We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Safety features.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Safety features Product List and Ranking from 75 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Dec 17, 2025~Jan 13, 2026
This ranking is based on the number of page views on our site.

Safety features Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Dec 17, 2025~Jan 13, 2026
This ranking is based on the number of page views on our site.

  1. UL Japan Tokyo//Testing, Analysis and Measurement
  2. 日本HP Tokyo//IT/Telecommunications
  3. トータルセキュリティSP Shizuoka//retail
  4. 4 アイセル Tokyo//IT/Telecommunications
  5. 5 日鉄テックスエンジ システムソリューション事業部 Tokyo//others

Safety features Product ranking

Last Updated: Aggregation Period:Dec 17, 2025~Jan 13, 2026
This ranking is based on the number of page views on our site.

  1. [On-Demand Webinar] Cybersecurity for Medical Devices UL Japan
  2. トータルセキュリティSP『防災商品 総合カタログ』 トータルセキュリティSP
  3. HP Wolf Security Comprehensive Catalog 日本HP
  4. 4 Palm-sized all-in-one security "SG-ONE" アイセル
  5. 5 Security Menu for Factories 日鉄テックスエンジ システムソリューション事業部

Safety features Product List

76~90 item / All 112 items

Displayed results

Explaining Cybersecurity! How is it different from Information Security?

An explanation of the types of cyber attacks and how cybersecurity is the key to protecting a company's trust and future!

The spread of telework, the globalization of business, and the acceleration of DX (digital transformation) have made strengthening cybersecurity an urgent task for many companies. Some may think, "Our company has security software, so we are fine." However, do you truly understand what threats that software can address and what measures are actually being implemented? Ad-hoc measures such as "It seems to have a good reputation" or "We implemented it just to be safe" will not protect the organization when faced with a cyberattack. This article will clearly explain the basics of cybersecurity. *You can view the detailed content of the article in the PDF. For more information, please feel free to contact us.*

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Eye"247" Safety Zone FSAV V

The successor to FSAV IV, "Eye"247" AntiMalware, has been completed!

"Eye"247" Safety Zone FSAV V" is a product that packages the necessary security measures for small and medium-sized enterprises. It provides flexible defense logic against unknown and known threats, as well as improvements in operational efficiency and deterrent effects against information leaks through daily work record keeping. You can implement proven firewall functions without changing your existing network configuration. 【Features】 ■ Detects suspicious behavior at endpoints and supports rapid response ■ Advanced Threat Detection (ATC) to respond to evolving cyber attacks ■ Monitors ransomware activity and automatically backs up files ■ Prevents internal misconduct and visualizes information leak risks and actual work conditions ■ Supports security education through targeted attack email training *For more details, please download the PDF or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Endpoint Security "FFRI yarai"

Achieving multi-layered defense for endpoints! Japan's origin endpoint security to combat unknown threats.

"FFRI yarai" is an endpoint security solution that defends against unknown viruses in real-time through a "predictive technology" that observes virus behavior. It captures attack flows extensively with five engines, achieving multi-layered endpoint defense through dynamic and static analysis. It can coexist with typical antivirus software, allowing for layered defense. Additionally, it includes features that support incident response measures, enabling simple actions to contain threats and endpoints when detection is confirmed. 【Features】 ■ "Predictive defense technology" that can counter unknown threats ■ Multi-layered endpoint defense ■ EDR functions (threat search, eradication, endpoint isolation) ■ Cloud-based operational support services ■ Extensive defense and implementation track record *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security solution "AppGuard"

New concept OS-protect type endpoint security!

"AppGuard" is an OS-protecting endpoint security that protects PCs from any threats, whether known or unknown, without performing detection or identification. As the name suggests, it protects the OS itself and does not harm the system. Furthermore, users can use programs they have installed without the need for listing (policy settings), and it is also possible to apply updates to those software without changing the settings. 【Features】 ■ Does not harm the system regardless of unknown, zero-day, or known threats (prevents unauthorized actions in advance) ■ Ensures system safety *For more details, please download the PDF or contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web Security "i-FILTER Ver.10"

A safe business environment on the web without the need to be conscious of security. Web security with numerous implementation achievements.

The database of "i-FILTER" has changed from a method of categorizing URLs that could potentially be blocked to a method of categorizing various URLs starting from Ver. 10. By registering the URLs of domestic websites that hit search engines, including content URLs, it exposes and blocks communications with hidden locations of C&C servers in address spaces such as the "darknet" and "Deep Web," which cannot be searched on search engines. It also prevents Drive By Download attacks that infect users just by visiting a site by blocking the download of malware directly embedded in the site. 【Features】 ■ User management and operational rule settings according to organization and position ■ Support for complex custom settings with a range of features developed through numerous adoption records ■ Creation of unique URL categories using existing URL lists ■ Support for IT education for users through daily access ■ Capability to handle dynamic content with a uniquely developed shared cache mechanism *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

WEBROOT is a lightweight and fast full-cloud real-time security solution.

Choose full cloud security that enables real-time defense against threats and protects businesses and homes in an interconnected world.

"Weberroot Antivirus" is a fast and lightweight security system powered by full cloud technology. You won't waste time downloading or updating definition files. Additionally, it can quickly respond to the latest and unknown threats. 【Features】 ■ Full cloud-based security performs checks by querying the cloud instead of processing on the device. ■ By conducting checks in the cloud, the burden on the device is reduced, ensuring that operations are not affected. ■ There is no need to download malware definition files. ■ Installation time: 1.94 seconds (average of other companies: 98.24 seconds) ■ Initial scan memory usage: 71.78MB (average of other companies: 448.08MB) ■ Installation size: 32.82MB (average of other companies: 1159.03MB) ■ Scheduled scan time: 34.75 seconds (average of other companies: 199.89 seconds) ■ Memory usage during system idle: 42.03MB (average of other companies: 219.20MB) *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

One-Touch Car Security "BEE737-S"

Installed sun visor! Detects shock, intrusion, door opening, and unauthorized engine start.

The "BEE737-S" is a one-touch car security system that uses a built-in buzzer to emit warning and alarm sounds, intimidating intruders with a loud volume of up to 90dB. Its high-precision dual-stage ultrasonic sensors create a barrier inside the vehicle, detecting impacts, glass breakage, intrusion, and door opening. Additionally, it is equipped with seven LEDs that flash to indicate the presence of the car security system while the system is ON. During the 30 seconds of the alarm, the LEDs alternate flashing red and blue to intimidate intruders. 【Features】 ■ Controlled with a dedicated remote (code hopping) ■ Easy installation with a built-in battery and cigarette plug power ■ Excellent crime deterrent effect with the flashing of seven high-brightness LEDs in seven colors ■ Intimidates and repels intruders with an alarm sound of up to 90dB *For more details, please download the PDF or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Liferay Premium Security to Protect Your Solution

Enhance your solution by implementing Liferay Premium Security for PaaS!

Security has become more important than ever. As cyberattacks become more frequent and increasingly sophisticated, companies need to prepare to effectively protect their digital solutions in order to safeguard their data and maintain business continuity. Otherwise, they could suffer significant damage to their operations. According to Forbes, the global cost of cybercrime is expected to increase by 15% over the next few years, reaching $10.6 trillion by 2025. To ensure the security of solutions and incorporate best practices, specialized personnel and resources are required, but they may not currently be available. *For more detailed information, please refer to the attached PDF document. Feel free to contact us for further inquiries.*

  • Integrated operation management

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Menu for Factories

Total security for factories! Flexibly combined according to needs! From preventing unauthorized access to managing movement and monitoring boundaries!

At Nippon Steel & Sumitomo Metal Corporation, we combine solutions tailored to our customers' needs, regardless of the manufacturer, to achieve "total security for factories." By managing access to and from hazardous areas and tracking personnel locations, we support the safety of workers. In boundary security, we monitor suspicious individuals and vessels using sensors and cameras. Additionally, in access management, we can implement measures to prevent tailgating, enable multi-person authentication, and restrict access to specific areas according to security levels. 【Security Menu】 ■ Application of various devices ■ Safety ■ Flow management ■ Boundary security: perimeter and port ■ Boundary security: access gates (people) *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] Secure Email Gateway

COMODO is a cloud-based solution that can be easily integrated into existing email infrastructure.

The "Secure Email Gateway" is a cloud-based solution that blocks fraudulent and malicious emails. It achieves powerful anti-spam by blocking spam before it enters the inbox. It is compatible with all major MTAs and can be easily integrated into existing email infrastructure, accommodating thousands of users. 【Features】 ■ Automatically blocks online threats ■ Over 85 million sensors worldwide ■ Inspects over 70 billion events daily *For more details, please refer to the PDF document or feel free to contact us.

  • Virus software
  • filtering
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Data] Secure Internet Gateway

Cloud-based solution that blocks advanced threats such as endpoints from COMODO.

The "Secure Internet Gateway" is a cloud-based solution that blocks malicious websites. It blocks websites categorized into 83 categories and prevents advanced threats such as phishing, communication with malicious domains, and endpoints that communicate with command and control servers. It can be used to control, monitor, and ensure security for web access from users' locations, internal IP addresses, networks, various types of mobile devices, and devices inside and outside the network. 【Features】 ■ Automatically blocks online threats ■ Over 85 million sensors worldwide ■ Inspects over 70 billion events daily *For more details, please refer to the PDF materials or feel free to contact us.

  • Virus software
  • filtering
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security "HEAT Application Control"

Shut out viruses and malware with a whitelist that has no loopholes!

The "HEAT Application Control" is a security software that enables the execution of only authorized applications by adopting the concept of a whitelist. The execution of unauthorized software or unknown applications that are not registered on the whitelist is blocked without exception. It can prevent targeted attacks and zero-day attacks that cannot be fully mitigated by antivirus alone, protecting endpoints from cyber attack threats. [Uses] ■ Measures against targeted and zero-day attacks ■ Virus and spyware protection ■ Enforcement of the use of standard software within the company ■ Prevention of unauthorized software installation *For more details, please download the PDF or feel free to contact us.

  • Other security
  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

FFRI yarai

Next-generation endpoint security FFRI yarai

It defends against unknown malware and vulnerability attacks that are difficult to detect with conventional pattern matching methods by using behavior detection technology that anticipates threats. **Features** - **Countermeasures for Unknown Threats** High defense capability proven by advanced technical skills and extensive track record. - **High Cost-Effectiveness** Protects the subjects that need safeguarding at a low cost, minimizing the burden on users. - **Purely Domestic Security Product** Development and support are completed domestically, providing quick and flexible support. - **EDR Functionality** Centralized management of endpoint security for the entire corporate group with FFRI AMC, enabling configuration and management of Microsoft Defender.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Blog] Introduction to Web Performance: SSL and Web Security

Understand the essential SSL! Introducing in the blog why SSL is necessary and more.

The internet is a continuously expanding warehouse of data. This data includes both publicly available information and personal or confidential data that can only be accessed by authorized individuals (or at least should be). There are numerous ways for hackers to eavesdrop on and tamper with this data, and the World Wide Web cannot guarantee the safety of data, so you must ensure that the data is transmitted and stored securely. Customers of online shops and banking sites are particularly vulnerable to hackers, making data encryption more important than ever, serving as the first line of defense against cyber attacks. [Overview] ■ Overall picture ■ SSL or TLS? ■ Why SSL is necessary ■ How to implement SSL ■ How SSL works *You can view the detailed content of the blog through the related links. For more information, please feel free to contact us.

  • 2023-03-17_17h41_51.png
  • 2023-03-17_17h42_08.png
  • Other information systems
  • Other network tools
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Solar Power Plant Security

Leave the security measures for solar power plants to Alvatec.

We are implementing various security measures in our solar power generation facilities, clarifying operational issues and making improvements.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration