We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Safety features.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Safety features Product List and Ranking from 44 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Safety features Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. null/null
  2. NRIセキュアテクノロジーズ Tokyo//IT/Telecommunications
  3. 昭電 Tokyo//IT/Telecommunications
  4. 4 トータルセキュリティSP Shizuoka//retail
  5. 5 フーバーブレイン Tokyo//IT/Telecommunications

Safety features Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. Account@Adapter for wireless LAN authentication security
  2. [File Transfer Service Case] Sumitomo Life Insurance Company NRIセキュアテクノロジーズ
  3. トータルセキュリティSP『防災商品 総合カタログ』 トータルセキュリティSP
  4. 4 Network Security "FOX-IT Company Data Diode" 昭電
  5. 4 Eye"247" Safety Zone FSAV V フーバーブレイン

Safety features Product List

106~110 item / All 110 items

Displayed results

Security

Let's protect important data with advanced security features!

The IT service management tool "Jira Software" comprehensively supports teams in planning, assigning, tracking, reporting, and managing work to deliver excellent services quickly. With project management templates, you can streamline projects as much as possible by prioritizing tasks, managing team workloads, and tracking work from planning to completion. **Features** ■ You can set task priorities, manage team workloads, and maximize overall project efficiency through planning. ■ Visualize task statuses in Kanban format with board view, and quickly review and organize tasks in list view. Clarify task durations and dependencies through timeline and calendar views, and keep track of deadlines. ■ Includes summary views to overview project progress, priorities, and activities, as well as integrated reports and dashboards to analyze resource allocation and task progress. ■ Workflows can be customized according to project needs, allowing for easy setup of subtasks, deadlines, and priorities to achieve effective project management.

  • Document and Data Management

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[English Research Report] Cloud Workload Security

The CNAPP market is expected to grow by 42% in the second quarter of 2024, with multi-cloud and AI-based security features expanding the market to approximately $700 million.

The Dell'Oro Group's "Cloud Workload Security Preliminary Research Report" provides a comprehensive industry overview of the CNAPP market since 2019. This report includes the following quarterly data tables: ● CNAPP revenue by manufacturer by region: North America, EMEA (Europe, Middle East, Africa), Asia-Pacific excluding China, China, CALA (Caribbean and Latin America) ● CNAPP revenue by development, deployment, and runtime technologies This report includes the following annual data tables: ■ Five-year regional revenue forecast for CNAPP ■ Five-year revenue forecast for CNAPP (by development, deployment, and runtime technologies)

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Research Material] Global Market for Connected Medical Device Security

Global Market for Connected Medical Device Security: Hardware, Software, Network Components, Hospitals, Clinics, Laboratories, and Others

This research report (Global Connected Medical Devices Security Market) investigates and analyzes the current state and future outlook of the global market for connected medical device security over the next five years. It includes information on the overview of the global connected medical device security market, trends of major companies (sales, selling prices, market share), market size by segment, market size by major regions, and distribution channel analysis. The segments of the connected medical device security market by type include hardware, software, and network components, while the segments by application focus on hospitals, clinics, laboratories, and others. The regional segments are categorized into North America, the United States, Europe, Asia-Pacific, Japan, China, India, South Korea, Southeast Asia, South America, the Middle East, and Africa to calculate the market size for connected medical device security. The report also includes the market share of major companies in connected medical device security, product and business overviews, and sales performance.

  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Market Report] Global Market for Security Testing

The global security testing market is expected to achieve dynamic growth, reaching $35.9 billion by 2031.

The global security testing market, which recorded sales of 9.3 billion USD in 2022, is expected to achieve robust growth and reach an estimated 35.9 billion USD by 2031. This growth is progressing at a compound annual growth rate (CAGR) of 16.2% from 2023 to 2031, underscoring the increasing importance of cybersecurity in the digital age. Security testing, a crucial process for protecting information systems, plays an extremely important role in identifying and rectifying vulnerabilities across various aspects of technical infrastructure. This process includes thorough inspections of system software, networks, server-side applications, and client-side applications. The main objective of security testing is to protect data integrity and ensure the functionality of information systems by addressing potential security threats and weaknesses. For application methods, please check the [PDF download] button or apply directly through the related links.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration