We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for soft.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

soft(image) - List of Manufacturers, Suppliers, Companies and Products

Last Updated: Aggregation Period:Sep 03, 2025~Sep 30, 2025
This ranking is based on the number of page views on our site.

soft Product List

46~60 item / All 105 items

Displayed results

ActiveImage Protector Server

Data/system protection solution for Windows servers compatible with both physical and virtual environments.

ActiveImage Protector Server is a backup solution that can be used in both physical and virtual environments for Windows servers. It backs up the entire system, applications, and data on the hard disk as an image file, which can be directly saved to local hard disks, USB drives, LTO tapes, network storage such as NAS, or cloud storage. When backing up virtual machines, you can choose between agent-based and agentless backup methods. It is equipped with all the necessary features for backup solutions, including hot imaging that allows backups while the system is running, cold imaging that backs up a clean system volume before booting, incremental backups that quickly back up only the changed parts, and command-line execution that can be automated in combination with your own management tools. It also includes a "deduplication and compression feature" during backup, significantly reducing the storage capacity consumed at the destination. The operation is in a wizard format, making it easy to perform reliable backups and recovery without specialized knowledge.

  • Other security
  • Storage Backup

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

PLC interface "CAN-PN"

We have obtained certification from the PROFIBUS User Organization e.V. (PNO)!

The "CAN-PN" is a high-speed CAN interface compliant with ISO 11898-2. It operates as a PROFINET-IO device and is configured using tools such as PLC SIMATIC Manager or TIA Portal. Additionally, it has obtained certification from the PROFIBUS Nutzerorganisation e.V. (PNO). 【Features】 ■ High-speed and reliable data buffering link for PROFINET-IO and CAN ■ CAN-PLC link to SIEMENS S7-300, S7-400, S7-1200, or S7-1500 ■ Configuration using standard tools ■ Certification from PROFIBUS Nutzerorganisation e.V. (PNO) ■ Can link various PROFINET-IO controllers to a CAN network * You can download the English version of the catalog. * For more details, please refer to the PDF document or feel free to contact us.

  • Company:Renas
  • Price:Other
  • Other electronic parts

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『VM7 Auto-Patch Manager』

Automatically recognizes patch cable connections and manages connection information. Reduces the hassle of connection and management!!

The "VM7 Auto-Patch Manager" is a tool that accurately manages patch connection information. It is calibrated by sensors installed on panels and equipment, a controller that collects connection information, and dedicated software that manages the connection information. It operates as an extension of the data center equipment and rack management system "VM7 iDC Visual Manager," allowing for integrated management of racks. 【AIM System Utilizing RFID】 Connection information is automatically obtained through RFID tags attached to antennas mounted on patch panels and switches, as well as cables. 【Transmission and Reception of Connection Data】 Using hardware control software, data can be exchanged between iDC Visual Manager/VM7 Cable Manager and Auto-Patch Manager. 【Management by Dedicated System】 Rack installation information and connection information can be managed using the data center equipment and rack management system "iDC Visual Manager" and the wiring management system "VM7 Cable Manager."

  • LAN construction and wiring work

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Embedded Software Acronis True Image 2016

Backup and Recovery Solution

- Acronis Startup Recovery Management - Backup of the running system (hot backup) - Support for disk/partition, file and folder backups, full backups, and restoration of individual files and folders - Support for local drives, network shares, and external storage - Bare metal restore - Support for GPT/UEFI-based systems - Create bootable DVDs and USB media using backup files

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Runtime

A lineup of file recovery tools for Windows and tools for recovering data from NAS devices.

"Runtime" is a product that provides data recovery software for various data recovery scenarios. We offer a wide range of data recovery software, including GetDataBack Pro (data recovery tool) and NAS Data Recovery (NAS data recovery tool). Please feel free to contact us when you need assistance. 【Product Lineup】 ■ GetDataBack Pro (data recovery tool) ■ NAS Data Recovery (NAS data recovery tool) ■ RAID Reconstructor (RAID data recovery tool) ■ Captain Nemo Pro (drive mounting tool) ■ RAID Recovery for Windows (Windows RAID data recovery tool) ■ DriveImage XML (backup and recovery tool) *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other information systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Free Trial: Email Spoofing Protection 'PowerDMARC'

Measures against "spoofing emails" to create an environment where customers can trust email delivery and ensure that emails are reliably received.

Spoofing emails refer to the practice of sending emails that impersonate a company or individual, with the intent to infect with viruses or direct recipients to fake websites. Don't you often receive spoofing emails and think, "Isn't there something that can be done about this?" If an email impersonating your company reaches: - Business partners - Customers and causes damage, your company, which has not taken measures against spoofing emails, may be deemed to have "not taken necessary levels of countermeasures" and could bear liability for damages (Civil Code Article 709). In recent years, over 70% of security incidents have originated from emails. To protect email security, SPF, DKIM, and DMARC have been established as standard specifications. While setting up SPF, DKIM, and DMARC is easy for infrastructure engineers, the recent shift to cloud infrastructure has led to a loss of skills in DNS and email configuration. Using PowerDMARC makes it easy to set up SPF, DKIM, and DMARC. You can also audit email delivery status through clear "visualization"! For more details, please download the catalog!

  • Company:Spelldata
  • Price:100,000 yen-500,000 yen
  • Email/Fax transmission

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Campaign in Progress] Get Acronis software at a great deal!

"Let's get a great deal together with the target products!" Advantech is currently offering Acronis at a special price! Check the link below!

Reasons to Choose Acronis True Image 2021 Standard 1. Integrated anti-malware protection 2. Unified licensing, UI, management, and technology 3. Cloud storage with remote access 4. Blockchain notarization 5. A solution with unparalleled simplicity 6. Enhanced support and cloud upgrades

  • AcronisActiveProtection_imgjp.jpg
  • KeyFeature_3Box_img1.jpg
  • KeyFeature_3Box_img2.jpg
  • KeyFeature_3Box_img3.jpg
  • Firewall and intrusion prevention
  • Encryption and authentication
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Software "BIMcollab"

Fast and error-free project delivery with 'BIMcollab' on the OpenBIM coordination platform.

BIMcollab is a collaborative platform that centralizes issue management, clash detection, and IDS data validation among different BIM tools for design and construction teams in the cloud, streamlining the open BIM workflow. 【Features】 ■ Cloud Issue Management (Nexus): Centralizes all BIM issues in real-time ■ Smart Issues: Automatic integration of duplicate clashes and automatic status determination during model updates ■ IDS Requirement Management: Defines BIM requirements with Open IDS and performs automatic validation via Zoom ■ Fast Clash Detection (Zoom): Analyzes large-scale IFCs in just a few minutes ■ Dynamic Lists: Extracts quantity and attribute tables from models via drag-and-drop *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Eye“247” AntiMalware FSAV IV

After implementation, security information will be automatically updated! A package of security measures necessary for small and medium-sized enterprises.

"Eye '247' AntiMalware FSAV IV" is a security package that combines three security products for small and medium-sized enterprises. It combines the firewall capabilities of Check Point with the highly demanded and widely implemented Fuva Brain products, "Eye '247' AntiMalware" and "Eye '247' WorkSmart Agent." Even without a dedicated person in charge, it can be easily implemented to address external and internal threats. 【Features】 ■ Real-time monitoring based on zero trust ■ Advanced behavior detection (ATC) ■ Automatically executed regularly ■ Data protection in a secure environment ■ Easy recovery *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Waveform analysis software "MTB-OWM"

Easy and intuitive operation! Software that allows automatic waveform analysis.

The "MTB-OWM Type Waveform Analysis Software" allows for the extraction of various parameters from waveform data obtained from an oscilloscope, equivalent to or beyond what the measuring instrument can handle, using only a PC. This enables waveform analysis without occupying the oscilloscope. Additionally, it significantly enhances measurement and analysis capabilities with a variety of options such as ultra-long memory support for waveforms, search functions, and automated report generation, contributing to substantial labor savings. 【Features】 ○ Waveform display & cursor function ○ Waveform analysis function ○ Waveform calculation function (optional) ○ Long-memory waveform display function & search function (optional) ○ Automated report generation for waveform analysis (optional) For more details, please contact us or download the catalog.

  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Management software "ItemSense RAIN RFID"

Management software that can convert raw RAIN RFID data into business data!

"ItemSense RAIN RFID Management Software" transforms RAIN RFID data into enterprise-driven information, simplifying the management and monitoring of RAIN-connected devices. By converting raw RAIN RFID data into business data, it allows for easy integration of Item Intelligence data (identification information, location, reliability of everyday items) into enterprise applications using open APIs or the Impinj ItemSense Management Console (IMC). [Features] ■ A flexible and adaptable system that grows with your business ■ Easily integrates with existing enterprise systems ■ Simultaneously disseminates information to multiple applications ■ Enterprise management *For more details, please refer to the PDF document or feel free to contact us.

  • Other operation management software
  • Data conversion software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Microphone MIC-520

Separate-type headset microphone

Fix the microphone to the head to achieve hands-free amplification. The frame and microphone can be separated, allowing you to hold the microphone part in your hand while speaking.

  • Other machine tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introduction to a general-purpose CAE pre/post-processor for finite element method analysis!

A comprehensive analysis solution with a main CAD and solver interface. Model creation and evaluation can be achieved with this single tool, and customization via API is also possible!

Simcenter Femap is software that provides pre- and post-processing capabilities for finite element method (FEM) analysis running on Windows. It integrates a series of tasks from geometry creation/modification to finite element model creation and post-processing, offering an efficient and streamlined working environment. Additionally, it features interfaces compatible with numerous CAD data and solvers, allowing for a high degree of versatility and enabling it to serve as a central component in CAE from a neutral standpoint. The features available in Simcenter Femap include: - Comprehensive CAD/analysis program interfaces - Fast generation of high-quality meshes - Efficient creation of finite element models - User interface focused on ease of use - Diverse and effective result display capabilities - Advanced customization options

  • Structural Analysis

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Let's learn about the current trend of "security measures"! [Acronis Edition]

Let's learn more about "Acronis," which plays the role of backup in the current trend of "security measures"!

Due to the increasing value of data, such as big data, data backup systems have become essential for companies. However, just because the amount of data has increased does not mean that the value of the data has decreased; rather, its importance has only grown. As the significance of data increases, backup/replication tools are becoming more crucial. This is where Acronis solutions come in! It is software that safely and securely protects your important data. This catalog provides a detailed explanation of such Acronis solutions. 【Catalog Table of Contents】 ■ Challenges and Acronis Solutions ■ Current Status of Security Measures and Recovery Strategies ■ Three Selected Case Studies & Emerging Challenges - "Inefficiency" - "Complexity" - "Vulnerability" ■ Introduction to Acronis Product Line - Acronis True Image - Acronis True Image OEM - Acronis Cyber Backup - Acronis Snap Deploy - Acronis Cyber Protect Cloud

  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Protecting your business from intellectual property theft due to cyber attacks【PowerDMARC】

Rapidly increasing cyber attacks from China! The targets are the intellectual properties of small and medium-sized enterprises, such as technology, designs, and patents. If we don't protect ourselves, the company could be in crisis!?

Do you think that cyber attacks only target large companies? In reality, cybercriminals often first infect small and medium-sized enterprises with viruses, and then embed viruses in emails sent to large companies from there. The small and medium-sized enterprises that are used as stepping stones have all their intellectual property and client information stolen. They then face mass production of similar products in countries like China, leading to price competition that results in losses. Furthermore, they may be held responsible for infecting large companies with viruses and could face liability for damages (as it falls under the tort of Article 709 of the Civil Code). The actual flow of an attack typically begins with sending emails that impersonate employees of the target company or disguise themselves as clients to employees of that company. Once someone opens the email, they get infected, and the infection spreads from there. In other words, eliminating the initial "spoofed emails impersonating internal or external individuals" is crucial for protecting both your company and your clients. So, what should be done to eliminate spoofed emails? The materials provide a detailed explanation of the above content. We highly recommend downloading them and starting your countermeasures immediately.

  • Company:Spelldata
  • Price:100,000 yen-500,000 yen
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration