Safety features Product List and Ranking from 62 Manufacturers, Suppliers and Companies | IPROS

Last Updated: Aggregation Period:Feb 18, 2026~Mar 17, 2026
This ranking is based on the number of page views on our site.

Safety features Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Feb 18, 2026~Mar 17, 2026
This ranking is based on the number of page views on our site.

  1. トータルセキュリティSP Shizuoka//retail
  2. null/null
  3. 日本ロックサービス Tokyo//Trading company/Wholesale
  4. 4 長沢製作所 Tokyo//Building materials, supplies and fixtures manufacturers
  5. 5 アイマトリックス Kanagawa//Information and Communications

Safety features Product ranking

Last Updated: Aggregation Period:Feb 18, 2026~Mar 17, 2026
This ranking is based on the number of page views on our site.

  1. トータルセキュリティSP『防災商品 総合カタログ』 トータルセキュリティSP
  2. Security "Trap-type Fence Sensor"
  3. Secure your sliding door with confidence! 'KL800 (Surface-mounted automatic locking for sliding doors)' 長沢製作所
  4. CSP's office security "BiZ Guard Revo" セントラル警備保障
  5. 4 Home security with smart devices SpaceCore 日本ロックサービス

Safety features Product List

1~30 item / All 86 items

Displayed results

Heimdal Endpoint DNS Security

Achieve advanced security protection against malware such as ransomware that cannot be defended against by firewalls and UTM, etc.!

Heimdal Endpoint DNS Security is a feature within the Heimdal Security Suite, providing a DNS security solution that combines threat intelligence, machine learning, and AI-based advanced technologies. There are two products: "Endpoint" and "Network." Are you facing any of these issues? ■ Want to prevent malware infections and data leaks via email and websites? ■ Looking for an easy and cost-effective way to start DNS filtering? ■ Want to enhance your cyber attack defenses without changing your existing security environment? We can solve these concerns. 【Features】 ■ Addresses advanced threats and infected users along with the infection process ■ Predicts threats using AI-driven neural network predictive DNS ■ Comes with a network log agent for infection tracing

  • Other Software
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Company Information [JSecurity Co., Ltd.]

Providing peace of mind for all businesses with security solutions recognized by the world!

JSecurity Co., Ltd. provides solutions that contribute to Japan's IT security under the slogan "All for Japan Security." We offer a lineup of email security products that address spam prevention, virus email protection, email sanitization, and measures against email misdelivery, as well as information security products for small and medium-sized enterprises that are affordable and easy to implement and operate. Our main business is the development and sales of information security products that cover a wide range from networks to endpoints. [Business Description] ■ Development and sales of information security products and services *For more details, please refer to the PDF document or feel free to contact us.*

  • Security Assessment
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Rexse Security Rental

Achieves high security! A security system that automatically captures images along with a warning light.

When the motion sensor is triggered, the network camera will turn in that direction and capture images of the intruder. There is no need to have it installed as a constant security camera; instead, the network camera can be used to monitor another area during normal times, and it can automatically change its direction and start recording only when an intruder is detected, achieving both security effectiveness and cost reduction. 【Features】 ○ No installation required; it can be used immediately after setup ○ Camera unit: preset registration function ○ Camera unit: remote operation for video and recording search/control ○ Motion sensor unit: contact output can be adjusted based on external control input and day/night detection function ○ Motion sensor unit: detection distance is adjustable For more details, please contact us or download the catalog.

  • Equipment leasing and rental
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security software port security

It is said that about 70% of information leakage incidents are due to internal factors.

Port security is a software solution for controlling devices and preventing information leakage.

  • Firewall
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The Importance of Perimeter Security *Showroom tours are always available!

Review the 'physical security' that becomes a blind spot under information security to prevent unauthorized access!

In recent years, security measures have primarily focused on online strategies such as internal information management. However, among the incidents and accidents that have occurred in the past few years, there has been an increase in those caused by physical security issues, such as "unauthorized intrusions." Regarding these surprisingly overlooked physical security problems, are your company's and factory's measures sufficient? While deploying security personnel is an effective strategy, there are voices expressing difficulties in maintaining a permanent presence due to labor shortages and rising personnel costs. Therefore, what will become crucial in future security measures is "effectively utilizing security devices to prevent malicious intrusions before they occur." To prevent intrusions, strengthening "perimeter security," where entrances and exits are established, is essential. Our company consistently addresses the challenges of perimeter security, from proposing measures to implementation. ■ We are always accepting visits to our "showroom" where you can experience perimeter security! ■ If you are struggling with security enhancements, please feel free to consult with us. *Please download the materials to check product information.

  • Entrance/Exit Gate System
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cybersecurity: Deceptions Everywhere

Achieving a safe and secure network environment! Measures against indiscriminate and ruthless cyber attacks.

Although not widely known in Japan, Israel, with a population of just 8 million, is said to account for about 10% of the global cybersecurity market. The company illusive networks, a subsidiary of TEAM8, which was established around the elite of the Israeli Defense Forces' cyber attack unit (Unit 8200), has developed a counter-cyberterrorism system called "Deceptions Everywhere." This time, the long-established security company C.T. Machine has partnered with illusive networks to take action against cyberterrorism in the Japanese market, based on a new concept of security. 【Features】 ■ In addition to the current security measures, implementing this product allows for post-intrusion countermeasures. ■ No need for adjustments to local clients, ensuring high operational rates and peace of mind. ■ Achieves enhanced security after intrusion at a low cost. ■ Volume discounts are available based on the number of units deployed. *For more details, please refer to the related link page or feel free to contact us.

  • Other security systems
  • others
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Secure your sliding door with confidence! 'KL800 (Surface-mounted automatic locking for sliding doors)'

The keyless entry and auto-lock features remain the same for sliding doors! With the Kilex 800, the functions are unchanged, and installation is easy because it is surface-mounted.

The "Keyless 800 (Surface-Mounted Automatic Lock for Sliding Doors)" is a surface-mounted keyless button lock that can be installed on the edge of sliding doors. The combination of the access code can be set to any of 4,096 variations, with a range of 1 to 12 digits. It retains the functions of the conventional Keyless 800, such as auto-lock and free lock switching. It can accommodate a variety of installation environments, both indoors and outdoors, and there has been an increase in its use in welfare and medical facilities where sliding doors are common. 【Features】 ■ Auto-lock ■ Surface-mounted latch lock ■ Free lock switching function (switch to a state where the lock cannot be locked) ■ Available in a keyed type (with both button and key) ■ Available in a dual-button type (button lock on both the outside and inside) ■ Cover settings available for KL800 *For more details, please refer to the PDF document or feel free to contact us.

  • Home Security
  • Security locks (windows, front doors, etc.)
  • Security locks (windows, front doors, etc.)
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security from both inside and outside! 【Keylex Double-Sided Button Series】

Ideal for places where you want to restrict not only external intrusions but also internal exits! You can set separate passcodes for inside and outside!

The "Keylex Double-Sided Button Series" features button locks (Keylex) on both the inside and outside of the door, allowing for access control using a passcode whether entering from indoors or exiting outdoors. You can set different passcodes for the inside Keylex and the outside Keylex, enabling you to have two separate passcodes: one for entry and one for exit. (Of course, you can also use the same code for both sides.) Each Keylex comes with a double-sided button option, allowing you to use it according to your needs. For example... - I want an auto-lock feature or one with a key (*1)! - I want to change the passcode without removing it from the door! - I prefer a compact type! - I want to use it on sliding doors! We have a wide variety of options to meet various requests. *For more details, please refer to the PDF document or feel free to contact us. (*1) Keyed: This type has a cylinder built into the Keylex body, allowing it to be unlocked not only by the button but also with a key.

  • Entrance/Exterior Doors
  • Hardware Doors, Handles and Locks
  • Security locks (windows, front doors, etc.)
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Multimedia Crusher Mighty Security MS-1000

Crusher dedicated to urban mining recycling (integrated crushing and material separation)

Large machine for urban mining recycling. It enables integrated processing of crushing and material separation, significantly improving sorting efficiency after crushing.

  • Other resource recycling
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ace Computer Service USB Memory Security

It is attached to USB devices such as a mouse and numeric keypad to prevent use.

Attach it to a USB memory stick, lock it to prevent data extraction, and connect it to USB devices such as a mouse or numeric keypad to prevent usage. The dial's PIN can be set to a 3-digit number of your choice.

  • others
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

NetBloom Integrated Security

SAFE SECURITY

In the increasingly complex information society, attacks and destructive activities through networks continue unabated. The security requirements demanded of corporate activities are rapidly changing, and ensuring high safety for systems and networks is considered an increasingly important mission.

  • Firewall
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cybersecurity in the IoT Era

Detection of vulnerabilities in control systems and ensuring safety and robustness

A detailed explanation of specific efforts to improve security through the activities of the Control System Security Center! A thorough analysis of the characteristics and specific examples of cyber attacks on critical infrastructure and control systems, which are not widely publicized, along with detailed explanations of defense methods! An introduction to the technological trends in evaluation certification and standardization in the field of control systems, as well as the initiatives of related organizations!

  • Other Software
  • Other security systems
  • Internet System
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Device Security & Phone Support "Help Guardman"

Thoroughly guard against threats from information leaks and external viruses! We also provide support for maintenance and management after implementation via phone and remote assistance.

"Otasuke Guardman" is a service that protects the computers, smartphones, and tablets used by corporations from the threats of viruses and directly supports customers in resolving troubles on their computers. Additionally, when issues arise with computers or multi-devices, we provide support via phone and email to help resolve them. Please feel free to consult us about any device troubles at any time. 【Features】 ■ Deployment of PC matic MSP, a core security software, in key areas ■ Provision of online support via phone and remote access ■ Strong protection against information leaks and external virus threats ■ Support for maintenance and management after implementation via phone and remote access *For more details, please refer to the PDF document or feel free to contact us.

  • Customer Support
  • Firewall
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IP Camera Security 'Secula'

Simple yet high-functioning and high-quality! A design focused on usability, beautiful, and easy for anyone to use.

"Secula" is a series of NVR and IP cameras that makes setup from installation to recording, as well as remote viewing, very easy. The IP cameras are equipped with a variety of features. The NVR supports ONVIF, allowing for the connection of diverse cameras. It is user-friendly and also comes with our support, so even those without product knowledge can feel at ease. 【Features】 ■ 100,000 units sold / Comprehensive support ■ Easy to use, high functionality, high quality ■ Beautiful and user-friendly UI ■ High resolution supporting 4K ■ Recording settings are simple plug & play *For more details, please refer to the PDF materials or feel free to contact us.

  • Security cameras and surveillance systems
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

CSP's office security "BiZ Guard Revo"

We will propose suitable security systems for offices, stores, and tenants!

"BiZ Guard Revo" is a security product that focuses on the design of its equipment to make security feel more accessible, emphasizing interior aesthetics. The LCD screen features a touch panel, and all operation buttons are displayed on the screen. Additionally, the operator's video can be recorded in QQVGA quality up to 9,000 instances, QVGA quality up to 4,500 instances, and VGA quality up to 2,250 instances. [Features] ■ All operation buttons are displayed on the LCD screen ■ Installation time is about half of conventional methods ■ Optional camera connection allows for capturing the operator *For more details, please download the PDF or feel free to contact us.

  • Other security systems
  • Home Security
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web Security "i-FILTER"

We provide a safe work environment with "i-FILTER," which allows access only to secure websites.

**"White Operation of i-FILTER"** Unlike the conventional method of categorizing URLs that could be blocked, we achieve a "world where access is allowed only to safe websites" by registering the URLs of domestic websites that hit search engines, including content URLs, in the database through a method that categorizes all URLs. **"Measures Against Information Leakage from Within"** Over 2,700 domestic and international web services can be controlled for operations such as "login, writing, and uploading." Flexible policies can be set and applied according to departments and positions, enabling filtering that aligns with the organization's web access operational rules. **"New Feature: AI Chat Filter"** By flexibly controlling access to generative AI and visualizing and analyzing usage conditions, we create a safe usage environment. Additionally, by utilizing the function to display usage precautions, it is also possible to inform employees of the usage rules. *For more details, please download the PDF or feel free to contact us.*

  • Big Data
  • Firewall
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email Security "m-FILTER"

We provide a secure business environment with "m-FILTER," which only receives safe emails.

**"White Operation of m-FILTER"** The database of "m-FILTER" stores "IP addresses" and "email domains" of safe senders with over 99.90% reliability. Emails from safe senders registered in the database are received with minimal false positives, while emails from senders not registered in the database are assessed based on factors such as "macro presence" and "file extensions," allowing for accurate detection without oversight. **"Robust External Attack Countermeasures"** In addition to sender spoofing detection in white operations, it supports "SPF/DKIM/DAMRC" authentication, addressing email attacks with sophisticated sender spoofing. For attachment spoofing detection, it can assess files with macros and identify dangerous file extensions. It can also inspect the contents of password-protected ZIP files, which are frequently used in attacks. In category and content spoofing detection, it evaluates the URLs listed within the emails. **"Diverse Measures Against Misdelivery"** For outgoing emails, it is possible to flexibly set filtering rules tailored to the organization's operations based on criteria such as "what," "under what conditions," and "how."

  • Other Software
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information Leakage Countermeasures] Email Attachments are Dangerous! Recommended Solutions for Confidential Information

How to break away from the culture of "password-protected zip files," as introduced in the blog.

On November 17, 2020, Takeya Hirai, the Minister for Digital Reform, announced at a regular press conference that the use of "password-protected zip files" by central government employees when sending documents and other data via email would be abolished. This is likely to become a social issue involving private companies as well, and an increasing number of companies may struggle with essential security measures for file transmission to replace the current PPAP operation. Our blog explains why the PPAP operation does not provide encryption that guarantees security levels and what should be done to ensure security levels. [Contents] - What is a password-protected zip file (PPAP operation)? - Why is the PPAP operation problematic? - Why does the PPAP operation persist? - How should files be sent securely? - Summary *You can view the detailed content of the blog through the related links. Please feel free to contact us for more information. *You can download materials for the secure file exchange service "Crypto-bin."

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[File Transfer Service Case Study] Sumitomo Life Insurance Company

Achieve minimization of information risk due to misdelivery by utilizing a closed transmission function for the transfer of personal information of insurance subscribers (Crypto Mail).

We would like to introduce a case study of the implementation of "Crypto Delivery" at Sumitomo Life Insurance Mutual Company. Until now, the company has exchanged various business information with client companies using FD and MO, but the exchange of information via electronic media has been cumbersome and improvements are desired from the perspective of information security. Therefore, the company introduced our product starting in January 2015. In addition to reducing the costs and efforts associated with data transfer, the company has utilized features such as the "Closed Group" function, which allows file exchanges only among designated users, to establish a more efficient and robustly secured data transfer system. [Key Points] - Utilized the "Closed Transmission Function" for the transfer of personal information - Minimized the risk of information leakage due to misdelivery - Confirmed advantages in both security and cost aspects *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall
  • others
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[File Transfer Service Case] Aozora Bank

Send all documents encrypted with TLS! A case study of achieving secure file transfer (Crypto Delivery)

We would like to introduce a case study of the implementation of "Crypto Delivery" at Aozora Bank, Inc., which provides unique and highly specialized financial services to its customers. To ensure more secure file transmission to clients and others, the bank adopted this product in 2018. Not only does it encrypt and send important data such as customer information, but it also implements advanced security management systems required by financial institutions, including audit functions in case of emergencies. 【Key Points】 ■ Sends all documents, including large files, encrypted with TLS ■ Achieves secure file transfer suitable for financial institutions ■ In addition to enhancing security, strengthens and revamps the "file transfer system" from a business control perspective ■ Received feedback exceeding expectations after implementation, already deployed in 22 internal departments and 3 group companies *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall
  • others
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information Leakage Countermeasures] What Security is Required for File Sharing with External Parties

What is the noteworthy security product that protects files even at the destination? Explained in the column!

The spread of file sharing has brought renewed attention to "IRM (Information Rights Management)." IRM is a system that encrypts files and grants operation permissions to individual users, while also tracking usage at the destination. In this column, we will explain the fundamental knowledge, the background that necessitates it, and the points to consider when implementing IRM, which has become increasingly recognized as important with the proliferation of cloud storage and other technologies. [Contents] ■ The background for the attention on IRM and what can be done with IRM ■ The features of IRM that allow management of files even after they are sent *For more detailed content, please refer to the related links.

  • Other security systems
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

eBook Presentation! What Cyber Attack Countermeasures Are Required for Medical Institutions?

What is the current state of security surrounding medical institutions and what are the solutions? Explained in a blog!

Medical institutions handle very sensitive personal information, such as medical history. While measures to prevent information leaks remain an important ongoing issue, there has been a recent surge in cyberattacks. The entry point for these attacks is often the remote maintenance lines prepared for handling issues. In this blog, we will provide a detailed explanation of the current security situation surrounding medical institutions and potential solutions, incorporating case studies from hospitals. [Contents] 1) The current security situation surrounding medical institutions 2) Case study (Initiatives at Hospital A) <Challenge> The remote maintenance line is a "security loophole" <Countermeasure> Establishing access control and monitoring systems with SecureCube Access Check <Effect> Streamlining remote maintenance-related tasks and reducing the workload of responsible personnel 3) Achieving a safe and secure society with SecureCube AccessCheck *For more details, please refer to the related links.

  • Other security systems
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Data Security "ZENMU for Meister"

Prevent information leaks due to internal misconduct! Eliminate unauthorized use of permissions and privileges for information theft.

"ZENMU for Meister" is a solution that clearly separates system management from information management, achieving important "zoning" for information leakage prevention through an "invisible vault" that even system administrators cannot access data from. Without the access distribution key issued by the owner to users permitted to access the information, even with administrator privileges, access to the information is not possible. 【Features】 ■ Complete separation of "system management" and "information management" ■ Prevention of data tampering and information leakage due to privilege takeover ■ Protection of information even if all distributed fragments of meaningless data are leaked ■ "Decryption programs" are also managed in a distributed manner along with the "data" *For more details, please refer to the PDF document or feel free to contact us.

  • Other security systems
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Data Security "ZENMU for Delivery"

For sending and receiving important data or large volumes of data! Even if any fragment leaks during transport, the original data remains safe.

"ZENMU for Delivery" is a data security solution that allows you to easily and safely send and receive important and large data over the internet at a low cost. It reduces the hassle and cost of transmitting and transporting confidential data. Inexpensive public clouds can be used as transmission routes for confidential data. 【Features】 ■ Transforms the data you want to send into meaningless distributed fragments ■ No need for encryption, passwords, or dedicated lines during transmission ■ Sends distributed fragments via separate routes ■ Restores the original data from the received distributed fragments ■ No installation of dedicated software is required on the receiving side *For more details, please refer to the PDF document or feel free to contact us.

  • Other security systems
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Gateway Security "Check Point UTM"

Providing security measures on par with major corporations at an affordable price! 'Check Point UTM 1500 Series'

We offer the gateway security solution "Check Point UTM 1500 Series," which can counter various threats existing on the internet with multiple defense measures and block them before they reach the internal network. In addition to the firewall function that has been standard in traditional network security devices, it implements IPS, antivirus, anti-spam, application control, URL filtering, and anti-bot features. Moreover, it enables top-tier multi-layered defense in conjunction with UTM and endpoint security "F-Secure." 【Features】 ■ Gateway security functions ■ Top-level database: Quickly create and distribute definition files ■ Security reports: Visualize defense status ■ Managed services: Remote configuration changes can be handled *For more details, please download the PDF or feel free to contact us.

  • Firewall
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Enterprise Mobility+ Security

Centralized management of devices and apps! Protects access rights and operations for files and emails.

"Enterprise Mobility+Security" enables "ID management," "device and application management," "data protection," and "attack detection" for targeted attacks. With the shift to a work style that allows for working anytime and anywhere through the use of the cloud, there remain security concerns. We provide solutions for more secure operations. 【Features】 ■ Strengthen ID management and security with Azure AD Premium ■ Monitor devices and applications with MDM / MAM / MCM ■ Ensure safety with complete encryption of data taken outside *For more details, please refer to the PDF document or feel free to contact us.

  • Other Management Services
  • Firewall
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

【Case Study Presentation】SmartGate

Low cost and initial expenses starting from zero yen! Already compatible with many various cloud services.

"SmartGate" connects smart devices to web servers. It supports two-factor authentication, allowing authentication not only through ID/Password but also via the terminal ID of the smart device. It accommodates both BYOD and company-issued devices. As long as it is a web application that requires ID and password, it can generally be supported. Even web applications created in-house that are not listed in official support can be integrated. 【Features】 ■ Even with two or three devices, billing is done per ID, making it cost-effective. ■ Entering ID/Password does not allow unauthorized BYOD. ■ As a secure browser, it does not display URLs, and copying link URLs is not possible. ■ No files are left on the device. ■ The data center used is a major domestic vendor. *For more details, please refer to the PDF materials or feel free to contact us.

  • Other Software
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Store Security Comprehensive Catalog

Step ahead of your ideals! Featuring high-class security systems like the "ASD Smart System."

This catalog introduces "Store Security," handled by Koryinsha. It features a rich lineup including the standard model "Security Gate," which pursues stability, as well as the area protection anti-theft system "Wi-dimo" and "ASD Smart System." Please use this for selecting products. [Contents] ■ Security Gate ■ Security Gate / Air-C ■ Wi-dimo ■ ASD Smart System ■ Others (Showcase Guard) ■ Security Cameras *For more details, please refer to the PDF document or feel free to contact us.

  • Other security systems
  • Security Sensor Systems
  • Security devices
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

V3 Security for Business

Cloud-based endpoint security suitable for corporate PCs' security measures!

"V3 Security for Business" is a cloud-based endpoint security solution for businesses that employs six new detection technologies on a multidimensional analysis platform, enabling rapid detection of unknown new strains and variants of malware. Using evaluation information from the ASD server, it detects high-risk files during manual scans, and if it discovers files on the user PC that do not exist on the ASD server, it transfers those files to the ASD cloud. 【Features】 ■ High cost performance ■ An essential tool for the telework era ■ Verified high performance ■ Top-class achievements in endpoint security in South Korea *For more details, please download the PDF or feel free to contact us.

  • Security Assessment
  • Safety features

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration