We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Defense software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Defense software Product List and Ranking from 5 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 03, 2025~Sep 30, 2025
This ranking is based on the number of page views on our site.

Defense software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 03, 2025~Sep 30, 2025
This ranking is based on the number of page views on our site.

  1. S&J Tokyo//IT/Telecommunications
  2. DAIKO XTECH Tokyo//IT/Telecommunications
  3. テレマ IT事業部 Chiba//software
  4. BlackBerry Japan Tokyo//IT/Telecommunications
  5. レインフォレスト Tokyo//Information and Communications

Defense software Product ranking

Last Updated: Aggregation Period:Sep 03, 2025~Sep 30, 2025
This ranking is based on the number of page views on our site.

  1. Domestic EDR + Monitoring Operation Service "KeepEye" S&J
  2. [Development Case] Building a Multi-Layer Defense Network Environment Using TiFRONT テレマ IT事業部
  3. AppGuard DAIKO XTECH
  4. BlackBerry Protect BlackBerry Japan
  5. 4 GOOSEC レインフォレスト

Defense software Product List

1~5 item / All 5 items

Displayed results

[Development Case] Building a Multi-Layer Defense Network Environment Using TiFRONT

The introduction is quite easy and does not particularly require an administrator! We support the construction of networks.

Are you having trouble connecting embedded devices to the network because antivirus software cannot be installed? In cases where new types of viruses are encrypted and sent as attachments in emails, which are often the source of damage, existing measures cannot prevent them. Therefore, we recommend a multi-layered defense using 'TiFRONT.' With our uniquely developed security engine "TiMatrix," it has the capability to instantly detect and block aggressive traffic. Additionally, it comes with a free software called "TiManager," which allows for network visualization and traffic monitoring when used. Our company provides support for building networks using this product. Please contact us if you need assistance. *For more details, please refer to the PDF materials or feel free to contact us.

  • Embedded system design service
  • Server monitoring and network management tools
  • Other network tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AppGuard

A completely new solution that overturns the concept of existing security solutions.

AppGuard is a product of the 'OS Protect type (defensive type)' that defends endpoints from zero-day and unknown attacks. Unlike traditional detection-based products, AppGuard is a security product that prevents malware from infecting (and damaging) the operating system rather than detecting and removing it. 【Features】 ■ Ensures system safety ■ Lightweight and fast ■ No updates required ■ Centralized management available ■ Simple operation ■ Strong defense capabilities *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

BlackBerry Protect

Defense against unknown threats such as new types of ransomware. A new generation of security using AI clients based on mathematical models. Applicable not only to information systems but also to healthcare and factories.

"BlackBerry Protect" is a product that provides additional security controls to prevent security breaches and defend against various attacks, including script-based, fileless, memory, and external device-based attacks. It achieves this without requiring user or administrator intervention, cloud connectivity, signatures, heuristics, or sandboxes. 【Features】 ■ True zero-day defense ■ Enforcement of device usage policies ■ Malware leveraging AI (artificial intelligence) ■ Detection and defense against memory exploits ■ Application control for fixed-function devices *For more details, please refer to the PDF document or feel free to contact us.

  • Other embedded systems (software and hardware)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Domestic EDR + Monitoring Operation Service "KeepEye"

Leave complex operations to us / Domestic EDR developed in-house + monitoring operation service (MDR) for isolation response included.

It has become difficult to defend against increasingly sophisticated cyber attacks using traditional firewalls and antivirus software. Although tools to defend against advanced cyber attacks are now offered by multiple vendors, these tools are designed to be operated by security experts, making it challenging for companies that cannot afford to hire security professionals to actually implement them, resulting in merely having the tools without proper utilization. KeepEye enables the operation against advanced cyber attacks with "minimal operation that does not require the customer to hire security experts" by handling most of the operations ourselves.

  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

GOOSEC

It is possible to defend against online skimming in real time.

"GOOSEC" is software designed to combat online skimming. By detecting and preventing online skimming, it protects against the leakage of credit card information and personal data entered on e-commerce sites. Additionally, by using crawlers, it can detect where tampering occurs that leads users to fake payment pages and notify the e-commerce site administrators, minimizing potential damage. [Services] ■ Real-time defense and detection of online skimming incidents ■ Skimming detection functionality using crawlers tailored to the characteristics of e-commerce sites ■ Countermeasures against the disabling of detection scripts *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration