Safety features Product List and Ranking from 45 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 24, 2025~Oct 21, 2025
This ranking is based on the number of page views on our site.

Safety features Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 24, 2025~Oct 21, 2025
This ranking is based on the number of page views on our site.

  1. 昭電 Tokyo//others
  2. セントラル警備保障 Tokyo//Building Management
  3. 日本ロックサービス Tokyo//Trading company/Wholesale
  4. 4 フーバーブレイン Tokyo//Information and Communications
  5. 4 アイマトリックス Kanagawa//Information and Communications

Safety features Product ranking

Last Updated: Aggregation Period:Sep 24, 2025~Oct 21, 2025
This ranking is based on the number of page views on our site.

  1. Security "Trap-type Fence Sensor" 昭電
  2. CSP's office security "BiZ Guard Revo" セントラル警備保障
  3. Eye"247" Safety Zone FSAV V フーバーブレイン
  4. 4 Home security with smart devices SpaceCore 日本ロックサービス
  5. 5 Web Security "i-FILTER" デジタルアーツ 本社

Safety features Product List

61~75 item / All 81 items

Displayed results

Web Security "i-FILTER Ver.10"

A safe business environment on the web without the need to be aware of security. Web security with numerous implementation results.

The database of "i-FILTER" has changed from a method of categorizing URLs that could potentially be blocked to a method of categorizing various URLs starting from version 10. By registering the URLs of domestic websites that hit on search engines, including content URLs, it exposes and blocks communications with hidden locations of C&C servers in address spaces such as the "darknet" and "deep web," which cannot be searched on search engines. It also prevents Drive By Download attacks that infect users just by visiting a site by blocking the download of malware directly embedded in the site. 【Features】 ■ User management and operational rule settings according to organization and position ■ A range of functions developed through numerous successful implementations to accommodate complex custom settings ■ Creation of unique URL categories using existing URL lists ■ Support for IT education for users through daily access ■ Capability to handle dynamic content with a uniquely developed shared cache mechanism *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

WEBROOT is a lightweight, high-speed, fully cloud-based real-time security solution.

Choose full cloud security that enables real-time defense against threats and protects businesses and homes in an interconnected world.

"Webroot Antivirus" is a fast and lightweight security system powered by full cloud technology. It does not take time to download or update definition files. Furthermore, it can quickly respond to the latest and unknown threats. 【Features】 ■ Full cloud-based security performs checks by querying the cloud instead of processing on the device. ■ By conducting checks in the cloud, the burden on the device is reduced, which does not affect performance. ■ Downloading malware definition files is unnecessary. ■ Installation time: 1.94 seconds (average of other companies: 98.24 seconds) ■ Initial scan memory usage: 71.78MB (average of other companies: 448.08MB) ■ Installation size: 32.82MB (average of other companies: 1159.03MB) ■ Scheduled scan time: 34.75 seconds (average of other companies: 199.89 seconds) ■ Memory usage during system idle: 42.03MB (average of other companies: 219.20MB) *For more details, please refer to the PDF document or feel free to contact us.

  • WEBROOT2.png
  • WEBROOT3.png
  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Factory Security Menu

Solutions tailored to customer needs! Achieving "total security for factories."

At Nippon Steel & Sumitomo Metal Corporation, we combine solutions tailored to our customers' needs, regardless of the manufacturer, to achieve "total security for factories." By managing access to and from hazardous areas and tracking personnel locations, we support the safety of workers. In boundary security, we monitor suspicious individuals and vessels using sensors and cameras. Additionally, in access management, we can implement measures to prevent tailgating, enable multi-person authentication, and restrict access to specific areas according to security levels. 【Security Menu】 ■ Application of various devices ■ Safety ■ Flow management ■ Boundary security for site perimeters and ports ■ Boundary security for access gates (people) *For more details, please refer to the PDF document or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Computer Security "Ilton Basic"

No annual contract restrictions, one-time purchase model! A must-have product for companies with a Privacy Mark!

"Irton Basic" is a computer security solution that you can use immediately after purchase. It automatically locks the screen when you step away from the computer and automatically logs you in when you approach. It is an essential product for companies that have obtained the Privacy Mark. There are no renewal procedures for the contract; it is offered as a one-time purchase model. The card's battery lasts for over two years, allowing you to use it until the battery runs out. 【Features】 ■ Automatic lock ■ Focused on login ■ Easy setup, available for immediate use ■ No annual contract restrictions ■ One-time purchase model *For more details, please refer to the PDF document or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Blog] Introduction to Web Performance: SSL and Web Security

Understanding the essential SSL! Introducing on the blog why SSL is necessary and more.

The internet is a continuously expanding warehouse of data. This data includes both publicly available information and personal or confidential data that should only be accessible to authorized individuals (at least that is how it should be). There are numerous ways for hackers to eavesdrop on and tamper with this data, and the World Wide Web cannot guarantee the safety of data, so you must ensure that your data is transmitted and stored securely. Customers of online shops and banking sites are particularly vulnerable to hackers, making data encryption more important than ever, serving as the first line of defense against cyber attacks. 【Overview】 ■ The big picture ■ SSL or TLS? ■ Why SSL is necessary ■ How to implement SSL ■ How SSL works *You can view the detailed content of the blog through the related links. For more information, please feel free to contact us.

  • Access analysis tools
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Blog] Zero Trust Security Model for Email

Let's implement a security model of 'Trust but Verify'! Introduction to the blog.

Email threats are evolving beyond the delivery of malicious links and attachments. As a result, companies are beginning to apply a zero-trust security model to email. Nowadays, attackers may impersonate the sender to deceive the recipient and launch social engineering attacks. Most of these attacks do not involve sending malware, and since these emails do not contain identifiable dangerous elements, even advanced email security gateways and defenses can be easily bypassed. *You can view the detailed content of the blog through the related link. For more information, please feel free to contact us.*

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[English Research Report] Cloud Workload Security

The CNAPP market is expected to grow by 42% in the second quarter of 2024, with multi-cloud and AI-based security features expanding the market to approximately $700 million.

The "Cloud Workload Security Leading Research Report" by Dell'Oro Group provides a comprehensive industry overview of the CNAPP market since 2019. This report includes the following quarterly data tables: ● CNAPP revenue by manufacturer by region: North America, EMEA (Europe, Middle East, Africa), Asia-Pacific excluding China, China, CALA (Caribbean and Latin America) ● CNAPP revenue by development, deployment, and runtime technologies This report includes the following annual data tables: ■ 5-year regional revenue forecast for CNAPP ■ 5-year revenue forecast for CNAPP (by development, deployment, and runtime technologies)

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email Security "Vade for M365"

We will strengthen the email security of Microsoft 365, which is prone to attacks.

"Vade for M365" is a cutting-edge email security solution that has been adopted by the filtering services of the three major carriers in Japan. Utilizing over 1 billion mailbox data, which is among the largest in the world, our AI-driven threat detection capabilities and architecture that resolves the challenges of traditional email security all come together with simple operations through API integration with Microsoft 365. We invite you to experience it. [Features] ■ Overcoming challenges of existing email security ■ High detection rate ■ Simple verification, implementation, and operational management *For more details, please download the PDF or feel free to contact us.

  • Other security systems
  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The necessity of email security

You may be required to provide all your information! Over 90% of cyber crimes are triggered by emails!

Email-based attacks have been a popular target for cybercriminals since the early stages of email proliferation, as they can be relatively easy to create and execute. These include common email security threats to consumers and businesses, such as "phishing," "malware," and "business email compromise." Since email serves as an attack vector, protecting email has become crucial for the health, reputation, and future of companies and organizations. [Summary of Damage] ■ Most threats involve "phishing for personal information." ■ The number of phishing scams increased in 2020 → Increased internet usage at home due to the COVID-19 pandemic. ■ Used in ransomware and targeted attacks → Viruses embedded in email attachments or links. ■ Sophistication of business email compromise (BEC) → Content has become more sophisticated (e.g., related to COVID-19), making it difficult to spot unnatural elements. *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall
  • Other security systems
  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Eye "247" AntiMalware USAV IV

Multi-layered defense measures against information leakage suitable for small and medium-sized enterprises.

We offer the "Eye '247' AntiMalware USAV IV," which implements a multi-layered defense security system to protect corporate information assets from external and internal threats. By utilizing the standard "Remote Access VPN" feature included with this product, you can perform communication checks similar to those in an internal environment even when working outside the office. Even during telework, you can conduct business in a security environment comparable to being in the office, thanks to triple protection through endpoint security and business visibility. 【Features】 ■ Automatically executed on a regular basis ■ Data protection in a secure area ■ Easy recovery ■ Common backup settings for all devices managed by the Manager ■ Individual backup settings can also be configured on the client, etc. *For more details, please download the PDF or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Solar Power Plant Security

Leave the security measures for solar power plants to Albatec.

We are implementing various security measures in our solar power generation facilities, clarifying operational issues and making improvements.

  • Solar power generation

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Voltage Security

It is a "deep discharge prevention device (battery protector)" that prevents the battery from "going up."

● While using electrical equipment, when the sub-battery voltage drops to a certain level, it automatically cuts off the power supply to prevent "over-discharge" of the battery with the "over-discharge prevention device (battery protector)." ● When the battery is charged and the voltage recovers, the power supply will automatically restore itself. ● It is also possible to alert you to voltage drops with a separately sold buzzer. ● By using it in conjunction with a battery separator, both the main and sub batteries can be protected. * A bimetal fuse of 50A x 1 piece is required. * It is not compatible with lithium-ion batteries.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Electronic lock "TOUCH/TOUCH HOOK" dual authentication security

RFID-compatible retrofit electronic lock. Installation time only 30 minutes!

The electronic lock "TOUCH / TOUCH HOOK" allows for enhanced security with dual authentication. It can be retrofitted to almost any door, and TOUCH HOOK can also be installed on sliding doors. By simply attaching the included IC seal, everyday items can be transformed into keys. Individual registration and deletion of IC cards are possible, so in the event of a lost card, only the relevant card can be registered or deleted. A one-time PIN that can only be used once is convenient for guest visits. ◆ Useful in the following situations A woman living alone who receives home care. It is difficult to go to the front door to open it every time a caregiver arrives. → TOUCH / TOUCH HOOK can be retrofitted to almost any door. By communicating a PIN or one-time PIN to the caregiver, there is no need to go to the front door every time. If the auto-lock function is used, there is no need to go lock the door when the caregiver leaves. If an IC card is given, individual registration and deletion can be done, so even if the caregiver changes, it is safe as long as the relevant card is deleted, even if the card cannot be retrieved. *For more product details, please download and view the catalog.

  • Security locks (windows, front doors, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Home security with smart devices SpaceCore

Easily achieve home security with smart locks and cameras. Your smartphone becomes the "key" and "surveillance camera"!

You can control home appliances and equipment with an app, automating operations that were previously done manually, making daily life significantly more convenient. The anxiety of "Did I lock the door?" is eliminated! You can check the status of the lock and operate it from your smartphone while you are out. Of course, you can unlock it without a key as well. If there is any suspicious opening or closing of the front door or windows, the app will immediately notify you, allowing you to assess the situation through security camera footage on your smartphone and respond quickly. The indoor camera can be operated horizontally and vertically, allowing you to monitor a wide area.

  • 屋内カメラ INDOOR-CAMERA画像-1.jpg
  • セキュリティイメージ画像.png
  • ダナパッド Danapad画像-2.jpg
  • ダナロック Danalock-V3画像-1.jpg
  • ドア窓センサ Door-Window-Sensor画像-1.jpg
  • ロックプロ LOCK-Pro画像-1.jpg
  • スマホ画像device_img01.png
  • Security devices
  • Security locks (windows, front doors, etc.)
  • Security cameras and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information Leakage Countermeasures] What are effective methods to prevent email misdelivery?

Email misdelivery, which is a major cause of security incidents. This column explains it, including how to deal with it afterwards!

Email misdelivery is mostly due to minor human errors. On the other hand, it is always cited as a leading security incident. It is a highly risky issue that can lead to serious accidents. This column explains what to consider when addressing email misdelivery, effective countermeasures, and how to respond when a misdelivery actually occurs. [Contents] - Why does email misdelivery persist? - What are effective measures against misdelivery? - What to do when a misdelivery occurs *For more details, you can view the related links.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration