Safety features Product List and Ranking from 45 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Aug 06, 2025~Sep 02, 2025
This ranking is based on the number of page views on our site.

Safety features Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Aug 06, 2025~Sep 02, 2025
This ranking is based on the number of page views on our site.

  1. 昭電 Tokyo//others
  2. フーバーブレイン Tokyo//Information and Communications
  3. セントラル警備保障 Tokyo//Building Management
  4. 4 シー・ティ・マシン Osaka//Building materials, supplies and fixtures manufacturers 大阪本社
  5. 5 グローバルセンター Tokyo//Renovation and home construction industry 営業本部

Safety features Product ranking

Last Updated: Aggregation Period:Aug 06, 2025~Sep 02, 2025
This ranking is based on the number of page views on our site.

  1. Network Security "FOX-IT Data Diode" 昭電
  2. Eye"247" Safety Zone FSAV V フーバーブレイン
  3. Security "Trap-type Fence Sensor" 昭電
  4. 4 CSP's office security "BiZ Guard Revo" セントラル警備保障
  5. 5 Cybersecurity: Deceptions Everywhere シー・ティ・マシン 大阪本社

Safety features Product List

1~15 item / All 77 items

Displayed results

Heimdal Endpoint DNS Security

Achieve advanced security protection against malware such as ransomware that cannot be defended against by firewalls and UTM, etc.!

Heimdal Endpoint DNS Security is a feature within the Heimdal Security Suite, providing a DNS security solution that combines threat intelligence, machine learning, and AI-based advanced technologies. There are two products: "Endpoint" and "Network." Are you facing any of these issues? ■ Want to prevent malware infections and data leaks via email and websites? ■ Looking for an easy and cost-effective way to start DNS filtering? ■ Want to enhance your cyber attack defenses without changing your existing security environment? We can solve these concerns. 【Features】 ■ Addresses advanced threats and infected users along with the infection process ■ Predicts threats using AI-driven neural network predictive DNS ■ Comes with a network log agent for infection tracing

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security "Trap-type Fence Sensor"

A trap-type fence sensor that quickly detects and reports acts of climbing over fences and similar obstacles!

The "Trap-type Fence Sensor" is an automatic reset alarm line sensor system that installs trap sensors at regular intervals on fences along the boundary line of a facility. It detects pulling or weight on the alarm line and issues an alarm, and then automatically resets when returning to a normal state, leaving a marker display at the point of alarm activation. It is effective for the security of large facilities and supports the expansion of security systems, such as integration with surveillance cameras. 【Features】 ■ Marker display even after automatic reset ■ Simple structure ■ All-weather design ■ Expansion of security systems *For more details, please feel free to contact us.

  • image_14.jpg
  • image_15.jpg
  • image_16.jpg
  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Company Information [JSecurity Co., Ltd.]

Providing peace of mind for all businesses with security solutions recognized by the world!

JSecurity Co., Ltd. provides solutions that contribute to Japan's IT security under the slogan "All for Japan Security." We offer a lineup of email security products that address spam prevention, virus email protection, email sanitization, and measures against email misdelivery, as well as information security products for small and medium-sized enterprises that are affordable and easy to implement and operate. Our main business is the development and sales of information security products that cover a wide range from networks to endpoints. [Business Description] ■ Development and sales of information security products and services *For more details, please refer to the PDF document or feel free to contact us.*

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Rexse Security Rental

Achieves high security! A security system that automatically captures images along with a warning light.

When the motion sensor is triggered, the network camera will turn in that direction and capture images of the intruder. There is no need to have it installed as a constant security camera; instead, the network camera can be used to monitor another area during normal times, and it can automatically change its direction and start recording only when an intruder is detected, achieving both security effectiveness and cost reduction. 【Features】 ○ No installation required; it can be used immediately after setup ○ Camera unit: preset registration function ○ Camera unit: remote operation for video and recording search/control ○ Motion sensor unit: contact output can be adjusted based on external control input and day/night detection function ○ Motion sensor unit: detection distance is adjustable For more details, please contact us or download the catalog.

  • Equipment leasing and rental

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security software port security

It is said that about 70% of information leakage incidents are due to internal factors.

Port security is a software solution for controlling devices and preventing information leakage.

  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The Importance of Perimeter Security *Showroom tours are always available!

Review the 'physical security' that becomes a blind spot under information security to prevent unauthorized access!

In recent years, security measures have primarily focused on online strategies such as internal information management. However, among the incidents and accidents that have occurred in the past few years, there has been an increase in those caused by physical security issues, such as "unauthorized intrusions." Regarding these surprisingly overlooked physical security problems, are your company's and factory's measures sufficient? While deploying security personnel is an effective strategy, there are voices expressing difficulties in maintaining a permanent presence due to labor shortages and rising personnel costs. Therefore, what will become crucial in future security measures is "effectively utilizing security devices to prevent malicious intrusions before they occur." To prevent intrusions, strengthening "perimeter security," where entrances and exits are established, is essential. Our company consistently addresses the challenges of perimeter security, from proposing measures to implementation. ■ We are always accepting visits to our "showroom" where you can experience perimeter security! ■ If you are struggling with security enhancements, please feel free to consult with us. *Please download the materials to check product information.

  • Entrance/Exit Gate System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cybersecurity: Deceptions Everywhere

Achieving a safe and secure network environment! Measures against indiscriminate and ruthless cyber attacks.

Although not widely known in Japan, Israel, with a population of just 8 million, is said to account for about 10% of the global cybersecurity market. The company illusive networks, a subsidiary of TEAM8, which was established around the elite of the Israeli Defense Forces' cyber attack unit (Unit 8200), has developed a counter-cyberterrorism system called "Deceptions Everywhere." This time, the long-established security company C.T. Machine has partnered with illusive networks to take action against cyberterrorism in the Japanese market, based on a new concept of security. 【Features】 ■ In addition to the current security measures, implementing this product allows for post-intrusion countermeasures. ■ No need for adjustments to local clients, ensuring high operational rates and peace of mind. ■ Achieves enhanced security after intrusion at a low cost. ■ Volume discounts are available based on the number of units deployed. *For more details, please refer to the related link page or feel free to contact us.

  • Other security systems
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Secure your sliding door with confidence! 'KL800 (Surface-mounted automatic locking for sliding doors)'

The keyless entry and auto-lock features remain the same for sliding doors! With the Kilex 800, the functions are unchanged, and installation is easy because it is surface-mounted.

The "Keyless 800 (Surface-Mounted Automatic Lock for Sliding Doors)" is a surface-mounted keyless button lock that can be installed on the edge of sliding doors. The combination of the access code can be set to any of 4,096 variations, with a range of 1 to 12 digits. It retains the functions of the conventional Keyless 800, such as auto-lock and free lock switching. It can accommodate a variety of installation environments, both indoors and outdoors, and there has been an increase in its use in welfare and medical facilities where sliding doors are common. 【Features】 ■ Auto-lock ■ Surface-mounted latch lock ■ Free lock switching function (switch to a state where the lock cannot be locked) ■ Available in a keyed type (with both button and key) ■ Available in a dual-button type (button lock on both the outside and inside) ■ Cover settings available for KL800 *For more details, please refer to the PDF document or feel free to contact us.

  • Home Security
  • Security locks (windows, front doors, etc.)
  • Security locks (windows, front doors, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security from both inside and outside! 【Keylex Double-Sided Button Series】

Ideal for places where you want to restrict not only external intrusions but also internal exits! You can set separate passcodes for inside and outside!

The "Keylex Double-Sided Button Series" features button locks (Keylex) on both the inside and outside of the door, allowing for access control using a passcode whether entering from indoors or exiting outdoors. You can set different passcodes for the inside Keylex and the outside Keylex, enabling you to have two separate passcodes: one for entry and one for exit. (Of course, you can also use the same code for both sides.) Each Keylex comes with a double-sided button option, allowing you to use it according to your needs. For example... - I want an auto-lock feature or one with a key (*1)! - I want to change the passcode without removing it from the door! - I prefer a compact type! - I want to use it on sliding doors! We have a wide variety of options to meet various requests. *For more details, please refer to the PDF document or feel free to contact us. (*1) Keyed: This type has a cylinder built into the Keylex body, allowing it to be unlocked not only by the button but also with a key.

  • Entrance/Exterior Doors
  • Hardware Doors, Handles and Locks
  • Security locks (windows, front doors, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Multimedia Crusher Mighty Security MS-1000

Crusher dedicated to urban mining recycling (integrated crushing and material separation)

Large machine for urban mining recycling. It enables integrated processing of crushing and material separation, significantly improving sorting efficiency after crushing.

  • Other resource recycling

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ace Computer Service USB Memory Security

It is attached to USB devices such as a mouse and numeric keypad to prevent use.

Attach it to a USB memory stick, lock it to prevent data extraction, and connect it to USB devices such as a mouse or numeric keypad to prevent usage. The dial's PIN can be set to a 3-digit number of your choice.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

NetBloom Integrated Security

SAFE SECURITY

In the increasingly complex information society, attacks and destructive activities through networks continue unabated. The security requirements demanded of corporate activities are rapidly changing, and ensuring high safety for systems and networks is considered an increasingly important mission.

  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cybersecurity in the IoT Era

Detection of vulnerabilities in control systems and ensuring safety and robustness

A detailed explanation of specific efforts to improve security through the activities of the Control System Security Center! A thorough analysis of the characteristics and specific examples of cyber attacks on critical infrastructure and control systems, which are not widely publicized, along with detailed explanations of defense methods! An introduction to the technological trends in evaluation certification and standardization in the field of control systems, as well as the initiatives of related organizations!

  • Other Software
  • Other security systems
  • Internet System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Device Security & Phone Support "Help Guardman"

Thoroughly guard against threats from information leaks and external viruses! We also provide support for maintenance and management after implementation via phone and remote assistance.

"Otasuke Guardman" is a service that protects the computers, smartphones, and tablets used by corporations from the threats of viruses and directly supports customers in resolving troubles on their computers. Additionally, when issues arise with computers or multi-devices, we provide support via phone and email to help resolve them. Please feel free to consult us about any device troubles at any time. 【Features】 ■ Deployment of PC matic MSP, a core security software, in key areas ■ Provision of online support via phone and remote access ■ Strong protection against information leaks and external virus threats ■ Support for maintenance and management after implementation via phone and remote access *For more details, please refer to the PDF document or feel free to contact us.

  • Customer Support
  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Electronic lock "TOUCH/TOUCH HOOK" dual authentication security

RFID-compatible retrofit electronic lock. Installation time only 30 minutes!

The electronic lock "TOUCH / TOUCH HOOK" allows for enhanced security with dual authentication. It can be retrofitted to almost any door, and TOUCH HOOK can also be installed on sliding doors. By simply attaching the included IC seal, everyday items can be transformed into keys. Individual registration and deletion of IC cards are possible, so in the event of a lost card, only the relevant card can be registered or deleted. A one-time PIN that can only be used once is convenient for guest visits. ◆ Useful in the following situations A woman living alone who receives home care. It is difficult to go to the front door to open it every time a caregiver arrives. → TOUCH / TOUCH HOOK can be retrofitted to almost any door. By communicating a PIN or one-time PIN to the caregiver, there is no need to go to the front door every time. If the auto-lock function is used, there is no need to go lock the door when the caregiver leaves. If an IC card is given, individual registration and deletion can be done, so even if the caregiver changes, it is safe as long as the relevant card is deleted, even if the card cannot be retrieved. *For more product details, please download and view the catalog.

  • Security locks (windows, front doors, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration