We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security Solutions.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security Solutions Product List and Ranking from 43 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Aug 27, 2025~Sep 23, 2025
This ranking is based on the number of page views on our site.

Security Solutions Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Aug 27, 2025~Sep 23, 2025
This ranking is based on the number of page views on our site.

  1. アイ・ビー・エス・ジャパン Kanagawa//IT/Telecommunications
  2. ピーエスアイ 本社 Tokyo//IT/Telecommunications
  3. null/null
  4. 4 サブゲート Tokyo//IT/Telecommunications
  5. 5 旭電通 Tokyo//Trading company/Wholesale

Security Solutions Product ranking

Last Updated: Aggregation Period:Aug 27, 2025~Sep 23, 2025
This ranking is based on the number of page views on our site.

  1. Moxa's OT security solutions アイ・ビー・エス・ジャパン
  2. Security Switch "TiFRONT (Cloud Management Model)" ピーエスアイ 本社
  3. Security Switch "LG1000" 旭電通
  4. 4 Research Facility Fireproof Chemical Storage Cabinet
  5. 5 PRO-WATCH | Integrated Security Solution

Security Solutions Product List

61~75 item / All 99 items

Displayed results

[Measures Against Information Leaks] What methods can corporations use to transfer My Number?

How to collect My Number information safely and efficiently? Explained in the column!

The handling of My Number information (specific personal information) is strictly regulated by law. On the other hand, there are many means of transfer besides mailing and face-to-face interactions. As a business, how can we comply with the rules while also improving efficiency? NRI Secure offers a free guidebook that clearly summarizes key points to consider. Please feel free to download it. *This column includes excerpts from the guidebook. [Contents] ■ Is it permissible to attach files to emails? ■ What are the points to be cautious about when outsourcing? ■ Three essential conditions for using file transfer services *You can view more detailed content on the blog through the related links. *For more information, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Endpoint security solution "Cybereason"

Dramatically improve your security environment! Targeted cyber attack countermeasure solution.

"Cybereason" is a cloud-based security solution that analyzes vast amounts of endpoint log data using proprietary analytical expertise powered by AI to detect signs of cyberattacks in real-time and address the challenges organizations face in their cybersecurity measures. This enables immediate detection and response to the increasingly diverse targeted cyberattacks and ransomware that have been on the rise recently. [Features] - Easy implementation and smooth operation - Instant identification of the overall picture of attacks - User-friendly management interface with visualized data - Real-time detection of malicious behaviors *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security and surveillance systems
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The app security solution "CrackProof"

Security software that protects applications from cracking (unauthorized analysis and tampering).

"CrackProof" is a security software that powerfully protects applications from various types of cracking. It prevents both file-level analysis (static analysis) and analysis during program execution using debuggers (dynamic analysis). High-level analysis countermeasures are achieved with simple operations. Processing is completed just by uploading the app to the cloud. You can start using it from the day it is implemented. Additionally, since the app is directly subjected to security processing, there is no need to incorporate it into the source code during the development stage. It can also be easily applied to already developed apps. *Some exceptions may apply depending on the OS. 【Features】 ■ Easy security processing ■ Prevents static and dynamic analysis ■ Almost no performance degradation ■ Flexible security level settings ■ Ongoing support after implementation to work together with customers on countermeasures *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introduction to Control Security Solutions for Factories and Power Generation Facilities

Support for the formulation of action plans and the introduction of security equipment. Courses and exercises to experience cyber attacks through board games are also available.

We provide "Control Security Solutions" for factories and power generation facilities based on the experience and know-how gained from obtaining CSMS certification. We conduct assessments and consulting for our customers' factories and power generation facilities, supporting the formulation and execution of action plans and the implementation of security measures. Additionally, we offer courses and exercises on control system security using board game-style content provided by Kaspersky. 【We solve the following issues】 ■ Unable to grasp the current status of our own plant's systems ■ Measures are in place, but unsure if overall risk reduction is achieved across the plant ■ Recognize the need for measures but don't know where to start *For more details, please refer to the materials available for download in PDF format. Feel free to contact us as well.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Network security solution

Providing maintenance and support services for secure network devices (Fortinet)!

We provide "network security solutions" suitable for solving security challenges. We set up Fortinet's services to be used in the customer's cloud environment. We listen to customer requests and conduct device configuration and pre-testing tailored to the customer's environment before the delivery of equipment. 【Features】 ■ Fortinet Device Provisioning Service ■ Fortinet SaaS Connection Service ■ Fortinet Device Pre-configuration and Implementation Service *For more details, please refer to the PDF document or feel free to contact us.

  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Endpoint protection product "AppGuard"

Patent obtained! Endpoint security that does not seek threats.

"AppGuard" is an innovative patented endpoint protection product that blocks threats at the stage of the attack, rather than relying on traditional "detection technology" types (definition files, machine learning, reputation, whitelists, etc.). It limits the operational scope of processes, allowing normal operations while completely blocking and preventing unauthorized processes, access to memory, writing, and actions that violate policies related to critical components of the OS. 【Features】 ■ Prevention of unknown malware execution ■ Prevention of ransomware execution ■ Prevention of drive-by download execution ■ Prevention of fileless malware execution ■ Prevention of confidential information leakage due to malware, etc. *For more details, please download the PDF or feel free to contact us.

  • Firewall and intrusion prevention
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Endpoint Protection "Bromium"

Completely protect confidential information with 'Internet separation' and 'Application separation'!

"Bromium" is an endpoint protection solution that utilizes CPU virtualization technology to ensure 100% safety for your PC, even when opening malware or infected files. By installing it on your PC, it automatically generates a "MicroVM," which is a completely independent virtual environment from the existing PC. Documents and programs sent via the internet or USB operate within the isolated MicroVM, so even if malware like Emotet sneaks in, it will not affect the existing PC or the internal network, keeping confidential information safe. 【Features】 ■ Strong security achieved through application isolation ■ Centralized management of threat information on a management server ■ Internet isolation (network separation) ■ Neutralization of received files from chat and email ■ Global information security, including overseas locations ■ Diverse service delivery formats *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security solution "AppGuard"

New concept OS-protect type endpoint security!

"AppGuard" is an OS-protecting endpoint security that protects PCs from any threats, whether known or unknown, without performing detection or identification. As the name suggests, it protects the OS itself and does not harm the system. Furthermore, users can use programs they have installed without the need for listing (policy settings), and it is also possible to apply updates to those software without changing the settings. 【Features】 ■ Does not harm the system regardless of unknown, zero-day, or known threats (prevents unauthorized actions in advance) ■ Ensures system safety *For more details, please download the PDF or contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security solution "Aqua"

With a single implementation, support for various platforms! BCP can also be realized in the cloud/container.

"Aqua" is a full lifecycle security solution developed for containers and cloud-native applications. Through the automation of DevSecOps, it enables a shift-left in security, allowing for early detection and resolution of issues. Additionally, by automating security through containers, it detects unusual behavior and implements control through whitelisting. 【Features】 ■ Implementation of DevSecOps ■ Realization of BCP in cloud/container environments ■ Next-generation security ■ Comprehensive defense against external attacks ■ Assurance of compliance *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The savior of supply chain attack measures! Highly effective security measures!

In recent times, it has become impossible to completely prevent infections from Emotet ransomware. Stopping the spread and minimizing secondary damage with 【SubGate】 is an effective measure!

The high-performance security switch SubGate series and SubGateX series are equipped with the internationally patented proprietary security ASIC known as the MDS engine in all models. At the same time, it reports to the administrator via email from the management software VNM, allowing for awareness of infections and enabling proactive measures upstream. In today's world, where infections from Emotet and ransomware cannot be completely prevented, it has become difficult to protect the internal network from clusters solely through individual management efforts, especially with the risk of infections from a single internal PC or easy connections to the internal LAN from PCs brought back unknowingly from remote work locations. By simply replacing the currently used HUB with a SubGate, you can prevent the spread of viruses, block harmful traffic such as internal DoS attacks, and prevent eavesdropping on IP phone conversations and theft of confidential data. For wireless LAN environments, there are security access points SubGate AP and WiFi6 compatible security access points SubGateAPX. Additionally, SubGateX supports multi-gigabit connections. With the highly effective SubGate series, you can strengthen internal measures based on the premise of potential infections.

  • Routers, Switches, and Hubs

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Basic Knowledge: Security Measures in 2022

We are introducing how to prevent sophisticated cyber attacks and what should be done!

We introduce security measures for 2022 on how to deal with increasingly sophisticated cyber attacks such as EMOTET, ransomware, and supply chain attacks. We cover topics including "What is EMOTET?", "Attack methods", and "Examples of attacks on major manufacturing supply chains". Additionally, we introduce 'SubGate', which helps prevent the spread of viruses. Please make use of these measures. 【Contents (partial)】 ■ What is EMOTET ■ Attack methods ■ Scary features ■ Symptoms after infection ■ Damage after infection *For more details, please refer to the PDF document or feel free to contact us.

  • Routers, Switches, and Hubs
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AppGuard Small Business Edition

Recommended for small and medium-sized enterprises with a "one-person IT department"! Protecting small and medium-sized businesses from cyber attacks.

"AppGuard Small Business Edition" is a product aimed at small to medium-sized enterprises with 1 to 300 employees, combining the simplicity of "AppGuard Solo" and the integrated management features of "AppGuard Enterprise." It was developed in response to customer requests for a centralized management version with pre-set policies, alleviating the concerns of small businesses that cannot allocate many resources to security due to their "one-person IT department" structure, while maintaining the core technology of AppGuard against malware threats. 【Features】 ■ License for small to medium-sized enterprises ■ Pre-installed standard settings ■ Diversification of implementation services *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] Explanation of Ransomware

Prepare for attacks! Solutions to help build robust cybersecurity.

This document focuses on the threat of ransomware and outlines ways to mitigate risks. It introduces the ransomware threats of 2023, methods to minimize risks, and solutions to help build stronger cybersecurity. Please use this as a reference for ransomware countermeasures. 【Contents】 ■ Current threat landscape ■ What is ransomware? ■ Impact of ransomware attacks ■ Ransomware as a Service (RaaS) ■ Ransomware attackers *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Data protection product "Shadow Desktop"

Comprehensive measures can be taken for information leakage prevention during PC loss, BCP measures, and backups!

"Shadow Desktop" is a data-less client product that creates a state where data does not physically exist on the main unit by simply installing software on an existing PC and storing the data within the PC to external storage such as the cloud. Since it can be used as if the data is local, it significantly enhances security and data protection performance without compromising usability and productivity. 【Features】 ■ Virtualization of data only to the cloud ■ A new form that imposes no burden on companies or users ■ The secret is a virtual drive *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IoT security solution "CYTHEMIS"

Build a high-security environment with external security devices and management systems.

"CYTHEMIS" is an IoT security solution that securely connects analytical and experimental equipment that cannot be connected to a network, supporting the remote, smart, and digital transformation (DX) of research, education, and medical environments. By utilizing device authentication and whitelisting between endpoints, it blocks unauthorized access and malware infections, enabling secure remote operations. Additionally, it facilitates safe data communication from research equipment PCs and can provide data sharing cloud services. [Features] ■ Achieves secure remote operations ■ Ensures safe data communication and sharing ■ Easily deployable *For more details, please download the PDF or feel free to contact us.

  • Network related equipment and software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration