We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security Solutions.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security Solutions Product List and Ranking from 68 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Oct 15, 2025~Nov 11, 2025
This ranking is based on the number of page views on our site.

Security Solutions Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Oct 15, 2025~Nov 11, 2025
This ranking is based on the number of page views on our site.

  1. アイ・ビー・エス・ジャパン Kanagawa//IT/Telecommunications
  2. ダルトン Tokyo//Industrial Machinery
  3. ピーエスアイ 本社 Tokyo//IT/Telecommunications
  4. 4 サブゲート Tokyo//IT/Telecommunications
  5. 5 旭電通 Tokyo//Trading company/Wholesale

Security Solutions Product ranking

Last Updated: Aggregation Period:Oct 15, 2025~Nov 11, 2025
This ranking is based on the number of page views on our site.

  1. Moxa's OT security solutions アイ・ビー・エス・ジャパン
  2. Research Facility Fireproof Chemical Storage Cabinet ダルトン
  3. Security Switch "LG1000" 旭電通
  4. 4 Security solution "NISG 3,000 Series" トータルリンク
  5. 5 Security Switch "TiFRONT (Cloud Management Model)" ピーエスアイ 本社

Security Solutions Product List

1~15 item / All 100 items

Displayed results

Acid-resistant resin chemical storage cabinet Model No. M3105S-W385LM

Made of high-density polyethylene with excellent chemical resistance. It can be washed thoroughly, allowing for hygienic use.

Made of high-density polyethylene with excellent chemical resistance. It can be washed thoroughly, allowing for clean use. Due to its very sturdy one-piece molding, the top of the cabinet can also be used as a workspace.

  • Food storage equipment and facilities

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Switch "TiFRONT (Cloud Management Model)"

Simply connect for safety—no complicated setup required to get started! We provide a secure network even in locations without dedicated engineers, such as regional bases and retail stores!

The security switch "TiFRONT" is a cloud-managed model of security switch. This product can be easily connected by simply taking it out of the box, plugging in the power cable, and connecting the Ethernet. It can provide a secure network even in locations such as regional offices and retail stores where there are no dedicated engineers. No management server is required, and it can be used immediately once the decision to implement it is made. Additionally, it features an automatic security report generation function, real-time creation, and the ability to manage schedules (daily, weekly, monthly, hourly), allowing for efficient reporting tasks. 【Features】 ■ Easy and safe to use, no dedicated engineers required ■ Automatic port blocking to prevent loops ■ Cloud management with no need for management or labor ■ L2 switch-based network security ■ Automatically blocks only unauthorized communications *For more details, please refer to the PDF document or feel free to contact us.

  • Embedded Board Computers
  • Routers, Switches, and Hubs
  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security solution "CheckPoint" for small and medium-sized enterprises.

Easy operation with a sophisticated settings screen! We provide security features developed for enterprises.

"INFINITY" is a security solution for small and medium-sized enterprises that achieves high reliability in security while keeping operational costs low. Since a high level of security can be realized with a single device, a cost-effective total security solution is possible. It provides security features developed for enterprises. [Features] ■ Easy to implement ■ Simple operation with a sophisticated configuration screen ■ Comprehensive security measures ■ Reports that make security "visible" ■ High level of security achieved with a single device *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security and surveillance systems
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

WiSAS NORA

It is a service that particularly focuses on "rogue" Wi-Fi among the WiSAS constant monitoring solutions.

The wireless network (Wi-Fi) environment automatically detects security threats 24 hours a day, 365 days a year, based on two factors: signal strength and duration of stay, protecting critical corporate data. It is also possible to automatically block threats based on settings. An alert will be issued if an unauthorized access point (AP) outside of management is discovered. Constant monitoring of unauthorized Wi-Fi usage that directly leads to information leaks: - Permanently installed APs: A list of unverified wireless APs that are permanently installed and detection of connected devices. - Temporarily used APs: A list of unverified wireless APs that have been used temporarily, usage history, and detection of connected devices.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Moxa's OT security solutions

Targeted OT networks. How to protect the "invisible areas" of the manufacturing site.

Cyber attacks are spreading to control systems, targeting "invisible areas" such as SCADA, PLCs, and remote I/O. Moxa's OT security solutions address risks at each level, from management to field layers. Compliant with IEC 62443, they can establish robust multi-layer defenses tailored to the site. ▼ Features - Visualization software for OT networks to monitor abnormal communications and topology - Secure routers and IPS/IDS to balance communication control and attack prevention - IEC-compliant L2/L3 switches to achieve boundary defense between segments - Protection against intrusion paths to endpoint devices through remote I/O and gateways - Designed for optimal performance in OT applications, including long-term supply and harsh environment compatibility IBS Japan offers product proposals and technical support tailored to the manufacturing and infrastructure sectors. We are currently providing a "checklist" to assess your own security measures and a white paper on OT security! Please download and utilize these resources as the first step in reviewing your site's security.

  • 0903_ipors_2.jpg
  • 0903_ipors_3.jpg
  • 0903_ipors_4.jpg
  • 0903_ipors_5.jpg
  • 0903_ipors_6.jpg
  • 0903_ipors_7.jpg
  • 0903_ipors_8.jpg
  • Firewall and intrusion prevention
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Research Facility Fireproof Chemical Storage Cabinet

Protects the life of the operator. Achieved in a space-saving design. Fireproof storage cabinet to prevent the spread of fire.

This is a fireproof chemical storage cabinet that can minimize the impact on buildings and prevent secondary disasters by preventing chain reactions and explosions during a fire. It can be installed close to the work area to save space, eliminating the need to walk a long distance to the storage cabinet. For more details, please contact us or download the catalog.

  • Office furniture

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A handbook for protecting IoT gateways from cyber attacks.

IoT gateways that are susceptible to threats such as hacking. Introducing Advantech's integrated hardware/software security products.

The gateway is a crucial point for collecting data in all connection applications, making the security of gateways extremely important in the IoT ecosystem. Advantech provides security solutions and services that integrate hardware and software for IoT gateways to address the increasing global cyberattacks and to understand the vulnerabilities in information security for industrial applications. ◆ Data & System Security ◆ Identity & Access Control ◆ Remote Updates & Secure Boot ◆ Threat Detection & Recovery

  • スライド2.JPG
  • スライド9.JPG
  • スライド12.JPG
  • スライド13.JPG
  • Industrial PCs
  • Embedded Board Computers

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IEC 61162-460 Cybersecurity Switch for Ships

IEC 60945, IEC 61162-460 Edition 3 compliant cybersecurity switch for ships

The 1Gbps x 24-port managed LAN switch is the world's first Layer 3 network switch compliant with the IEC61162-460 standard. The configuration includes IPv4/IPv6 multicast and prioritization of specific ports using VLAN and QoS.

  • Routers, Switches, and Hubs

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Data] Telework Security Enhancement Checklist

With the shift to remote work, we would like to review! Introducing key points of employee training with explanations.

This document introduces six security challenges and countermeasures to consider when implementing remote work. It includes a checklist of security measures that security personnel should be aware of, along with explanations for each item. Additionally, it covers key points for employee security training and security measures utilizing OS protection. This book serves as a useful reference when considering the introduction of remote work, so please make use of it. [Contents (Excerpt)] ■ Chapter 1: Six Telework Security Measures to Prevent Information Leakage (Checklist) ■ Chapter 2: Improving Employee Security Literacy: Key Points for "Training" ■ Chapter 3: Preparing for the Unexpected: Border Control Measures Using OS Protection *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Company Information [JSecurity Co., Ltd.]

Providing peace of mind to all businesses with security solutions recognized by the world!

JSecurity Co., Ltd. provides solutions that contribute to Japan's IT security under the slogan "All for Japan Security." We offer a lineup of email security products, including measures against spam, virus emails, email sanitization, and prevention of email misdelivery, as well as information security products for small and medium-sized enterprises that are affordable and easy to implement and operate. Our main business focuses on the development and sales of information security products that cover a wide range from networks to endpoints. [Business Description] ■ Development and sales of information security products and services *For more details, please refer to the PDF document or feel free to contact us.*

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introduction to Network and Cybersecurity Learning Kit for the DX Era

This is a "Network & Security" educational learning kit. It includes workshop texts and offers thorough and attentive instruction both online and in-person (with actual transportation costs for remote locations).

You can learn the fundamentals of communication technologies such as the internet, which is the foundation of cloud/SNS and the core of DX promotion, as well as 5G mobile phones and next-generation Wi-Fi. We offer a course that teaches the basics of security through specific examples, including exercises and experiences, providing hints for your company's response. Furthermore, we will introduce the latest security technologies, such as endpoint security (EDR) and human security, to prevent information leaks from increasing ransomware incidents. - Ideal for new employee training in industrial high schools, universities, and companies! - We provide a course that teaches the basics of security through specific examples, including exercises and experiences, offering hints for your company's response. - We will also introduce security technologies such as endpoint security (EDR) to prevent information leaks. - Texts tailored to the instructor can also be edited (optional). - On-site training is available; please consult us. 【Course Overview】 ■ Overview of Information Security ■ Mechanisms of Network Communication ■ Experience Unauthorized Access ■ Network Security Measures ■ Overview of Security Technologies (such as Endpoint Security) *For more details, please feel free to contact us.

  • Business Skills Seminar

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security solutions for factories

We have prepared a plan to automate the lending and storage of keys within the factory, enabling improved operational efficiency and history management.

We provide "Security Solutions for Factories." Our plans include security gates that regulate entry and exit for unauthorized individuals, allowing for management of entry and exit history and attendance tracking. We offer a lineup of security-focused products, such as "Security Gates" for managing the entry and exit of individuals, "Perimeter Security Monitoring Systems," and "Key Management Devices." Please feel free to contact us when you need assistance. 【Implementation Plans】 ■ Security gates regulate entry and exit for unauthorized individuals, enabling management of entry and exit history and attendance tracking. ■ With security monitoring systems and camera surveillance systems, detection and monitoring of suspicious individuals is possible, enhancing the efficiency of security operations. ■ By automating the lending and storage of keys within the factory, we enable improved operational efficiency and history management. *For more details, please refer to the PDF document or feel free to contact us.

  • Entrance and exit control system
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security solution

From design to post-implementation operation! We provide a comprehensive physical security system.

We would like to introduce the security solutions we offer. Focusing on systems that have succeeded in the large markets of Europe and the United States, where the history of physical security is long, we carry out integration development to meet domestic needs. We provide camera solutions, access control/integrated management systems, anti-shoplifting tags, IoT solutions, and maintenance support. Please feel free to contact us when you need assistance. 【Security Solutions (Partial)】 <Camera Solutions> ■HIKVISION ■GFDesign ■EZVIZ ■i-PRO *For more details, please refer to the related links or feel free to contact us.

  • Surveillance Camera System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Solutions Catalog 2020 Winter

Featuring cloud-based automated vulnerability assessment services and annual monitoring web application assessment services!

This catalog introduces the security solutions offered by our company. It features a rich lineup, including the cloud-based automatic vulnerability assessment service "SCT SECURE Cloud Scan" and "netsparker," which diagnoses web applications from cloud environments. Please use this for selecting products. [Contents (partial)] ■ SCT SECURE Cloud Scan ■ SCT SECURE Manual Web Application Assessment ■ netsparker ■ Gred Security Services ■ McAfee SECURE *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Server monitoring and network management tools
  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Net Agent Co., Ltd. Introduction to Automotive Security Inspection Services

Automotive security inspection service to counter malicious hackers!

This service is an automotive security inspection service that supports the improvement of security levels as a product. Our proud white-hat hacker team conducts penetration tests from an attacker's perspective on vehicles to identify potential risks. If you have any questions about automotive security, please consult us. 【Features】 ■ Supports the improvement of security levels as a product ■ Conducts penetration tests from an attacker's perspective on vehicles ■ Investigates existing potential security weaknesses *For more details, please refer to the catalog or feel free to contact us.

  • Other security and surveillance systems
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration