Safety features Product List and Ranking from 45 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Aug 06, 2025~Sep 02, 2025
This ranking is based on the number of page views on our site.

Safety features Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Aug 06, 2025~Sep 02, 2025
This ranking is based on the number of page views on our site.

  1. 昭電 Tokyo//others
  2. フーバーブレイン Tokyo//Information and Communications
  3. セントラル警備保障 Tokyo//Building Management
  4. 4 シー・ティ・マシン Osaka//Building materials, supplies and fixtures manufacturers 大阪本社
  5. 5 グローバルセンター Tokyo//Renovation and home construction industry 営業本部

Safety features Product ranking

Last Updated: Aggregation Period:Aug 06, 2025~Sep 02, 2025
This ranking is based on the number of page views on our site.

  1. Network Security "FOX-IT Data Diode" 昭電
  2. Eye"247" Safety Zone FSAV V フーバーブレイン
  3. Security "Trap-type Fence Sensor" 昭電
  4. 4 CSP's office security "BiZ Guard Revo" セントラル警備保障
  5. 5 Cybersecurity: Deceptions Everywhere シー・ティ・マシン 大阪本社

Safety features Product List

16~30 item / All 77 items

Displayed results

IP Camera Security 'Secula'

Simple yet high-functioning and high-quality! A design focused on usability, beautiful, and easy for anyone to use.

"Secula" is a series of NVR and IP cameras that makes setup from installation to recording, as well as remote viewing, very easy. The IP cameras are equipped with a variety of features. The NVR supports ONVIF, allowing for the connection of diverse cameras. It is user-friendly and also comes with our support, so even those without product knowledge can feel at ease. 【Features】 ■ 100,000 units sold / Comprehensive support ■ Easy to use, high functionality, high quality ■ Beautiful and user-friendly UI ■ High resolution supporting 4K ■ Recording settings are simple plug & play *For more details, please refer to the PDF materials or feel free to contact us.

  • Security cameras and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

CSP's office security "BiZ Guard Revo"

We will propose suitable security systems for offices, stores, and tenants!

"BiZ Guard Revo" is a security product that focuses on the design of its equipment to make security feel more accessible, emphasizing interior aesthetics. The LCD screen features a touch panel, and all operation buttons are displayed on the screen. Additionally, the operator's video can be recorded in QQVGA quality up to 9,000 instances, QVGA quality up to 4,500 instances, and VGA quality up to 2,250 instances. [Features] ■ All operation buttons are displayed on the LCD screen ■ Installation time is about half of conventional methods ■ Optional camera connection allows for capturing the operator *For more details, please download the PDF or feel free to contact us.

  • Other security systems
  • Home Security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web Security "i-FILTER"

We provide a safe work environment with "i-FILTER," which allows access only to secure websites.

**"White Operation of i-FILTER"** Unlike the conventional method of categorizing URLs that could be blocked, we achieve a "world where access is allowed only to safe websites" by registering the URLs of domestic websites that hit search engines, including content URLs, in the database through a method that categorizes all URLs. **"Measures Against Information Leakage from Within"** Over 2,700 domestic and international web services can be controlled for operations such as "login, writing, and uploading." Flexible policies can be set and applied according to departments and positions, enabling filtering that aligns with the organization's web access operational rules. **"New Feature: AI Chat Filter"** By flexibly controlling access to generative AI and visualizing and analyzing usage conditions, we create a safe usage environment. Additionally, by utilizing the function to display usage precautions, it is also possible to inform employees of the usage rules. *For more details, please download the PDF or feel free to contact us.*

  • Big Data
  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email Security "m-FILTER"

We provide a secure business environment with "m-FILTER," which only receives safe emails.

**"White Operation of m-FILTER"** The database of "m-FILTER" stores "IP addresses" and "email domains" of safe senders with over 99.90% reliability. Emails from safe senders registered in the database are received with minimal false positives, while emails from senders not registered in the database are assessed based on factors such as "macro presence" and "file extensions," allowing for accurate detection without oversight. **"Robust External Attack Countermeasures"** In addition to sender spoofing detection in white operations, it supports "SPF/DKIM/DAMRC" authentication, addressing email attacks with sophisticated sender spoofing. For attachment spoofing detection, it can assess files with macros and identify dangerous file extensions. It can also inspect the contents of password-protected ZIP files, which are frequently used in attacks. In category and content spoofing detection, it evaluates the URLs listed within the emails. **"Diverse Measures Against Misdelivery"** For outgoing emails, it is possible to flexibly set filtering rules tailored to the organization's operations based on criteria such as "what," "under what conditions," and "how."

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information Leakage Countermeasures] Email Attachments are Dangerous! Recommended Solutions for Confidential Information

How to break away from the culture of "password-protected zip files," as introduced in the blog.

On November 17, 2020, Takeya Hirai, the Minister for Digital Reform, announced at a regular press conference that the use of "password-protected zip files" by central government employees when sending documents and other data via email would be abolished. This is likely to become a social issue involving private companies as well, and an increasing number of companies may struggle with essential security measures for file transmission to replace the current PPAP operation. Our blog explains why the PPAP operation does not provide encryption that guarantees security levels and what should be done to ensure security levels. [Contents] - What is a password-protected zip file (PPAP operation)? - Why is the PPAP operation problematic? - Why does the PPAP operation persist? - How should files be sent securely? - Summary *You can view the detailed content of the blog through the related links. Please feel free to contact us for more information. *You can download materials for the secure file exchange service "Crypto-bin."

  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[File Transfer Service Case Study] Sumitomo Life Insurance Company

Achieve minimization of information risk due to misdelivery by utilizing a closed transmission function for the transfer of personal information of insurance subscribers (Crypto Mail).

We would like to introduce a case study of the implementation of "Crypto Delivery" at Sumitomo Life Insurance Mutual Company. Until now, the company has exchanged various business information with client companies using FD and MO, but the exchange of information via electronic media has been cumbersome and improvements are desired from the perspective of information security. Therefore, the company introduced our product starting in January 2015. In addition to reducing the costs and efforts associated with data transfer, the company has utilized features such as the "Closed Group" function, which allows file exchanges only among designated users, to establish a more efficient and robustly secured data transfer system. [Key Points] - Utilized the "Closed Transmission Function" for the transfer of personal information - Minimized the risk of information leakage due to misdelivery - Confirmed advantages in both security and cost aspects *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[File Transfer Service Case] Aozora Bank

Send all documents encrypted with TLS! A case study of achieving secure file transfer (Crypto Delivery)

We would like to introduce a case study of the implementation of "Crypto Delivery" at Aozora Bank, Inc., which provides unique and highly specialized financial services to its customers. To ensure more secure file transmission to clients and others, the bank adopted this product in 2018. Not only does it encrypt and send important data such as customer information, but it also implements advanced security management systems required by financial institutions, including audit functions in case of emergencies. 【Key Points】 ■ Sends all documents, including large files, encrypted with TLS ■ Achieves secure file transfer suitable for financial institutions ■ In addition to enhancing security, strengthens and revamps the "file transfer system" from a business control perspective ■ Received feedback exceeding expectations after implementation, already deployed in 22 internal departments and 3 group companies *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information Leakage Countermeasures] What Security is Required for File Sharing with External Parties

What is the noteworthy security product that protects files even at the destination? Explained in the column!

The spread of file sharing has brought renewed attention to "IRM (Information Rights Management)." IRM is a system that encrypts files and grants operation permissions to individual users, while also tracking usage at the destination. In this column, we will explain the fundamental knowledge, the background that necessitates it, and the points to consider when implementing IRM, which has become increasingly recognized as important with the proliferation of cloud storage and other technologies. [Contents] ■ The background for the attention on IRM and what can be done with IRM ■ The features of IRM that allow management of files even after they are sent *For more detailed content, please refer to the related links.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Data Security "ZENMU for Meister"

Prevent information leaks due to internal misconduct! Eliminate unauthorized use of permissions and privileges for information theft.

"ZENMU for Meister" is a solution that clearly separates system management from information management, achieving important "zoning" for information leakage prevention through an "invisible vault" that even system administrators cannot access data from. Without the access distribution key issued by the owner to users permitted to access the information, even with administrator privileges, access to the information is not possible. 【Features】 ■ Complete separation of "system management" and "information management" ■ Prevention of data tampering and information leakage due to privilege takeover ■ Protection of information even if all distributed fragments of meaningless data are leaked ■ "Decryption programs" are also managed in a distributed manner along with the "data" *For more details, please refer to the PDF document or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Data Security "ZENMU for Delivery"

For sending and receiving important data or large volumes of data! Even if any fragment leaks during transport, the original data remains safe.

"ZENMU for Delivery" is a data security solution that allows you to easily and safely send and receive important and large data over the internet at a low cost. It reduces the hassle and cost of transmitting and transporting confidential data. Inexpensive public clouds can be used as transmission routes for confidential data. 【Features】 ■ Transforms the data you want to send into meaningless distributed fragments ■ No need for encryption, passwords, or dedicated lines during transmission ■ Sends distributed fragments via separate routes ■ Restores the original data from the received distributed fragments ■ No installation of dedicated software is required on the receiving side *For more details, please refer to the PDF document or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Gateway Security "Check Point UTM"

Providing security measures on par with major corporations at an affordable price! 'Check Point UTM 1500 Series'

We offer the gateway security solution "Check Point UTM 1500 Series," which can counter various threats existing on the internet with multiple defense measures and block them before they reach the internal network. In addition to the firewall function that has been standard in traditional network security devices, it implements IPS, antivirus, anti-spam, application control, URL filtering, and anti-bot features. Moreover, it enables top-tier multi-layered defense in conjunction with UTM and endpoint security "F-Secure." 【Features】 ■ Gateway security functions ■ Top-level database: Quickly create and distribute definition files ■ Security reports: Visualize defense status ■ Managed services: Remote configuration changes can be handled *For more details, please download the PDF or feel free to contact us.

  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Enterprise Mobility+ Security

Centralized management of devices and apps! Protects access rights and operations for files and emails.

"Enterprise Mobility+Security" enables "ID management," "device and application management," "data protection," and "attack detection" for targeted attacks. With the shift to a work style that allows for working anytime and anywhere through the use of the cloud, there remain security concerns. We provide solutions for more secure operations. 【Features】 ■ Strengthen ID management and security with Azure AD Premium ■ Monitor devices and applications with MDM / MAM / MCM ■ Ensure safety with complete encryption of data taken outside *For more details, please refer to the PDF document or feel free to contact us.

  • Other Management Services
  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Store Security Comprehensive Catalog

Step ahead of your ideals! Featuring high-class security systems like the "ASD Smart System."

This catalog introduces "Store Security," handled by Koryinsha. It features a rich lineup including the standard model "Security Gate," which pursues stability, as well as the area protection anti-theft system "Wi-dimo" and "ASD Smart System." Please use this for selecting products. [Contents] ■ Security Gate ■ Security Gate / Air-C ■ Wi-dimo ■ ASD Smart System ■ Others (Showcase Guard) ■ Security Cameras *For more details, please refer to the PDF document or feel free to contact us.

  • Other security systems
  • Security Sensor Systems
  • Security devices

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

V3 Security for Business

Cloud-based endpoint security suitable for corporate PCs' security measures!

"V3 Security for Business" is a cloud-based endpoint security solution for businesses that employs six new detection technologies on a multidimensional analysis platform, enabling rapid detection of unknown new strains and variants of malware. Using evaluation information from the ASD server, it detects high-risk files during manual scans, and if it discovers files on the user PC that do not exist on the ASD server, it transfers those files to the ASD cloud. 【Features】 ■ High cost performance ■ An essential tool for the telework era ■ Verified high performance ■ Top-class achievements in endpoint security in South Korea *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

EDR: Industry's highest detection rate 'HarmonyEndpoint'

Achieve the industry's best detection rate with CheckPoint's ThreatCloud, the most powerful threat intelligence in the world!

The "HarmonyEndpoint" that we handle is a comprehensive endpoint security environment built to protect remote workers from today's complex threat landscape. It defends against the most pressing threats to endpoints, such as ransomware, phishing, and malware downloaded through drive-by attacks, while rapidly minimizing the impact of breaches through autonomous detection and response. 【Key Product Benefits】 <Comprehensive Endpoint Protection> Defends against the most pressing threats to endpoints. <Fastest Recovery> Automates 90% of attack detection, investigation, and remediation tasks. <Best TCO> Achieves all necessary endpoint protection in a single, efficient, and cost-effective solution. *For more details, please download the PDF or contact us.

  • Other security systems
  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration