We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Safety features.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Safety features Product List and Ranking from 44 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Safety features Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. null/null
  2. NRIセキュアテクノロジーズ Tokyo//IT/Telecommunications
  3. 昭電 Tokyo//IT/Telecommunications
  4. 4 トータルセキュリティSP Shizuoka//retail
  5. 5 フーバーブレイン Tokyo//IT/Telecommunications

Safety features Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. Account@Adapter for wireless LAN authentication security
  2. [File Transfer Service Case] Sumitomo Life Insurance Company NRIセキュアテクノロジーズ
  3. トータルセキュリティSP『防災商品 総合カタログ』 トータルセキュリティSP
  4. 4 Network Security "FOX-IT Company Data Diode" 昭電
  5. 4 Eye"247" Safety Zone FSAV V フーバーブレイン

Safety features Product List

1~15 item / All 110 items

Displayed results

Cybersecurity: ESCRYPT

Security consulting services, development and sales of security software product solutions.

Design Security: Consulting, Engineering, Testing, Training Enable Security: Product Solutions Manage Security: Operations, Monitoring, Incident and Response

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Heimdal Endpoint DNS Security

Achieve advanced security protection against malware such as ransomware that cannot be defended against by firewalls and UTM, etc.!

Heimdal Endpoint DNS Security is a feature within the Heimdal Security Suite, providing a DNS security solution that combines threat intelligence, machine learning, and AI-based advanced technologies. There are two products: "Endpoint" and "Network." Are you facing any of these issues? ■ Want to prevent malware infections and data leaks via email and websites? ■ Looking for an easy and cost-effective way to start DNS filtering? ■ Want to strengthen your cybersecurity measures without changing your existing security environment? We can solve these concerns. 【Features】 ■ Addresses advanced threats and infected users along with the infection process ■ Predicts threats using AI-driven neural network predictive DNS ■ Comes with a network log agent for infection tracing

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security "Trap-type Fence Sensor"

A trap-type fence sensor that quickly detects and reports acts of climbing over fences and similar obstacles!

The "Trap-Type Fence Sensor" is an automatic reset alarm line sensor system that installs trap sensors at regular intervals along the fence or boundary line of a facility. It detects pulling or weight on the alarm line and triggers an alarm, then automatically resets to a normal state, leaving a marker display at the point of alarm activation. It is effective for the security of large facilities and supports the expansion of security systems, such as integration with surveillance cameras. 【Features】 ■ Marker display even after automatic reset ■ Simple structure ■ All-weather design ■ Expansion of security systems *For more details, please feel free to contact us.

  • image_14.jpg
  • image_15.jpg
  • image_16.jpg
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Moxa Ethernet products that achieve perfect security.

Presentation of technical materials explaining the security issues and solutions related to IoT and VPN!

Moxa's "Ethernet products" are widely utilized from homes to public infrastructure and have become an indispensable part of network construction and operation. Additionally, the rapid evolution of "IoT-related technologies," exemplified by smart grids, has simultaneously created significant challenges in security measures. Therefore, we are offering a comprehensive "Technical Document" that thoroughly explains the "security issues and their countermeasures," which are essential for network construction, for free! 【Details of the Technical Document】 <Theme> Ensuring the safety of edge devices and data in decentralized industrial applications <Overview> ■ Strengthening traditional wireless security ■ Basics of VPN tunneling ■ The power of Trusted Platform Computing ■ Kernel protection: Self-authenticating boot processes And much more, filled with tips to enhance network safety! *For more details, please check the "Catalog Download."

  • Other network tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

McAfee Embedded Security [Endpoint Security 10]

McAfee Blacklisting Technology

- Endpoint protection for targeted attacks - Intelligent and adaptive scanning - Advanced malware protection - Proactive web security - Blocking network attacks - Practical threat forensics - Centralized management - Open and extensible endpoint security framework

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Export countermeasure network security

Exit measures against targeted attacks! Detect and block unauthorized communications to C2 servers used by hackers.

Digital Data Solutions Co., Ltd. is a leading company in the data recovery business, established in 1999. The company's DDH BOX is an outbound countermeasure product that detects and blocks unauthorized communications to the outside that could lead to information leaks. It automatically detects and blocks unauthorized communications in real-time, 24 hours a day, 365 days a year, preventing information leaks before they occur. When an incident is detected, an alert is issued, and immediate notification of the threat information is provided to the customer. Subsequently, the accompanying cyber insurance (up to 3 million yen per year) can be applied, allowing customers to utilize services such as forensic investigations (information leak investigations) and recovery of data that has been deleted, altered, or destroyed due to attacks.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] The three simplest measures to prevent security troubles.

Outstanding security professionals are on top of it! Introducing increasingly sophisticated cyber attacks and case studies of damage.

This document introduces three measures that companies should take to prevent security troubles. It discusses the expanding damage caused by malware and provides examples. It notes that 76% of security troubles are caused by human error and outlines three measures to prevent this. It also introduces the OS-protecting security product 'AppGuard.' Please use this information to assist in your product selection. [Contents (excerpt)] ■ Chapter 1: The increasing priority of security enhancement year by year ■ Chapter 2: Over 70% of security troubles arise from employee errors ■ Chapter 3: Three measures to prevent security troubles ■ Chapter 4: No need to worry even if an intrusion occurs. What is the final barrier, AppGuard? *For more details, please refer to the PDF document or feel free to contact us.

  • Virus software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Rexse Security Rental

Achieves high security! A security system that automatically captures images along with a warning light.

When the motion sensor detects movement, the network camera turns in that direction and captures images of the intruder. It is not necessary to have it installed as a security camera at all times; instead, the network camera can be used to monitor a different area, and it can automatically change its direction and start recording only when an intruder is detected. This allows for both security effectiveness and cost reduction. 【Features】 ○ No installation required; it can be used immediately after setup ○ Camera unit: preset registration function ○ Camera unit: remote operation for video and recording search/control ○ Motion sensor unit: contact output can be adjusted according to external control input and day/night detection function ○ Motion sensor unit: detection distance is adjustable For more details, please contact us or download the catalog.

  • Rental/lease
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security software port security

It is said that about 70% of information leakage incidents are due to internal factors.

Port security is software for controlling devices and preventing information leaks.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The Importance of Perimeter Security *Showroom tours are always available!

Review the 'physical security' that becomes a blind spot under information security to prevent unauthorized access!

In recent years, security measures have primarily focused on online strategies, such as internal information management. However, among the incidents and accidents that have occurred in the past few years, there has been an increase in those caused by physical security issues, such as "unauthorized intrusions." Regarding these surprisingly overlooked physical security issues, are your company's and factory's measures sufficient? While deploying security personnel is an effective countermeasure, there are voices expressing that it is difficult to have them on-site due to labor shortages and rising personnel costs. Therefore, what will become important in future security measures is to "effectively utilize security devices to prevent malicious intrusions before they occur." To prevent intrusions, strengthening "perimeter security," where entrances and exits are established, is essential. Our company consistently addresses the challenges of perimeter security, from proposing measures to implementation. ■ We are always accepting "showroom visits" where you can experience perimeter security! ■ If you are struggling with security enhancement, please feel free to consult with us. *Please download the materials to check product information.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cybersecurity: Deceptions Everywhere

Achieving a safe and secure network environment! Measures against indiscriminate and merciless cyber attacks.

Although it is not well known in Japan, Israel, with a population of just 8 million, is said to account for about 10% of the global cybersecurity market. The cybersecurity company illusive networks, which was established around the elite of the Israeli Defense Forces' cyber attack unit (Unit 8200), has developed a counter-cyberterrorism system called "Deceptions Everywhere." This time, the long-established security company CT Machine has partnered with illusive networks to take action against cyberterrorism in the Japanese market, based on a new concept of security. 【Features】 - In addition to the current security measures, implementing this product allows for countermeasures after an intrusion. - No need for adjustments to local clients, ensuring high operational rates and peace of mind. - Enhances security after an intrusion at a low cost. - Volume discounts are available based on the number of units implemented. *For more details, please refer to the related link page or feel free to contact us.

  • Other safety equipment
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Secure your sliding door with confidence! 'KL800 (Surface-mounted automatic locking for sliding doors)'

The keyless and auto-lock features remain the same for sliding doors! With the Kilex 800, the functions are unchanged, and installation is easy because it is surface-mounted.

The "Keyless 800 (Surface-Mounted Automatic Lock for Sliding Doors)" is a surface-mounted keyless button lock that can be installed on the edge of sliding doors. The combination of the access code can be set to any number from 1 to 12 digits, with a total of 4,096 possible combinations. It retains the functions of the conventional Keyless 800, such as auto-lock and free lock switching. It can accommodate a variety of installation environments, both indoors and outdoors, and its use has been increasing in welfare and medical facilities where sliding doors are common. 【Features】 ■ Auto-lock ■ Surface-mounted latch lock ■ Free lock switching function (switch to a state where the lock is not engaged) ■ Available in a keyed type (with both button and key) ■ Available in a dual-button type (with button locks on both the exterior and interior) ■ Cover settings available for KL800 *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security from both inside and outside! 【Keylex Double-Sided Button Series】

Ideal for places where you want to restrict not only external intrusions but also internal exits! You can set separate PIN codes for inside and outside!

The "Keylex Double-Sided Button Series" features button locks (Keylex) on both the inside and outside of the door, allowing for access control via a passcode whether entering from indoors or exiting outdoors. You can set different passcodes for the inside Keylex and the outside Keylex, enabling you to have two separate passcodes: one for entry and one for exit. (Of course, you can also use the same code for both sides.) Each Keylex comes with a double-sided button option, allowing you to use it according to your needs. For example... - I want an auto-lock feature or one with a key (*1)! - I want to change the passcode without removing it from the door! - I prefer a compact type! - I want to use it for sliding doors! We have a wide variety of options to meet various requests. *For more details, please refer to the PDF document or feel free to contact us. (*1) Keyed: This type has a cylinder built into the Keylex body, allowing it to be unlocked not only by the button but also with a key.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Multimedia Crusher Mighty Security MS-1000

Urban mining recycling dedicated crusher (integrated crushing and material separation)

Large machine for urban mining recycling. It enables integrated processing of crushing and material separation, significantly improving sorting efficiency after crushing.

  • Data Erasing
  • Crusher
  • Crusher

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ace Computer Service USB Memory Security

It is attached to USB devices such as a mouse and numeric keypad to prevent use.

Attach it to a USB memory, lock it to prevent data extraction, and connect it to USB devices such as a mouse or numeric keypad to prevent usage. The dial's PIN can be set to a 3-digit number of your choice.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration