically useful. --- For those who find security terminology difficult or the intent of the standards unclear, we will explain several key terms. This on-demand webinar will not be in a lecture format but will proceed through a dialogue between the questioner and the explainer. *For viewing methods and details, please refer to the PDF document "【On-Demand Webinar】 Cybersecurity for Medical Devices" or feel free to contact us.*

  • Public Testing/Laboratory
  • Other security
  • Contract Inspection
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Key, Quarter Turn, Security Catalog

We would like to introduce components to protect your property from unexpected threats!

In this catalog, we introduce a variety of security components tailored to different applications and security levels. By combining three basic elements—housing, inserts, and cams—along with a range of options, we can meet diverse needs with our lock system "Quarter Turn," as well as a wide selection of seals, electric locks, and more. Please make use of this for selecting products. [Contents (partial)] ■ Selection Guide ■ Cylinder Locks ■ Quarter Turn ■ Locks for Glass Doors ■ Locks for Wooden Doors *For more details, please download the PDF or feel free to contact us.

  • Other machine elements
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Multimedia Crusher Mighty Security MS-500S

Compatible with 3.5in HDD! A high-power shredder that balances security and urban mining recycling.

This is a high-power type designed for large-scale processing that also supports 3.5-inch HDDs. In addition to security purposes, it is particularly used for crushing electronic devices and circuit boards for urban mining recycling.

  • Data Erasing
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security "Secret Sharing Solution"

Data is fragmented and divided by secret dispersal technology to protect information. Electronic data is stored securely.

The "Secret Sharing Solution" uses secret sharing technology to split (shard) information and store it in different storage locations, thereby reducing the risks of information leakage and data loss, allowing for the secure storage of electronic data. Information is randomly fragmented at the bit level into "0s" and "1s" and divided into several groups. As a result, the original information becomes several meaningless data pieces (equivalent to shredding). Even if each piece of data is stolen individually, it becomes impossible to restore the original data. 【Features】 ■ Data is split and rendered meaningless - Reduces the risk of information leakage ■ Even if part of the split and distributed data is lost, the original data can be restored - Can be used for disaster recovery ■ No key management like encryption is required - Easy to operate *For more details, please refer to the PDF document or feel free to contact us.

  • Encryption and authentication
  • Document and Data Management
  • Storage Backup
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security "Allocating Online"

With REX Escrow Service, personal information is managed in a decentralized manner. Secure file sharing.

"Warifuttemasu OnLine" is a gateway service that securely stores important electronic files using electronic split tokens (secret sharing technology). The original data is divided into three parts, rendered meaningless, and stored in a distributed manner. With a simple drag-and-drop operation on your PC, you can use it without being aware of the distributed storage, handling files as you normally would. You can restrict access to users on a directory basis within the client software, allowing for secure file sharing among specific users. 【Features】 ■ Information is split using electronic split tokens (secret sharing technology) and stored in different cloud storages. ■ Just install it on your PC, and you can immediately use cloud storage. ■ Simple operation with just drag-and-drop of files on your PC. ■ Easy access from anywhere as long as you are connected to the internet. ■ File sharing is possible. *For more details, please refer to the PDF materials or feel free to contact us.

  • Encryption and authentication
  • Document and Data Management
  • Storage Backup
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Free booklet giveaway! 'The Changing Revenue Structure of Medical Devices'

A must-read for medical device manufacturers! How to utilize software to adapt to the significantly changing revenue structure!

The medical device market continues to expand both domestically and internationally. With the establishment of the "Pharmaceutical Affairs Law Amendment," regulations regarding medical devices have become more relaxed, raising expectations for the revitalization of domestic industries and the export of devices overseas. Our company, which offers solutions utilizing software for data protection and operational efficiency, is currently providing a booklet summarizing case studies of companies that are actually generating profits! This booklet is essential reading for medical device manufacturers, condensing key points needed to overcome the increasingly fierce market competition. [Overview of Contents] - Market movements entering a major turning point - The importance of software - Successful case studies of new business models - Copying and imitation countermeasures essential for the export of medical devices - Growth strategy support through software security technology *The booklet can be viewed immediately from the "Download" link below!

  • Software (middle, driver, security, etc.)
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

トータルセキュリティSP『防災商品 総合カタログ』

もしもの時の為に備えて安心!さまざまな防災商品を掲載した総合カタログ

トータルセキュリティSP『防災商品 総合カタログ』は、調理の手間が少なく、常温で長期保存ができる「非常食・水・炊き出し」や、避難する時の必需品をコンパクトにまとめ、状況に応じた内容を選択できる避難セット「防災セット・バッグ」、地震発生による被害を軽減、家具転倒や火災によるケガを防ぐための用具「転倒防止用品」、避難生活を清潔におくるための消毒剤や肌着などの「トイレ・衛生用品」等を掲載したカタログです。 【掲載商品】 ○非常食・水・炊き出し ○防災セット・バッグ ○転倒防止用品 ○トイレ・衛生用品 ○応急手当用品 他 詳しくはお問い合わせ、またはカタログをダウンロードしてください。

  • Other safety and hygiene products
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email Security "Proofpoint TAP"

Responding to targeted attacks with a cloud-based sandbox!

"Proofpoint Targeted Attack Protection" is an email security solution that defends against ransomware and banking Trojans. This product addresses the issue of APT/standard cyber attacks, which are characterized by a small number of targeted attacks that traditional signature and reputation-based detection methods cannot effectively handle, by employing a completely new approach of "continuously monitoring for anomalies and protecting users from threats that are discovered later." It includes various features such as a cloud-based attachment sandbox, a cloud-based URL sandbox, and threat visualization. [Features] ■ Capable of responding to time-delayed attacks ■ Detection of potential threats using big data ■ Easy implementation *For more details, please refer to the catalog or feel free to contact us.

  • Other security
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Managed Endpoint Security

World-class detection rate! Protecting the last line of defense, the "endpoint," from security threats.

Introducing our "Managed Endpoint Security." We respond to the rapidly increasing unknown threats. From implementation to operational management, we provide consistent and reliable support from professionals. Please feel free to contact us when needed. 【Five Reasons to Choose Us】 ■ World-class detection rates ■ Quick start ■ Subscription-based ■ Response to unknown threats ■ Reliable support *For more details, please refer to the related links or feel free to contact us.

  • Other services
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

HP Wolf Security Comprehensive Catalog

Providing advanced security software and services achieved through simple management and low operational burden.

This catalog is a comprehensive catalog of "HP Wolf Security" that we handle. We introduce products such as "HP Wolf Pro Security Edition," which can detect and eliminate malware and ransomware that infiltrate through the web or email attachments using AI, or isolate them to protect PCs, and "HP Wolf Pro Security," which is designed to reduce the burden on information system personnel in small and medium-sized enterprises. As the boundaries of where work is done have become blurred, ensuring corporate security has become more complex, and there is an increasing need to focus on security measures for endpoints such as PCs and printers, which are the starting points of attacks. [Contents (partial)] ■ Towards better hybrid security ■ Maintaining productivity anywhere and creating a safe work environment ■ HP Wolf Pro Security Edition ■ HP Wolf Pro Security ■ HP Sure Click Enterprise *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[HP WPS Implementation Case] GC Linfortec Co., Ltd.

Adopted as a trump card for strengthening security to protect endpoints of healthcare-related companies!

We would like to introduce a case study of the implementation of "HP Wolf Pro Security" at GC Linfotech Co., Ltd. The company began to consider measures to address the increasing amount of spam emails, leading them to implement our product to strengthen endpoint security. After the implementation, they shared, "With this introduction, endpoint security has become significantly more robust, and it feels like we have reached a milestone with our security system." [Case Overview (Partial)] ■ System Effects - Wide range of response due to the isolated security solution - Easy operation significantly reduces the burden of daily management ■ Business Effects - High cost performance compared to other solutions - Short implementation period and no training required, reducing initial costs *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration