We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for soft.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

soft(Firewall) - List of Manufacturers, Suppliers, Companies and Products

soft Product List

1~3 item / All 3 items

Displayed results

Domestic EDR + Monitoring Operation Service "KeepEye"

Leave complex operations to us / Domestic EDR developed in-house + monitoring operation service (MDR) for isolation response included.

It has become difficult to defend against increasingly sophisticated cyber attacks using traditional firewalls and antivirus software. Although tools to defend against advanced cyber attacks are now offered by multiple vendors, these tools are designed to be operated by security experts, making it challenging for companies that cannot afford to hire security professionals to actually implement them, resulting in merely having the tools without proper utilization. KeepEye enables the operation against advanced cyber attacks with "minimal operation that does not require the customer to hire security experts" by handling most of the operations ourselves.

  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Software "Sonatype"

Protecting the software supply chain and enhancing security with Sonatype.

Sonatype provides an integrated suite of DevSecOps tools to achieve security management of the software supply chain, centralized management of artifacts, and continuous improvement of code quality. Please feel free to contact us when needed. 【Features】 ■Artifact Management – A universal repository that supports multiple package formats such as Maven, npm, Docker, and PyPI. ■Vulnerability Management – Automatically scans for vulnerabilities in open source components and detects risks early. ■License Compliance – Detects license violations in software components to ensure compliance. ■Automated Policy Enforcement – Automatically applies and monitors security policies in the development process. ■Strengthening Software Supply Chain Security – Proactively blocks malicious artifacts and vulnerabilities. *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration