We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for consulting.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

consulting Product List and Ranking from 746 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Dec 31, 2025~Jan 27, 2026
This ranking is based on the number of page views on our site.

consulting Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Dec 31, 2025~Jan 27, 2026
This ranking is based on the number of page views on our site.

  1. テクノプロ テクノプロ・IT社 システムソリューション事業部 Kanagawa//Information and Communications
  2. ジャロック Tokyo//Warehousing and transport related industries
  3. プラスファイブ Kanagawa//IT/Telecommunications
  4. 4 OLFA CORPORATION Osaka//Trading company/Wholesale
  5. 5 オカムラ 物流システム事業本部 Tokyo//Other manufacturing

consulting Product ranking

Last Updated: Aggregation Period:Dec 31, 2025~Jan 27, 2026
This ranking is based on the number of page views on our site.

  1. Voice Support System "WorkingVoice" <Presentation of explanatory materials> テクノプロ テクノプロ・IT社 システムソリューション事業部
  2. Revitalize the aging system to enable the field to operate and achieve sustainable DX (digital transformation). プラスファイブ
  3. Voice synthesis engine "VoiceText" HOYA 音声ソリューション 中野オフィス
  4. 4 Bishamon Small Electric Towing Vehicle DTR10A/DTR10N: Sugiyasu
  5. 4 Support for creating a manufacturing technology roadmap. PEC-KUMATA 生産技術コンサルタント

consulting Product List

1081~1095 item / All 1910 items

Displayed results

What is social engineering? An explanation of the main techniques and countermeasures!

For those who want to review their company's security system, we also support obtaining ISMS certification!

Have you ever heard the term "social engineering"? Some of you may be hearing it for the first time, or you may have heard it before but don't quite understand its meaning. This time, I would like to explain social engineering from various angles in a way that is easy to understand for those who may be unfamiliar with it. *You can view the detailed content of the article in the PDF. For more information, please feel free to contact us.*

  • ISO-related consultant
  • consulting

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Requirements for obtaining ISMS.

An overview of ISMS and an explanation of the differences between the Privacy Mark (P Mark) and ISMS!

Do you know about the requirements of the system for properly managing organizational information, ISMS? Even if you want to obtain ISMS, some people might give up because they think, "I don't know how to obtain it" or "It seems difficult." In this article, we will explain the requirements of ISMS and how to obtain it for those who: - Want to know about the requirements of ISMS - Don't know what to do to obtain ISMS - Are wondering what ISMS actually is *You can view the detailed content of the article in the PDF. Please feel free to contact us for more information.

  • ISO-related consultant
  • consulting

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is the typical cost of consulting for obtaining ISMS certification?

Tips for Comparing Service Providers Explained! Introducing the Benefits of Using ISMS Certification Support Services.

The main purpose of utilizing the ISMS certification support service is to efficiently and accurately obtain certification for the Information Security Management System (ISMS). I would like to introduce the benefits of using the ISMS certification support service for companies seeking to obtain certification for the international standard for information security, ISO 27001, as well as the cost estimates that may be of interest. *For detailed content of the article, please refer to the PDF. For more information, feel free to contact us.*

  • ISO-related consultant
  • consulting

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is the information security policy of ISMS? What items are required?

I will introduce you to the alignment with information security objectives and other related matters!

Traditional security measures were based on the premise that important information and those who access it exist within the company. However, in recent years, the increase in the use of cloud services and telecommuting has led to information assets existing both in the cloud and on devices, making it no longer sufficient to strengthen security measures only within the company. This time, I would like to provide a more detailed introduction to the essential information security policies necessary to protect the company from various risks, aimed at those seeking to obtain ISMS (ISO 27001) certification. *For detailed content of the article, please refer to the PDF. For more information, feel free to contact us.*

  • ISO-related consultant
  • consulting

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is a targeted attack? Is there anything we should do to prepare for emergencies?

For those who want to review their company's security system at this opportunity, we also support obtaining ISMS certification!

The improvement of communication environments and the emergence of various tools and services have led to an era where one can choose a flexible working style that is not constrained by time or location. Confidential information necessary for business can also be easily accessed without being in the office by utilizing cloud services. However, it is also true that the more convenient things become, the more likely information assets are to be targeted. In this article, I would like to provide a detailed explanation of one such attack method that targets information assets: spear phishing attacks. *You can view the detailed content of the article in the PDF. For more information, please feel free to contact us.*

  • ISO-related consultant
  • consulting

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A thorough explanation of the flow and methods for managing outsourced partners to protect privacy.

We will also introduce the supervision and evaluation criteria formulation for the contractor, as well as the conclusion of contracts with the contractor!

Are you outsourcing part or all of your operations that involve personal information? To obtain the P Mark (Privacy Mark), it is crucial to conduct "supervision of subcontractors handling personal information." This article will provide a detailed explanation of what types of subcontractors handle personal information, how to evaluate and supervise them, and what kind of "memorandum" should be established with subcontractors, focusing on the overview of subcontractor management operations. *For detailed content of the column, you can view it in PDF format. Please feel free to contact us for more information.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

How should My Number be handled when obtaining the P Mark (Privacy Mark)?

Introducing the relationship between the Privacy Mark and My Number, along with two points to note and guidelines for safety management measures!

The "My Number" system, which has become increasingly necessary for labor-related procedures, requires proper handling. Are you aware of the correct way to manage it? This article will explain what companies that handle personal information should pay attention to when managing My Number. Originally, the use of My Number is defined for specific purposes. The My Number system was created to consolidate procedures arising from "social security," "tax," and "natural disasters" for citizens. *For detailed content of the article, please refer to the PDF. For more information, feel free to contact us.*

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Explaining the key points for obtaining a P mark in a web production company!

We will also introduce the benefits of obtaining a P mark and the personal information held by web production companies and how it is handled!

Are you aware of the benefits of obtaining a Privacy Mark (P Mark) at a web production company? This article will explain the advantages of acquiring a P Mark and the personal information held, as well as discuss the key points for web production companies when obtaining a P Mark. A web production company is one that creates websites such as corporate homepages and e-commerce sites. In some cases, they also engage in system development and the production of social media and web advertisements, and it is not uncommon for them to take on marketing and customer acquisition as well. They are an indispensable presence in the internet age. *You can view the detailed content of the article in the PDF. For more information, please feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is the Privacy Mark?

I will explain the 'Certificate of Assurance Regarding Personal Information Protection' and its effects!

The protection of personal information has become an important theme in modern society. Within this context, the "Privacy Mark" serves as a significant indicator of the reassurance provided by companies and organizations that handle personal information appropriately. In this article, we will explain the Privacy Mark by answering questions from beginners. We will provide detailed explanations about the benefits of obtaining the Privacy Mark, the acquisition process, costs, and more. *For detailed content of the article, please refer to the PDF. For more information, feel free to contact us.*

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What are the risk assessment methods in the cloud era?

We will introduce examples of risk assessments and support for obtaining ISMS!

The utilization of cloud services has become an unavoidable option for companies. The proactive adoption of SaaS and IaaS enables operational efficiency and flexible working styles; however, it also requires facing new risks unique to the cloud. In this article, I would like to introduce how to evaluate and manage the safety of cloud environments based on risk assessment examples. For those who wish to review their company's security system at this opportunity, we also support the acquisition of ISMS. *The detailed content of the article can be viewed in the PDF. For more information, please feel free to contact us.*

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Are business cards considered personal information? A thorough explanation of the risks and safe management methods!

We will also introduce cases that are not applicable for personal use!

Business card exchanges are commonly conducted in business settings such as meetings and exhibitions. However, the information recorded on the business cards received here, such as names, company names, department names, phone numbers, and email addresses, falls under the category of "personal information" as defined by the Personal Information Protection Law. In other words, when a company uses or stores this information for business purposes, it must be handled appropriately in accordance with the rules of the Personal Information Protection Law. This article will explain in detail why managing business cards is important for companies, how to avoid risks, and provide a legal perspective on the matter. *For more details, please refer to the PDF. Feel free to contact us for more information.*

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Branding that brings out the value of the company. Supporting activities by employees!

"Branding that discovers something new." Shall we involve employees and create it together? Support for innovation that redefines the meaning of the company.

Future Park offers a consulting service that supports companies from both branding and employee education perspectives (learning the fundamentals of branding, marketing, design, channel development, sales promotion, etc.). It is a branding activity that refines the inherent value and existence value of a company to align with the upcoming era. Companies will re-examine their long-cultivated history, culture, customs, technologies, products, services, and existing markets from various angles, and undertake brand transformation tailored to the new era and new customer segments. 【Benefits】 ■ We will leverage your company's resources to create a brand (business) that fits the current era. ■ By viewing your products and services from an objective perspective, the essential strengths and challenges will become clear. ■ Since we are engaged in various industries and companies, we will provide proposals that are not constrained by your company's preconceived notions. ■ While considering the risks anticipated when refreshing the brand, we will also strategically advance the way to start at the execution stage. ■ We will propose collaborations with different industries as needed. *Please feel free to contact us for more details!

  • Management consultant/Small business consultant
  • Other services
  • consulting

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Custom AI Solution

We will create competitiveness in the core business of the company!

We provide one-stop solutions from consulting for AI implementation to algorithm implementation. We solve issues such as "general-purpose packaged AI is ineffective" and "how to utilize existing data." 【Process】 ■Verification (PoC) Phase  ・Roadmap formulation  ・Solution design  ・Model training and validation ■Integration and Operation Phase  ・Operation integration  ・Operation *For more details, please download the PDF or feel free to contact us.

  • Other operation management software
  • consulting

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Eliminate waste in production lines and construction plans! Combination alignment AI solution.

Presenting case studies! Achieving alignment in production processes and civil engineering construction plans, including routes and deliveries! AI autonomously selects the most suitable options from combinations!

The "Combination Matching Solution" is a solution aimed at solving the "combination matching problem," which involves selecting the best option from a large number of choices generated by combinations of elements, using reinforcement learning. It is expected to be utilized in various applications such as manufacturing line process scheduling, delivery route selection, construction planning, and cargo placement planning. Please feel free to contact us if you have any inquiries. 【Benefits of Reinforcement Learning × Optimization】 ■ Even if the matching problem becomes large, reinforcement learning tends to keep the inference time required for optimization from increasing significantly. ■ It is possible to construct algorithms for various matching problems within almost a single framework. *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • consulting

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration