Security Solutionsのメーカーや取扱い企業、製品情報、参考価格、ランキングをまとめています。
イプロスは、 製造業 BtoB における情報を集めた国内最大級の技術データベースサイトです。

Security Solutions - メーカー・企業48社の製品一覧とランキング

更新日: 集計期間:Nov 26, 2025~Dec 23, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

Security Solutionsのメーカー・企業ランキング

更新日: 集計期間:Nov 26, 2025~Dec 23, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. 兼松エレクトロニクス デジタル・サービス本部 Tokyo//Trading company/Wholesale
  2. 日本テクノ・ラボ Kanagawa//IT/Telecommunications
  3. アイ・ビー・エス・ジャパン Kanagawa//IT/Telecommunications
  4. 4 菱洋エレクトロ Tokyo//Manufacturing and processing contract
  5. 4 東芝インフラシステムズ Kanagawa//others

Security Solutionsの製品ランキング

更新日: 集計期間:Nov 26, 2025~Dec 23, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. 『SPSE PRINT SCOPE』 日本テクノ・ラボ
  2. Cybersecurity solution "SecureQUEST" 兼松エレクトロニクス デジタル・サービス本部
  3. Moxa's OT security solutions アイ・ビー・エス・ジャパン
  4. Notice of Participation in "Edge Tech+ 2025" 菱洋エレクトロ
  5. 4 IoT security solution "CYTHEMIS" 東芝インフラシステムズ

Security Solutionsの製品一覧

16~30 件を表示 / 全 61 件

表示件数

Network Blackbox

Detect and respond to various cybersecurity risks!

"Network Blackbox" is a product that adopts the MITRE ATT&CK framework to maximize the efficiency of operations for Japanese operators. With an advanced network solution using full packet capturing, it saves all packets and analyzes them with 100% coverage. The progression of attacks and TTPs (Tactics, Techniques, and Procedures) are visualized, making it easy to see where to respond at a glance. We are the domestic distributor for this product. 【Features】 ■ NDR Core Technology ■ Adoption of the MITRE ATT&CK Matrix ■ Utilization of AI for detection and analysis based on full packets *For more details, please download the PDF or feel free to contact us.

  • Other security and surveillance systems

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Paloato × SKYSEA Collaboration Solution

Detects multiware intrusions and suspicious communications to external sources! Quickly isolates infected devices from the network.

Introducing the "Paloato × SKYSEA Collaborative Solution." This solution detects unknown malware and known threats commonly associated with targeted attacks through Palo Alto Networks' firewall cloud threat analysis, "WildFire," in conjunction with "SKYSEA Client View" for client operation management. It enables rapid isolation of infected devices from the network. 【Features】 ■ Detects malware intrusions and suspicious communications to external sources ■ Allows control of client PCs ■ Visualizes and comprehends threat attacks ■ Detects movements of known and unknown malware *For more details, please refer to the PDF document or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solution 'SASTIK(R) III'

Reduced the implementation hurdle for thin clients to 1/10, achieving deployment for all employees!

The 『SASTIK(R) III』 Thin-Client Layer allows companies wishing to implement it to inherit their existing PC and software assets while achieving the high security of thin clients through cost reduction via PC virtualization. The high security features of thin clients remain intact, reducing costs, implementation barriers, and difficulty to one-tenth. 【Features】 ■ Cost Revolution: Reduces total costs by one digit ■ Implementation Revolution: No need to replace infrastructure, OS, or software ■ Convenience Revolution: Instant thin client by simply plugging it in *For more details, please download the PDF or feel free to contact us.

  • Encryption and authentication

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Information] Protection of Integrity in Embedded Systems

The benefits of Industry 4.0 and the balance of security! We present a white paper!

This document helps in understanding the fundamental concepts regarding the use of integrity protection in computers used in embedded systems, which operate in a completely specialized technical environment. It is important to protect the know-how provided by these devices from reverse engineering. The increasing threats of economic crime and cyber warfare are also significant issues that need to be addressed. Please take a moment to read it. [Contents (Excerpt)] ■ Alliances for Cybersecurity ■ Integrity Protection in Embedded Systems ■ What is Integrity Protection? ■ Where do the intersections of copy and know-how protection lie? ■ Basic Glossary of Encryption Terms *For more details, please refer to the PDF document or feel free to contact us.

  • Other embedded systems (software and hardware)
  • Software (middle, driver, security, etc.)
  • Other security

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Sophos Endpoint

Utilizing Intercept X technology! An advanced endpoint security solution powered by AI.

"Sophos Endpoint" utilizes Intercept X technology to provide the highest level of protection, preventing advanced attacks and mitigating their impact on systems. With powerful EDR/XDR (Endpoint and eXtended Detection and Response), organizations can track, investigate, and respond to suspicious activities and signs of attacks. It offers outstanding robustness and zero-touch endpoint defense, capable of addressing advanced ransomware. 【Key Features】 ■ Multiple deep learning AI models protect organizations from known and unknown attacks. ■ Control over web, applications, and peripheral devices reduces the attack surface and blocks common attack vectors. ■ Behavioral analysis, ransomware protection, exploit prevention, and other advanced technologies quickly stop threats before they escalate. *For more details, please download the PDF or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solution 'SubGate'

A security solution that enables intuitive network operations.

"SubGate" is a network internal security solution that automatically detects and blocks security threats occurring within the network, enhancing the stability of network services and the convenience of operations. It protects the network with patented technology from Special Patent 2011-523822, "Access Level Security Device and Security System." The MDS engine performs traffic analysis based on behavior, automatically detecting and blocking harmful traffic without degrading switch performance. [Features] - Patented technology for access level network security - Dedicated engine for harmful traffic analysis (MDS Engine) - Selection and blocking of harmful traffic to prevent its spread - Simple security settings - Perfect compatibility with other switches, etc. *For more details, please download the PDF or contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

『SPSE PRINT SCOPE』

A printing security solution that enables authentication printing and understanding of printed content!

"SPSE PRINT SCOPE" is a printing security solution that allows for the understanding of printed content and enables censorship and auditing. It provides all administrators with measures against information leakage from paper that cannot be prevented by authentication alone. 【Features】 ■ Use of manufacturer genuine printer drivers ■ Text extraction without using OCR ■ Instant identification of document content ■ Forced print stoppage and print alert email response ■ Operational and management functions, etc. *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Software (middle, driver, security, etc.)

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Industrial Network Security Solutions

Ensure system integrity with Moxa! Achieve a secure industrial network with OT/IT integrated security.

As more and more industrial networks become targets of cyberattacks, it is crucial to identify and mitigate system vulnerabilities before they can be exploited by attackers. There are two directions for measures to strengthen network security: one is to secure a secure foundation for your own industrial network. The other is to identify critical assets and provide them with multilayered protection, such as industrial IPS and whitelisting controls. [Moxa's Solutions] - Integration of industrial networks and security - Integration of OT/IT perspectives on network protection - Detection and mitigation of cyber threats to ensure system integrity *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Case Study] Nifty Corporation

A case where significant cost reduction was achieved while performing spam detection through the introduction of an add-on to the mail server!

We would like to introduce a case study of the implementation of "Cloudmark Authority" at Nifty Corporation. The company had been using products from other vendors for spam email countermeasures, but it became quite burdensome in terms of costs for both the products and infrastructure, as it required operation on a server cluster of several dozen machines. On the other hand, the company had previously implemented the MTA software "Cloudmark Security Platform," and since it was possible to add the email security solution "Cloudmark Authority" as an add-on, and the associated server operation costs and product costs matched their expectations, they decided to proceed with the implementation. After the implementation, not only did they achieve the expected spam detection, but they also eliminated the need for several dozen servers that were necessary for operating other vendor products, resulting in significant infrastructure cost savings. [Challenges Before Implementation] ■ They were operating several dozen servers with products from other vendors for spam email countermeasures, which became a burden in terms of product and infrastructure costs. *For more details, please refer to the PDF document or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Multi-layer tracking security solution 'nPouch'

Secure distribution and management of important documents is possible! Achieving increased operational efficiency.

"nPouch" is a multilayer tracking security solution that utilizes storage/transfer paths for control. It maintains the operational environment of the zone as is. It enhances the authority and sense of responsibility for business documents, achieving improved reliability of the security system. Additionally, it employs security technologies for the distribution of TB-level large-capacity critical information and new concepts of usability for external document security technology. 【Features】 ■ Bidirectional security collaboration functions with partners ■ Tracking and security management functions for outgoing documents ■ Security functions for outgoing documents *For more details, please refer to the related links or feel free to contact us.

  • Other security and surveillance systems

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Information] Multi-vector Defense Solutions Against Cyber Attacks

Evolving Cyber Attacks! An Introduction to Challenges and Attempts in Business

This document explains the challenges businesses face regarding cyber attacks and the solutions available. It recommends the integration of network detection and storage layers, and introduces the advantages of the solutions as well as how multi-vector defense solutions work. Please make use of this information for countermeasures against cyber attacks and ransomware attacks. 【Contents】 ■ Business Challenges ■ Integration of Network Defense and Storage Defense ■ Advantages of the Solutions ■ How Multi-Vector Defense Solutions Work ■ About Superna *For more details, please refer to the PDF document or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Cyber Attack Countermeasure Case] Orange Slovakia

Published case studies of measures against cyber attacks that solved issues in the security operations department and the network operations department.

As a measure against cyber attacks, we would like to introduce a case where our security solution "Flowmon" was implemented for Orange Slovakia. The company's security operations and network operations departments wanted to significantly improve the overall availability and security of their network. After the implementation, information that could not previously be seen by the security operations department became visualized, and they gained better technology for discovering issues. [Case Overview (Partial)] ■Implemented Product: Progress Flowmon ■Industry: Telecommunications ■Challenge: To significantly improve the overall availability and security of the network *For more details, please refer to the PDF document or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solution 'urlscan.io'

Commercial service of "urlscan.io" that allows scanning and analyzing page information from URLs.

A commercial service related to the web service "urlscan.io," which allows users and organizations needing deeper insights to scan and analyze page information by submitting the URL of the target website. It is useful for investigating harmful sites and protecting one's own brand. By using this API in conjunction with various third-party integrations, SOAR tools, and custom integrations by users themselves, it becomes possible to submit URLs for scanning, retrieve scan results (screenshots and DOM snapshots), and search existing scans by different attributes. There are four types of plans: Starter, Advanced, Professional, and Enterprise, depending on the number of scans and requests. Please let us know your preferred plan when making an inquiry. *Also compatible with the information visualization and analysis tool Maltego.

  • Software (middle, driver, security, etc.)

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

『Gatewatcher』

Cybersecurity Solutions - NDR, CTI, and SOC Automation for Advanced Threat Detection 'Gatewatcher'

Gatewatcher is a cybersecurity platform that integrates CTI, automated response, and AI support, centered around ANSSI-certified passive NDR sensors, to monitor the entire network in 360° and accelerate the detection and containment of threats. 【Key Features】 ■ Multi-layer Detection Engine - Utilizes signatures, heuristics, and machine learning to capture unknown attacks and anomalies in encrypted communications in real time. ■ Live CTI Feed - Ingests over 5,500 IoCs daily from more than 3,000 information sources, providing immediate context to alerts. ■ Cockpit Integrated Console - Manages incidents mapped to MITRE ATT&CK on a single screen, visualizing MTTD/MTTR. ■ Reflex Automated Response - Implements immediate actions such as isolation, FW blocking, and account deactivation with a single click or fully automated playbooks. ■ Deep Visibility DPI - Analyzes hundreds of protocols and retains flow and packet data for long-term storage, useful for forensics and performance analysis. *For more details, please refer to the related links or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[AutoCrypt] IVS、SeC Analyzer 

Automotive Cybersecurity Solutions

AutoCrypt IVS: Cybersecurity measures optimized for automotive communication protocols - Incorporates TEE to ensure confidentiality and reliability - Achieves cost reduction in ECU development without the need for security program development - Addresses stringent technical requirements demanded by OEMs and suppliers AutoCrypt Security Analyzer: A 'vehicle OSS vulnerability diagnosis and automatic analysis solution' that manages security risks such as open-source vulnerabilities and license violations included in in-vehicle software AutoCrypt Security Fuzzer: A vehicle-specific fuzz testing tool specialized for vehicle software, enabling automation of testing through smart fuzzing utilizing AI, and improving resource management efficiency.

  • Software (middle, driver, security, etc.)

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録