Safety featuresのメーカーや取扱い企業、製品情報、参考価格、ランキングをまとめています。
イプロスは、 製造業 BtoB における情報を集めた国内最大級の技術データベースサイトです。

Safety features - メーカー・企業72社の製品一覧とランキング

更新日: 集計期間:Nov 05, 2025~Dec 02, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

Safety featuresのメーカー・企業ランキング

更新日: 集計期間:Nov 05, 2025~Dec 02, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. トータルセキュリティSP Shizuoka//retail
  2. フーバーブレイン Tokyo//IT/Telecommunications
  3. アイセル Tokyo//IT/Telecommunications
  4. 4 null/null
  5. 5 日鉄テックスエンジ システムソリューション事業部 Tokyo//others

Safety featuresの製品ランキング

更新日: 集計期間:Nov 05, 2025~Dec 02, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. トータルセキュリティSP『防災商品 総合カタログ』 トータルセキュリティSP
  2. Eye"247" Safety Zone FSAV V フーバーブレイン
  3. Palm-sized all-in-one security "SG-ONE" アイセル
  4. 4 Account@Adapter for wireless LAN authentication security
  5. 4 Security Menu for Factories 日鉄テックスエンジ システムソリューション事業部

Safety featuresの製品一覧

76~90 件を表示 / 全 109 件

表示件数

Explaining Cybersecurity! How is it different from Information Security?

An explanation of the types of cyber attacks and how cybersecurity is the key to protecting a company's trust and future!

The spread of telework, the globalization of business, and the acceleration of DX (digital transformation) have made strengthening cybersecurity an urgent task for many companies. Some may think, "Our company has security software, so we are fine." However, do you truly understand what threats that software can address and what measures are actually being implemented? Ad-hoc measures such as "It seems to have a good reputation" or "We implemented it just to be safe" will not protect the organization when faced with a cyberattack. This article will clearly explain the basics of cybersecurity. *You can view the detailed content of the article in the PDF. For more information, please feel free to contact us.*

  • ISO-related consultant

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Eye"247" Safety Zone FSAV V

The successor to FSAV IV, "Eye"247" AntiMalware, has been completed!

"Eye"247" Safety Zone FSAV V" is a product that packages the necessary security measures for small and medium-sized enterprises. It provides flexible defense logic against unknown and known threats, as well as improvements in operational efficiency and deterrent effects against information leaks through daily work record keeping. You can implement proven firewall functions without changing your existing network configuration. 【Features】 ■ Detects suspicious behavior at endpoints and supports rapid response ■ Advanced Threat Detection (ATC) to respond to evolving cyber attacks ■ Monitors ransomware activity and automatically backs up files ■ Prevents internal misconduct and visualizes information leak risks and actual work conditions ■ Supports security education through targeted attack email training *For more details, please download the PDF or feel free to contact us.

  • Other security and surveillance systems

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Endpoint Security "FFRI yarai"

Achieving multi-layered defense for endpoints! Japan's origin endpoint security to combat unknown threats.

"FFRI yarai" is an endpoint security solution that defends against unknown viruses in real-time through a "predictive technology" that observes virus behavior. It captures attack flows extensively with five engines, achieving multi-layered endpoint defense through dynamic and static analysis. It can coexist with typical antivirus software, allowing for layered defense. Additionally, it includes features that support incident response measures, enabling simple actions to contain threats and endpoints when detection is confirmed. 【Features】 ■ "Predictive defense technology" that can counter unknown threats ■ Multi-layered endpoint defense ■ EDR functions (threat search, eradication, endpoint isolation) ■ Cloud-based operational support services ■ Extensive defense and implementation track record *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Web Security "i-FILTER Ver.10"

A safe business environment on the web without the need to be conscious of security. Web security with numerous implementation achievements.

The database of "i-FILTER" has changed from a method of categorizing URLs that could potentially be blocked to a method of categorizing various URLs starting from Ver. 10. By registering the URLs of domestic websites that hit search engines, including content URLs, it exposes and blocks communications with hidden locations of C&C servers in address spaces such as the "darknet" and "Deep Web," which cannot be searched on search engines. It also prevents Drive By Download attacks that infect users just by visiting a site by blocking the download of malware directly embedded in the site. 【Features】 ■ User management and operational rule settings according to organization and position ■ Support for complex custom settings with a range of features developed through numerous adoption records ■ Creation of unique URL categories using existing URL lists ■ Support for IT education for users through daily access ■ Capability to handle dynamic content with a uniquely developed shared cache mechanism *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

WEBROOT is a lightweight and fast full-cloud real-time security solution.

Choose full cloud security that enables real-time defense against threats and protects businesses and homes in an interconnected world.

"Weberroot Antivirus" is a fast and lightweight security system powered by full cloud technology. You won't waste time downloading or updating definition files. Additionally, it can quickly respond to the latest and unknown threats. 【Features】 ■ Full cloud-based security performs checks by querying the cloud instead of processing on the device. ■ By conducting checks in the cloud, the burden on the device is reduced, ensuring that operations are not affected. ■ There is no need to download malware definition files. ■ Installation time: 1.94 seconds (average of other companies: 98.24 seconds) ■ Initial scan memory usage: 71.78MB (average of other companies: 448.08MB) ■ Installation size: 32.82MB (average of other companies: 1159.03MB) ■ Scheduled scan time: 34.75 seconds (average of other companies: 199.89 seconds) ■ Memory usage during system idle: 42.03MB (average of other companies: 219.20MB) *For more details, please refer to the PDF document or feel free to contact us.

  • Virus software

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

One-Touch Car Security "BEE737-S"

Installed sun visor! Detects shock, intrusion, door opening, and unauthorized engine start.

The "BEE737-S" is a one-touch car security system that uses a built-in buzzer to emit warning and alarm sounds, intimidating intruders with a loud volume of up to 90dB. Its high-precision dual-stage ultrasonic sensors create a barrier inside the vehicle, detecting impacts, glass breakage, intrusion, and door opening. Additionally, it is equipped with seven LEDs that flash to indicate the presence of the car security system while the system is ON. During the 30 seconds of the alarm, the LEDs alternate flashing red and blue to intimidate intruders. 【Features】 ■ Controlled with a dedicated remote (code hopping) ■ Easy installation with a built-in battery and cigarette plug power ■ Excellent crime deterrent effect with the flashing of seven high-brightness LEDs in seven colors ■ Intimidates and repels intruders with an alarm sound of up to 90dB *For more details, please download the PDF or feel free to contact us.

  • Other security and surveillance systems

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Liferay Premium Security to Protect Your Solution

Enhance your solution by implementing Liferay Premium Security for PaaS!

Security has become more important than ever. As cyberattacks become more frequent and increasingly sophisticated, companies need to prepare to effectively protect their digital solutions in order to safeguard their data and maintain business continuity. Otherwise, they could suffer significant damage to their operations. According to Forbes, the global cost of cybercrime is expected to increase by 15% over the next few years, reaching $10.6 trillion by 2025. To ensure the security of solutions and incorporate best practices, specialized personnel and resources are required, but they may not currently be available. *For more detailed information, please refer to the attached PDF document. Feel free to contact us for further inquiries.*

  • Integrated operation management

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security Menu for Factories

Total security for factories! Flexibly combined according to needs! From preventing unauthorized access to managing movement and monitoring boundaries!

At Nippon Steel & Sumitomo Metal Corporation, we combine solutions tailored to our customers' needs, regardless of the manufacturer, to achieve "total security for factories." By managing access to and from hazardous areas and tracking personnel locations, we support the safety of workers. In boundary security, we monitor suspicious individuals and vessels using sensors and cameras. Additionally, in access management, we can implement measures to prevent tailgating, enable multi-person authentication, and restrict access to specific areas according to security levels. 【Security Menu】 ■ Application of various devices ■ Safety ■ Flow management ■ Boundary security: perimeter and port ■ Boundary security: access gates (people) *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Information] Secure Email Gateway

COMODO is a cloud-based solution that can be easily integrated into existing email infrastructure.

The "Secure Email Gateway" is a cloud-based solution that blocks fraudulent and malicious emails. It achieves powerful anti-spam by blocking spam before it enters the inbox. It is compatible with all major MTAs and can be easily integrated into existing email infrastructure, accommodating thousands of users. 【Features】 ■ Automatically blocks online threats ■ Over 85 million sensors worldwide ■ Inspects over 70 billion events daily *For more details, please refer to the PDF document or feel free to contact us.

  • Virus software
  • filtering
  • Other security

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Data] Secure Internet Gateway

Cloud-based solution that blocks advanced threats such as endpoints from COMODO.

The "Secure Internet Gateway" is a cloud-based solution that blocks malicious websites. It blocks websites categorized into 83 categories and prevents advanced threats such as phishing, communication with malicious domains, and endpoints that communicate with command and control servers. It can be used to control, monitor, and ensure security for web access from users' locations, internal IP addresses, networks, various types of mobile devices, and devices inside and outside the network. 【Features】 ■ Automatically blocks online threats ■ Over 85 million sensors worldwide ■ Inspects over 70 billion events daily *For more details, please refer to the PDF materials or feel free to contact us.

  • Virus software
  • filtering
  • Other security

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security "HEAT Application Control"

Shut out viruses and malware with a whitelist that has no loopholes!

The "HEAT Application Control" is a security software that enables the execution of only authorized applications by adopting the concept of a whitelist. The execution of unauthorized software or unknown applications that are not registered on the whitelist is blocked without exception. It can prevent targeted attacks and zero-day attacks that cannot be fully mitigated by antivirus alone, protecting endpoints from cyber attack threats. [Uses] ■ Measures against targeted and zero-day attacks ■ Virus and spyware protection ■ Enforcement of the use of standard software within the company ■ Prevention of unauthorized software installation *For more details, please download the PDF or feel free to contact us.

  • Other security
  • filtering

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

FFRI yarai

Next-generation endpoint security FFRI yarai

It defends against unknown malware and vulnerability attacks that are difficult to detect with conventional pattern matching methods by using behavior detection technology that anticipates threats. **Features** - **Countermeasures for Unknown Threats** High defense capability proven by advanced technical skills and extensive track record. - **High Cost-Effectiveness** Protects the subjects that need safeguarding at a low cost, minimizing the burden on users. - **Purely Domestic Security Product** Development and support are completed domestically, providing quick and flexible support. - **EDR Functionality** Centralized management of endpoint security for the entire corporate group with FFRI AMC, enabling configuration and management of Microsoft Defender.

  • Virus software

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Blog] Introduction to Web Performance: SSL and Web Security

Understand the essential SSL! Introducing in the blog why SSL is necessary and more.

The internet is a continuously expanding warehouse of data. This data includes both publicly available information and personal or confidential data that can only be accessed by authorized individuals (or at least should be). There are numerous ways for hackers to eavesdrop on and tamper with this data, and the World Wide Web cannot guarantee the safety of data, so you must ensure that the data is transmitted and stored securely. Customers of online shops and banking sites are particularly vulnerable to hackers, making data encryption more important than ever, serving as the first line of defense against cyber attacks. [Overview] ■ Overall picture ■ SSL or TLS? ■ Why SSL is necessary ■ How to implement SSL ■ How SSL works *You can view the detailed content of the blog through the related links. For more information, please feel free to contact us.

  • Other information systems
  • Other network tools
  • others

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Solar Power Plant Security

Leave the security measures for solar power plants to Alvatec.

We are implementing various security measures in our solar power generation facilities, clarifying operational issues and making improvements.

  • Other security

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Voltage Security

It is a "deep discharge prevention device (battery protector)" that prevents the battery from "rising."

● This is a "deep discharge prevention device (battery protector)" that automatically cuts off the power supply when the sub-battery voltage drops to a certain level while using electrical equipment, preventing battery "drop." ● When the battery is charged and the voltage recovers, the power supply will automatically restore itself. ● It is also possible to notify voltage drop with a separate buzzer. ● By using it in conjunction with a battery separator, both the main and sub batteries can be protected. * A bimetal fuse of 50A x 1 piece is required. * It is not compatible with lithium-ion batteries.

  • Secondary Cells/Batteries

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録