We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security Tools.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security Tools - List of Manufacturers, Suppliers, Companies and Products

Security Tools Product List

1~4 item / All 4 items

Displayed results

itemis

Responding to the needs of various industries! It is possible to develop flexible software and systems.

itemis supports the improvement of development processes, enhancement of cybersecurity, and achievement of company goals. It is possible to improve development processes, enhance cybersecurity, and quickly achieve company goals. You can automatically generate code using a model-based approach, ensure traceability, and conduct threat analysis and risk assessment. ■itemis SECURE This is a tool for ensuring automotive cybersecurity. 【Features】 - It is possible to manage the TARA process in a model-based manner and visually represent it. - It is possible to generate reports of TARA results in DOCX or PDF format. - You can manipulate and customize the TARA model using scripts. - You can share, import, and export the TARA model with other tools using an exchange format called XSAM. - The TARA model can be integrated with version control systems and extended. *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Development support tools (ICE, emulators, debuggers, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Windows Login Security Tool KTSS Login

We do not allow personal computers to connect to the network. We protect our valuable network assets.

Users do not need to be informed of the Windows user ID and password to log in to Windows with a "KTSS account." Furthermore, by supporting Windows Active Directory, the connection to the network using personal laptops is prohibited.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Blog] Top 5 Email Security Tools of 2022

Five Tools You Should Set Up to Protect Email Security! Introduction to the Blog

In recent times, as companies have started to use email on a daily basis, the importance of email security tools has been increasing. General employees receive numerous spam emails daily from both inside and outside the company, making email an efficient medium for causing information leaks. Due to the lack of time to deal with the vast number of emails, employees can fall prey to a false sense of security. Cybercriminals take advantage of this to carry out phishing attacks that have increased in frequency and potency through cloud-based email. [Contents] ■ Common email security threats ■ Comprehensive list of email security tools for businesses ■ Summary *You can view the detailed content of the blog through the related links. For more information, please feel free to contact us.*

  • Other security
  • Email/Fax transmission
  • Server monitoring and network management tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Code Dx

Diagnosing software risks throughout the SDLC with a single record system for AppSec data!

"Code Dx" is an Application Vulnerability Correlation (AVC) solution that centralizes AppSec data and provides actionable insights. It supports integration with over 100 developer and application security testing tools. It is capable of prioritizing test results based on risk and providing manageable reports. This allows for complete visibility of risks across all software assets of an organization from a central console. 【Features】 ■ Customizable and extensible correlation rules ■ Triage Assistant that automatically prioritizes based on machine learning ■ Compliance with over 20 types of compliance standards ■ Full bidirectional integration with the bug tracking tool Jira ■ Built-in support for 16 types of open-source testing tools *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration