We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Safety features.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Safety features Product List and Ranking from 44 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Safety features Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. null/null
  2. NRIセキュアテクノロジーズ Tokyo//IT/Telecommunications
  3. 昭電 Tokyo//IT/Telecommunications
  4. 4 トータルセキュリティSP Shizuoka//retail
  5. 5 フーバーブレイン Tokyo//IT/Telecommunications

Safety features Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. Account@Adapter for wireless LAN authentication security
  2. [File Transfer Service Case] Sumitomo Life Insurance Company NRIセキュアテクノロジーズ
  3. トータルセキュリティSP『防災商品 総合カタログ』 トータルセキュリティSP
  4. 4 Network Security "FOX-IT Company Data Diode" 昭電
  5. 4 Eye"247" Safety Zone FSAV V フーバーブレイン

Safety features Product List

76~90 item / All 110 items

Displayed results

UTM Security AntiMalware USAV IV

Install UTM (gateway security) at the network entrance for malware protection!

UTM stands for Unified Threat Management, which is a security solution that integrates various security features against malware, such as firewalls and anti-spam, into a single system. It serves as a gateway and endpoint security that protects corporate networks from various threats. This product combines three security measures for gateways and endpoints, designed for small businesses with a multi-layered defense approach. It is the best match for users facing issues such as wanting to remotely understand the situation from headquarters or wanting to enhance security without a system administrator. *Demonstrations are also available.* [Excerpt of the content] - The top 10 information security threats of 2021 have been announced. - Beware of Word attachments in EMOTET emails! - Examples of emails targeting EMOTET infections. - "Multi-layered defense" is a combination of entrance/exit measures and endpoint measures. - What is Eye "247" AntiMalware USAV IV? *For more details, please refer to the PDF document or feel free to contact us.*

  • Other security
  • Other information systems
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Security] HP SureClick Enterprise

100% protection that does not rely on detection. Enterprise-level endpoint security! Thoroughly protect your PC from malware threats.

"HP SureClick Enterprise" reduces management workload with visualized threat information. In the event of a problem, you can immediately check the situation just by looking at the screen. It traces malware behavior in a safe and isolated environment using micro-VMs, allowing for easy analysis and understanding of threat information details in real-time. 【Features】 ■ Application isolation technology ■ Usability comparable to native applications ■ Threat analysis ■ Detailed policy settings available *For more information, please refer to the related links or feel free to contact us.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Explaining Cybersecurity! How is it different from Information Security?

An explanation of the types of cyber attacks and how cybersecurity is the key to protecting a company's trust and future!

The spread of telework, the globalization of business, and the acceleration of DX (digital transformation) have made strengthening cybersecurity an urgent task for many companies. Some may think, "Our company has security software, so we are fine." However, do you truly understand what threats that software can address and what measures are actually being implemented? Ad-hoc measures such as "It seems to have a good reputation" or "We implemented it just to be safe" will not protect the organization when faced with a cyberattack. This article will clearly explain the basics of cybersecurity. *You can view the detailed content of the article in the PDF. For more information, please feel free to contact us.*

  • ISO-related consultant

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Eye"247" Safety Zone FSAV V

The successor to FSAV IV, "Eye"247" AntiMalware, has been completed!

"Eye"247" Safety Zone FSAV V" is a product that packages the necessary security measures for small and medium-sized enterprises. It provides flexible defense logic against unknown and known threats, as well as improvements in operational efficiency and deterrent effects against information leaks through daily work record keeping. You can implement proven firewall functions without changing your existing network configuration. 【Features】 ■ Detects suspicious behavior at endpoints and supports rapid response ■ Advanced Threat Detection (ATC) to respond to evolving cyber attacks ■ Monitors ransomware activity and automatically backs up files ■ Prevents internal misconduct and visualizes information leak risks and actual work conditions ■ Supports security education through targeted attack email training *For more details, please download the PDF or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Endpoint Security "FFRI yarai"

Achieving multi-layered defense for endpoints! Japan's origin endpoint security to combat unknown threats.

"FFRI yarai" is an endpoint security solution that defends against unknown viruses in real-time through a "predictive technology" that observes virus behavior. It captures attack flows extensively with five engines, achieving multi-layered endpoint defense through dynamic and static analysis. It can coexist with typical antivirus software, allowing for layered defense. Additionally, it includes features that support incident response measures, enabling simple actions to contain threats and endpoints when detection is confirmed. 【Features】 ■ "Predictive defense technology" that can counter unknown threats ■ Multi-layered endpoint defense ■ EDR functions (threat search, eradication, endpoint isolation) ■ Cloud-based operational support services ■ Extensive defense and implementation track record *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web Security "i-FILTER Ver.10"

A safe business environment on the web without the need to be conscious of security. Web security with numerous implementation achievements.

The database of "i-FILTER" has changed from a method of categorizing URLs that could potentially be blocked to a method of categorizing various URLs starting from Ver. 10. By registering the URLs of domestic websites that hit search engines, including content URLs, it exposes and blocks communications with hidden locations of C&C servers in address spaces such as the "darknet" and "Deep Web," which cannot be searched on search engines. It also prevents Drive By Download attacks that infect users just by visiting a site by blocking the download of malware directly embedded in the site. 【Features】 ■ User management and operational rule settings according to organization and position ■ Support for complex custom settings with a range of features developed through numerous adoption records ■ Creation of unique URL categories using existing URL lists ■ Support for IT education for users through daily access ■ Capability to handle dynamic content with a uniquely developed shared cache mechanism *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

WEBROOT is a lightweight and fast full-cloud real-time security solution.

Choose full cloud security that enables real-time defense against threats and protects businesses and homes in an interconnected world.

"Weberroot Antivirus" is a fast and lightweight security system powered by full cloud technology. You won't waste time downloading or updating definition files. Additionally, it can quickly respond to the latest and unknown threats. 【Features】 ■ Full cloud-based security performs checks by querying the cloud instead of processing on the device. ■ By conducting checks in the cloud, the burden on the device is reduced, ensuring that operations are not affected. ■ There is no need to download malware definition files. ■ Installation time: 1.94 seconds (average of other companies: 98.24 seconds) ■ Initial scan memory usage: 71.78MB (average of other companies: 448.08MB) ■ Installation size: 32.82MB (average of other companies: 1159.03MB) ■ Scheduled scan time: 34.75 seconds (average of other companies: 199.89 seconds) ■ Memory usage during system idle: 42.03MB (average of other companies: 219.20MB) *For more details, please refer to the PDF document or feel free to contact us.

  • Virus software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

One-Touch Car Security "BEE737-S"

Installed sun visor! Detects shock, intrusion, door opening, and unauthorized engine start.

The "BEE737-S" is a one-touch car security system that uses a built-in buzzer to emit warning and alarm sounds, intimidating intruders with a loud volume of up to 90dB. Its high-precision dual-stage ultrasonic sensors create a barrier inside the vehicle, detecting impacts, glass breakage, intrusion, and door opening. Additionally, it is equipped with seven LEDs that flash to indicate the presence of the car security system while the system is ON. During the 30 seconds of the alarm, the LEDs alternate flashing red and blue to intimidate intruders. 【Features】 ■ Controlled with a dedicated remote (code hopping) ■ Easy installation with a built-in battery and cigarette plug power ■ Excellent crime deterrent effect with the flashing of seven high-brightness LEDs in seven colors ■ Intimidates and repels intruders with an alarm sound of up to 90dB *For more details, please download the PDF or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Liferay Premium Security to Protect Your Solution

Enhance your solution by implementing Liferay Premium Security for PaaS!

Security has become more important than ever. As cyberattacks become more frequent and increasingly sophisticated, companies need to prepare to effectively protect their digital solutions in order to safeguard their data and maintain business continuity. Otherwise, they could suffer significant damage to their operations. According to Forbes, the global cost of cybercrime is expected to increase by 15% over the next few years, reaching $10.6 trillion by 2025. To ensure the security of solutions and incorporate best practices, specialized personnel and resources are required, but they may not currently be available. *For more detailed information, please refer to the attached PDF document. Feel free to contact us for further inquiries.*

  • Integrated operation management

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Menu for Factories

Total security for factories! Flexibly combined according to needs! From preventing unauthorized access to managing movement and monitoring boundaries!

At Nippon Steel & Sumitomo Metal Corporation, we combine solutions tailored to our customers' needs, regardless of the manufacturer, to achieve "total security for factories." By managing access to and from hazardous areas and tracking personnel locations, we support the safety of workers. In boundary security, we monitor suspicious individuals and vessels using sensors and cameras. Additionally, in access management, we can implement measures to prevent tailgating, enable multi-person authentication, and restrict access to specific areas according to security levels. 【Security Menu】 ■ Application of various devices ■ Safety ■ Flow management ■ Boundary security: perimeter and port ■ Boundary security: access gates (people) *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] Secure Email Gateway

COMODO is a cloud-based solution that can be easily integrated into existing email infrastructure.

The "Secure Email Gateway" is a cloud-based solution that blocks fraudulent and malicious emails. It achieves powerful anti-spam by blocking spam before it enters the inbox. It is compatible with all major MTAs and can be easily integrated into existing email infrastructure, accommodating thousands of users. 【Features】 ■ Automatically blocks online threats ■ Over 85 million sensors worldwide ■ Inspects over 70 billion events daily *For more details, please refer to the PDF document or feel free to contact us.

  • Virus software
  • filtering
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Data] Secure Internet Gateway

Cloud-based solution that blocks advanced threats such as endpoints from COMODO.

The "Secure Internet Gateway" is a cloud-based solution that blocks malicious websites. It blocks websites categorized into 83 categories and prevents advanced threats such as phishing, communication with malicious domains, and endpoints that communicate with command and control servers. It can be used to control, monitor, and ensure security for web access from users' locations, internal IP addresses, networks, various types of mobile devices, and devices inside and outside the network. 【Features】 ■ Automatically blocks online threats ■ Over 85 million sensors worldwide ■ Inspects over 70 billion events daily *For more details, please refer to the PDF materials or feel free to contact us.

  • Virus software
  • filtering
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security "HEAT Application Control"

Shut out viruses and malware with a whitelist that has no loopholes!

The "HEAT Application Control" is a security software that enables the execution of only authorized applications by adopting the concept of a whitelist. The execution of unauthorized software or unknown applications that are not registered on the whitelist is blocked without exception. It can prevent targeted attacks and zero-day attacks that cannot be fully mitigated by antivirus alone, protecting endpoints from cyber attack threats. [Uses] ■ Measures against targeted and zero-day attacks ■ Virus and spyware protection ■ Enforcement of the use of standard software within the company ■ Prevention of unauthorized software installation *For more details, please download the PDF or feel free to contact us.

  • Other security
  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

FFRI yarai

Next-generation endpoint security FFRI yarai

It defends against unknown malware and vulnerability attacks that are difficult to detect with conventional pattern matching methods by using behavior detection technology that anticipates threats. **Features** - **Countermeasures for Unknown Threats** High defense capability proven by advanced technical skills and extensive track record. - **High Cost-Effectiveness** Protects the subjects that need safeguarding at a low cost, minimizing the burden on users. - **Purely Domestic Security Product** Development and support are completed domestically, providing quick and flexible support. - **EDR Functionality** Centralized management of endpoint security for the entire corporate group with FFRI AMC, enabling configuration and management of Microsoft Defender.

  • Virus software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Blog] Introduction to Web Performance: SSL and Web Security

Understand the essential SSL! Introducing in the blog why SSL is necessary and more.

The internet is a continuously expanding warehouse of data. This data includes both publicly available information and personal or confidential data that can only be accessed by authorized individuals (or at least should be). There are numerous ways for hackers to eavesdrop on and tamper with this data, and the World Wide Web cannot guarantee the safety of data, so you must ensure that the data is transmitted and stored securely. Customers of online shops and banking sites are particularly vulnerable to hackers, making data encryption more important than ever, serving as the first line of defense against cyber attacks. [Overview] ■ Overall picture ■ SSL or TLS? ■ Why SSL is necessary ■ How to implement SSL ■ How SSL works *You can view the detailed content of the blog through the related links. For more information, please feel free to contact us.

  • Other information systems
  • Other network tools
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration