We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security Solutions.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security Solutions Product List and Ranking from 43 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Aug 27, 2025~Sep 23, 2025
This ranking is based on the number of page views on our site.

Security Solutions Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Aug 27, 2025~Sep 23, 2025
This ranking is based on the number of page views on our site.

  1. アイ・ビー・エス・ジャパン Kanagawa//IT/Telecommunications
  2. ピーエスアイ 本社 Tokyo//IT/Telecommunications
  3. null/null
  4. 4 サブゲート Tokyo//IT/Telecommunications
  5. 5 旭電通 Tokyo//Trading company/Wholesale

Security Solutions Product ranking

Last Updated: Aggregation Period:Aug 27, 2025~Sep 23, 2025
This ranking is based on the number of page views on our site.

  1. Moxa's OT security solutions アイ・ビー・エス・ジャパン
  2. Security Switch "TiFRONT (Cloud Management Model)" ピーエスアイ 本社
  3. Security Switch "LG1000" 旭電通
  4. 4 Research Facility Fireproof Chemical Storage Cabinet
  5. 5 PRO-WATCH | Integrated Security Solution

Security Solutions Product List

46~60 item / All 99 items

Displayed results

Security Switch TiFRONT

You can achieve "internal measures" that are possible because of the security switch.

The security switch TiFRONT can implement three internal measures: "threat prevention," "spread prevention," and "network visualization." It detects and prevents suspicious activities, such as a PC infected with malware acting as a stepping stone for unauthorized access to other PCs or file servers connected to the network, or being scanned by the network. Additionally, it identifies terminals infected with malware and turned into zombie PCs, raises alerts for suspicious activities, and prevents the spread of infection by isolating them from the network. 【Features】 - Can be implemented without changing the layout - Detects, blocks, and releases attacks on the access network - Immediate blocking upon detection through integration with entrance and exit measures - Visualization of the internal network - Streamlining of operational management For more details, please contact us or download the catalog.

  • Other security and surveillance systems
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Case Study of Security Switch TiFRONT - Tokei Densan Co., Ltd.

Replace the L2 switch with TiFRONT to enhance network security.

Tohkei Densan Co., Ltd. provides specialized solutions tailored to various industries and business types, as well as outsourcing services for information systems utilizing data centers. The company's challenge was how to ensure the security of Windows XP, which reached the end of support in 2014. We will introduce a case study on the implementation of the security switch "TiFRONT," which established a security system that does not rely on definition files or the operating system. [Contents] - Windows XP terminals that cannot be migrated due to compatibility issues with business applications - Features that detect behavior and prevent spread, as well as the ability to be implemented in a short period, were key selection points - Construction methods adjusted according to the scale of departments or locations - Proposing TiFRONT to customers creates new business opportunities For more details, please contact us or download the catalog.

  • Other security and surveillance systems
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Access Control for USB Devices: 'LB USB Lock Plus'

Unauthorized USB memory - Shut out hard disks.

This is software for controlling the use of USB-connected storage devices such as USB flash memory. ■ Settings for "Access Allowed," "Access Denied," and "Read-Only" are available ■ Access control via a whitelist ■ Easy setup in wizard format ■ Measures against information leaks for PCs handling personal information! There is also a higher-end product called 'LB USB Lock Pro.' 【Function Comparison】 https://www.lifeboat.jp/products/ulp1/index.php?hn=hikaku&t_no=1&ht=-130

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Code Sight

Introducing a solution to detect and fix security vulnerabilities during coding!

"Code Sight" is an IDE-based application security solution. It allows you to detect and fix security issues without switching tools while coding, so it does not disrupt your workflow. Additionally, it operates at extremely high speed and can instantly analyze large codebases. The detailed remediation guidance displayed directly within the IDE not only aids in the rapid resolution of issues but also contributes to long-term improvements in coding quality. 【Features of Code Sight Standard Edition】 ■ Automatically scans and analyzes source code and IaC files in progress ■ Detected issues are directly highlighted in the editor window, making identification easy ■ Vulnerability descriptions and CVE or BDSA IDs are displayed directly within the IDE ■ Severity information based on CVSS scores makes prioritizing fixes easier *For more details, please refer to the PDF materials or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security product 'APPGUARD' that can counter Emotet.

AppGuard, which is not a traditional detection-based security product, prevents threats before they can occur. It blocks threats at the attack stage with an OS protection model.

The OS protection type does not perform detection or identification but protects the OS core, safeguarding the PC from any threats, whether known or unknown. AppGuard protects the OS itself and does not harm the system. Instead of checking each file individually, it immediately shuts out any abnormal processes that may indicate malware, focusing on protecting the system. AppGuard employs cybersecurity technology that has not been breached in over 20 years by U.S. government agencies. *Link to AppGuard Marketing Co., Ltd. HP: https://lp.appguard-m.com/security_measures 【Features】 ■ Prevention of unknown malware execution ■ Prevention of ransomware execution ■ Prevention of drive-by download execution ■ Prevention of fileless malware execution ■ Prevention of confidential information leakage due to malware ■ Prevention of OS tampering *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cybersecurity solution "SecureQUEST"

To all the members of the information systems department in the automotive industry who are facing security threats all alone!

"SecureQUEST" is a cybersecurity solution for individual information systems developed by the information systems department of an automotive industry supplier. While responding to short-term risks through alert monitoring and log analysis, we accompany our customers in strengthening the long-term security of their IT environment from both system and operational perspectives. By providing IT technology, we ensure the safety of the entire supply chain so that it can focus on business, ultimately contributing to the stability and development of the entire industry. 【Features】 ■ "Accompaniment support" leveraging our in-house operational expertise ■ Gradual security enhancement even after implementation ■ Monitoring of unauthorized sign-ins ■ Easy-to-understand monthly reports ■ Comprehensive support for overseas locations *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall and intrusion prevention
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Data security solution "SecureZIP"

Supports major platforms from mainframes to servers and desktops!

SecureZIP offers robust security features and ZIP functionality, providing secure file transfer and data backup solutions for all major platforms from mainframes to servers and desktops. It is very user-friendly and easy to operate based on ZIP, making file encryption/decryption as simple as zipping a file. IT department administrators can provide consistent centralized management for end users, including encryption features, digital certificate management, and password management. 【Product Lineup】 ■SecureZIP for Server (for server OS) ■SecureZIP for i5/OS (for midrange) ■SecureZIP for Windows Desktop (for client OS) ■SecureZIP CLI [Desktop Only] (for client OS) ■SecureZIP for Mac OS X, etc. *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security solution "NISG 3,000 Series"

Provision of integrated management functions.

The "NISG 3,000 Series" is an integrated threat management appliance (UTM) that consolidates all security features into one. It protects servers and clients while providing integrated management capabilities. It is equipped with excellent security measures in a compact body, safeguarding corporate offices from internet threats. 【Features】 ■ Integration of all security functions into one ■ Protection for servers and clients ■ Provision of integrated management capabilities *For more details, please contact us or download the catalog.

  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

5G security solution

Providing security and scalability in the transition to 5G mobile networks!

Our company provides highly scalable security solutions, anticipating various scenarios of 5G networks. We offer mobile communication operators evolving their networks for 5G the highest levels of flexibility, scalability, and protection. Robust firewalls and DDoS mitigation and detection technologies can be deployed in various form factors (physical, virtual, bare metal, container) according to individual network topologies (4G, 5G-NSA, MEC, 5G SA). 【Key Solutions】 ■ Gi-LAN Security ■ Mobile Roaming Security ■ Network Slicing ■ Comprehensive DDoS Attack Defense for All Networks ■ Secure and Efficient MEC *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security assessment service "IoT device penetration testing"

We support the improvement of security levels from attack (penetration testing) to countermeasure proposals! We have multiple achievements in security inspections of IoT devices, including automobiles.

"IoT Device Penetration Testing" is a comprehensive security evaluation service that covers everything from attacks (penetration testing) to recommendations for countermeasures. Experienced white-hat hackers conduct security evaluations based on their knowledge and experience from the perspective of an attacker. Evaluations can be performed without the need for source code. By investigating the potential security weaknesses of IoT devices, we support the improvement of the security level of the products. 【Features】 ■ Security evaluations conducted by experienced white-hat hackers ■ 100% repeat rate (as of November 2018) ■ Evaluations possible without the need for source code ■ Diverse investigation and verification content ■ Applicable to all types of IoT devices *For more details, please refer to the PDF document or feel free to contact us.

  • Contract Analysis

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Network security system

With the spread of networks, cyber attacks are evolving and becoming more sophisticated every day. Antivirus software alone can no longer protect you! First, let's consult!

To protect office information security, comprehensive and multifaceted measures are necessary. While preparing for external attacks, it is important to build a system that minimizes the risk of internal information leaks, thereby reducing the probability of suffering damage. ■ Our company achieves high-level security measures with excellent performance. We defend against various threats such as ransomware, virus infections, unauthorized intrusions, spam emails, and both widespread and targeted network attacks. ★ The malware 'Emotet' is wreaking havoc! Emotet spreads by sending virus-laden attachments via email, infecting devices when recipients open them. Once infected, confidential company information and data such as address books are stolen, creating a negative chain reaction that spreads infection to internal members and business partners. 【Features】 ■ Achieves high-level security measures ■ Defends against various threats ■ Consolidates security functions to realize high functionality and performance ■ Enables secure and convenient remote access Please feel free to contact us.

  • Other security
  • Software (middle, driver, security, etc.)
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Database security solution "D'Amo"

The final move against information leaks! Starting today, it's a confidential strategy that will change the company.

"D'Amo" is a packaged product that integrates the three major elements of security: "encryption," "access control," and "audit" for databases. It operates with complete independence from application programs, allowing for real-time application of security policy changes and quick adaptation to the security environment. It supports automatic backup and recovery functions for all policy exclusions. 【Features】 ■ Reduction of implementation costs ■ Shortening of implementation period ■ Reduction of maintenance costs ■ Reduction of operational costs ■ Ensuring high security *For more details, please refer to the catalog or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Endpoint security solution CROWDSTRIKE

Covering the lifecycle of security measures with a single agent!

We would like to introduce "CROWDSTRIKE," which we handle. It is designed with the premise of collaboration between the cloud and endpoints. It allows for the aggregation, analysis, and sharing of everyone's (Crowd) data. Additionally, through the threat hunting service "OVERWATCH," it provides access to logs from all users around the world, discovering threats that machines could not find and registering alerts in the system. 【Features】 ■ Cloud-native ■ Lightweight single agent ■ Threat hunting service "OVERWATCH" *For more details, please refer to the related links or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration