We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Safety features.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Safety features Product List and Ranking from 44 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Safety features Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. null/null
  2. NRIセキュアテクノロジーズ Tokyo//IT/Telecommunications
  3. 昭電 Tokyo//IT/Telecommunications
  4. 4 トータルセキュリティSP Shizuoka//retail
  5. 5 フーバーブレイン Tokyo//IT/Telecommunications

Safety features Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. Account@Adapter for wireless LAN authentication security
  2. [File Transfer Service Case] Sumitomo Life Insurance Company NRIセキュアテクノロジーズ
  3. トータルセキュリティSP『防災商品 総合カタログ』 トータルセキュリティSP
  4. 4 Network Security "FOX-IT Company Data Diode" 昭電
  5. 4 Eye"247" Safety Zone FSAV V フーバーブレイン

Safety features Product List

46~60 item / All 110 items

Displayed results

McAfee Embedded Security with Whitelisting Functionality

McAfee Whitelisting Technology

- The dynamic whitelist has low overhead to eliminate manual work. - It does not affect system performance. - Low CPU and memory requirements. - The whitelist feature and change management prevent unauthorized changes to devices in advance, reducing costs.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Access Control System: High Security through Integration with Camera Footage

Compatible with megapixel high-definition cameras! It captures faces clearly.

GeoVision Inc. provides a one-stop solution from entry systems to cameras and image analysis. Our "Access Control" system can be integrated with camera footage as a standard feature. Not only can you access entry and exit history logs, but you can also verify the comings and goings of individuals through video. 【Features】 ■ Captures images of individuals during entry and exit ■ Broad compatibility with major surveillance camera standards ■ A lineup of network camera series that can be chosen based on installation location and usage *For more details, please refer to the PDF document or feel free to contact us.

  • Surveillance Cameras
  • Surveillance Camera System
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email Security "Matrix Scan APEX III"

Top-class spam and malware protection in Japan! Concentrated capture of Japan-specific spam emails to achieve a secure email environment.

The "Matrix Scan APEX III" is an email security appliance designed to combat spam emails and malware. The domestically developed "msec technology" is a patented proprietary technology. The variable algorithms used for detecting and determining spam emails effectively evolve to counter the ever-changing nature of spam. It focuses on capturing spam emails unique to Japan, ensuring a secure email environment. ■ Basic Features - AI Anti-Spam (in-house developed engine) - AI Anti-Virus (in-house developed engine) - IP Reputation ■ Offered (Appliance) Models - Entry Model (Low Range Model) - 1U Rack Mount Type - Transparent type specification can be supported with an optional addition (BypassNIC) - Standard Model (Mid Range Model) - 1U Rack Mount Type - RAID1 - BypassNIC transparent type support - Enterprise Model (High Range Model) - 1U Rack Mount Type - RAID10 - BypassNIC transparent type support * Multi-unit configurations are supported for any of the models.

  • Software (middle, driver, security, etc.)
  • Other security
  • Other server related

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Integrated Email Gateway Security "Matrix Gate"

Integrated gateway security products that protect businesses from various threats in email and the web!

"Matrix Gate" is an appliance-type security product that provides both email security during transmission and reception, as well as web security during internet browsing. By adopting advanced AI technology, it can supplement security measures such as preventing misdelivery, and it is capable of countering targeted attacks, spam emails, and ransomware. In the event that a PC becomes infected with a virus, it also provides exit measures via email and the web to protect companies from threats. 【Features】 ■ Detection of zero-day attacks ■ Countermeasures against targeted attack emails and unknown virus emails ■ Misdelivery prevention features (automatic encryption of attachments, temporary holding of sent emails, supervisor approval) ■ Email sanitization features (macro removal, conversion of attachments to images or text, etc.) ■ Personal information protection filter (recognizes and filters My Number and personal information) ■ Simple archiving function (in conjunction with sanitization features, etc.) ■ URL filtering (available only with Security Pack) *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security
  • Other server related

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Device Security "Digi TrustFence"

Digi TrustFence is an out-of-the-box device security framework that simplifies the securing of connected products.

Digi TrustFence, designed for mission-critical applications, enables easy integration of device security, device identification, and data privacy features. By embedding security into IoT devices, Digi TrustFence can address new and evolving threats.

  • Other security
  • Communications

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Key, Quarter Turn, Security Catalog

We would like to introduce components to protect your property from unexpected threats!

In this catalog, we introduce a variety of security components tailored to different applications and security levels. By combining three basic elements—housing, inserts, and cams—along with a range of options, we can meet diverse needs with our lock system "Quarter Turn," as well as a wide selection of seals, electric locks, and more. Please make use of this for selecting products. [Contents (partial)] ■ Selection Guide ■ Cylinder Locks ■ Quarter Turn ■ Locks for Glass Doors ■ Locks for Wooden Doors *For more details, please download the PDF or feel free to contact us.

  • Other machine elements

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Multimedia Crusher Mighty Security MS-500S

Compatible with 3.5in HDD! A high-power shredder that balances security and urban mining recycling.

This is a high-power type designed for large-scale processing that also supports 3.5-inch HDDs. In addition to security purposes, it is particularly used for crushing electronic devices and circuit boards for urban mining recycling.

  • Data Erasing

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security "Secret Sharing Solution"

Data is fragmented and divided by secret dispersal technology to protect information. Electronic data is stored securely.

The "Secret Sharing Solution" uses secret sharing technology to split (shard) information and store it in different storage locations, thereby reducing the risks of information leakage and data loss, allowing for the secure storage of electronic data. Information is randomly fragmented at the bit level into "0s" and "1s" and divided into several groups. As a result, the original information becomes several meaningless data pieces (equivalent to shredding). Even if each piece of data is stolen individually, it becomes impossible to restore the original data. 【Features】 ■ Data is split and rendered meaningless - Reduces the risk of information leakage ■ Even if part of the split and distributed data is lost, the original data can be restored - Can be used for disaster recovery ■ No key management like encryption is required - Easy to operate *For more details, please refer to the PDF document or feel free to contact us.

  • Encryption and authentication
  • Document and Data Management
  • Storage Backup

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security "Allocating Online"

With REX Escrow Service, personal information is managed in a decentralized manner. Secure file sharing.

"Warifuttemasu OnLine" is a gateway service that securely stores important electronic files using electronic split tokens (secret sharing technology). The original data is divided into three parts, rendered meaningless, and stored in a distributed manner. With a simple drag-and-drop operation on your PC, you can use it without being aware of the distributed storage, handling files as you normally would. You can restrict access to users on a directory basis within the client software, allowing for secure file sharing among specific users. 【Features】 ■ Information is split using electronic split tokens (secret sharing technology) and stored in different cloud storages. ■ Just install it on your PC, and you can immediately use cloud storage. ■ Simple operation with just drag-and-drop of files on your PC. ■ Easy access from anywhere as long as you are connected to the internet. ■ File sharing is possible. *For more details, please refer to the PDF materials or feel free to contact us.

  • Encryption and authentication
  • Document and Data Management
  • Storage Backup

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Free booklet giveaway! 'The Changing Revenue Structure of Medical Devices'

A must-read for medical device manufacturers! How to utilize software to adapt to the significantly changing revenue structure!

The medical device market continues to expand both domestically and internationally. With the establishment of the "Pharmaceutical Affairs Law Amendment," regulations regarding medical devices have become more relaxed, raising expectations for the revitalization of domestic industries and the export of devices overseas. Our company, which offers solutions utilizing software for data protection and operational efficiency, is currently providing a booklet summarizing case studies of companies that are actually generating profits! This booklet is essential reading for medical device manufacturers, condensing key points needed to overcome the increasingly fierce market competition. [Overview of Contents] - Market movements entering a major turning point - The importance of software - Successful case studies of new business models - Copying and imitation countermeasures essential for the export of medical devices - Growth strategy support through software security technology *The booklet can be viewed immediately from the "Download" link below!

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

トータルセキュリティSP『防災商品 総合カタログ』

もしもの時の為に備えて安心!さまざまな防災商品を掲載した総合カタログ

トータルセキュリティSP『防災商品 総合カタログ』は、調理の手間が少なく、常温で長期保存ができる「非常食・水・炊き出し」や、避難する時の必需品をコンパクトにまとめ、状況に応じた内容を選択できる避難セット「防災セット・バッグ」、地震発生による被害を軽減、家具転倒や火災によるケガを防ぐための用具「転倒防止用品」、避難生活を清潔におくるための消毒剤や肌着などの「トイレ・衛生用品」等を掲載したカタログです。 【掲載商品】 ○非常食・水・炊き出し ○防災セット・バッグ ○転倒防止用品 ○トイレ・衛生用品 ○応急手当用品 他 詳しくはお問い合わせ、またはカタログをダウンロードしてください。

  • Other safety and hygiene products

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email Security "Proofpoint TAP"

Responding to targeted attacks with a cloud-based sandbox!

"Proofpoint Targeted Attack Protection" is an email security solution that defends against ransomware and banking Trojans. This product addresses the issue of APT/standard cyber attacks, which are characterized by a small number of targeted attacks that traditional signature and reputation-based detection methods cannot effectively handle, by employing a completely new approach of "continuously monitoring for anomalies and protecting users from threats that are discovered later." It includes various features such as a cloud-based attachment sandbox, a cloud-based URL sandbox, and threat visualization. [Features] ■ Capable of responding to time-delayed attacks ■ Detection of potential threats using big data ■ Easy implementation *For more details, please refer to the catalog or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Managed Endpoint Security

World-class detection rate! Protecting the last line of defense, the "endpoint," from security threats.

Introducing our "Managed Endpoint Security." We respond to the rapidly increasing unknown threats. From implementation to operational management, we provide consistent and reliable support from professionals. Please feel free to contact us when needed. 【Five Reasons to Choose Us】 ■ World-class detection rates ■ Quick start ■ Subscription-based ■ Response to unknown threats ■ Reliable support *For more details, please refer to the related links or feel free to contact us.

  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

HP Wolf Security Comprehensive Catalog

Providing advanced security software and services achieved through simple management and low operational burden.

This catalog is a comprehensive catalog of "HP Wolf Security" that we handle. We introduce products such as "HP Wolf Pro Security Edition," which can detect and eliminate malware and ransomware that infiltrate through the web or email attachments using AI, or isolate them to protect PCs, and "HP Wolf Pro Security," which is designed to reduce the burden on information system personnel in small and medium-sized enterprises. As the boundaries of where work is done have become blurred, ensuring corporate security has become more complex, and there is an increasing need to focus on security measures for endpoints such as PCs and printers, which are the starting points of attacks. [Contents (partial)] ■ Towards better hybrid security ■ Maintaining productivity anywhere and creating a safe work environment ■ HP Wolf Pro Security Edition ■ HP Wolf Pro Security ■ HP Sure Click Enterprise *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[HP WPS Implementation Case] GC Linfortec Co., Ltd.

Adopted as a trump card for strengthening security to protect endpoints of healthcare-related companies!

We would like to introduce a case study of the implementation of "HP Wolf Pro Security" at GC Linfotech Co., Ltd. The company began to consider measures to address the increasing amount of spam emails, leading them to implement our product to strengthen endpoint security. After the implementation, they shared, "With this introduction, endpoint security has become significantly more robust, and it feels like we have reached a milestone with our security system." [Case Overview (Partial)] ■ System Effects - Wide range of response due to the isolated security solution - Easy operation significantly reduces the burden of daily management ■ Business Effects - High cost performance compared to other solutions - Short implementation period and no training required, reducing initial costs *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration