We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Encryption software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Encryption software Product List and Ranking from 11 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Encryption software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. NRIセキュアテクノロジーズ Tokyo//IT/Telecommunications
  2. フォーカスシステムズ Tokyo//IT/Telecommunications
  3. オーク情報システム 本社、大阪事業所 Tokyo//IT/Telecommunications
  4. 4 ティエスエスリンク Tokyo//software
  5. 5 DataClasys Tokyo//software

Encryption software Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. [Information Leakage Countermeasures and Case Studies] Aflac Life Insurance (File Transfer) NRIセキュアテクノロジーズ
  2. 『FP Pro.』 フォーカスシステムズ
  3. 【Robust Security Measures】Utilization of Automatic Encryption Features / Sendai City Hall オーク情報システム 本社、大阪事業所
  4. 簡単ファイル暗号化ソフト『セキュアプライムFE』 ティエスエスリンク
  5. 4 [Security Measures] Easy-to-use and inexpensive file encryption software オーク情報システム 本社、大阪事業所

Encryption software Product List

1~15 item / All 17 items

Displayed results

[Security Measures] Easy-to-use and inexpensive file encryption software

The trump card of encryption that supports work styles in the new normal era! Encryption software with a master key.

"CyberCrypt Ver.5.1" is a file encryption software with a master key that prevents encryption forgetfulness and ensures thorough security measures. The number of scenarios handling important information outside the company or in the cloud is increasing. It is essential to encrypt and protect important files. Encrypting important files without the user's awareness. Achieving cost reduction and efficiency with simple operations. 【Features】 ■ Avoiding information leakage risks without burdening the user ■ A "master key" for peace of mind even if the encryption password is forgotten ■ Reducing operational costs without the need for a password management server ■ Ensuring safety and security in the new normal working style through encryption - For telework, remote work, or on cloud storage *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Prevent information leakage with file encryption software.

Enhance your security level! Introducing ways to prevent information leaks on the blog.

This blog discusses measures against information leakage using file encryption software. File encryption is the process of converting certain data into another form through special processing. To view encrypted data, it is necessary to decrypt the file using a "key," such as a password. By using file encryption software, even if data falls into the hands of a third party, its contents cannot be read. [Content] ■ Loss of customer trust if information leakage occurs ■ Software that automatically performs encryption is gaining attention ■ Choose based on the overall cost-performance ratio of information leakage countermeasures * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email digital signature and encryption software 'SPIS-BOX'

Prevent email spoofing, tampering, and eavesdropping! High-reliability email solution.

"SPIS-BOX" is software that allows you to add electronic signatures to your emails and encrypt them simply by integrating it with your current email environment. As a gateway-type solution, it works seamlessly with Microsoft 365, Google Workspace, your own mail server, or rental servers, significantly enhancing the reliability of emails without being dependent on the users. 【Features】 ■ Prevents forgetting to add electronic signatures and encryption leaks through automation ■ Centralized management of electronic certificates via the gateway ■ Achieves advanced email solutions by integrating with various email services *For more details, please refer to the PDF document or feel free to contact us.

  • Email/Fax transmission
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

SQLite-Encryption-Extension

Four different encryption algorithms are supported, including RC4, AES-128 in OFB mode, and AES-128 in CCM mode.

The "SQLite Encryption Extension" is an add-on for the public domain version of SQLite that allows applications to read and write encrypted database files. Versions of SQLite that include this product can read and write not only encrypted files but also regular database files created using the public domain version of SQLite. Applications can use SQLite's ATTACH command to communicate with two or more encrypted and/or unencrypted databases simultaneously. 【Product Overview】 ■ Type: Shareware ■ Language: English *For more details, please refer to the PDF documentation or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

【Robust Security Measures】Utilization of Automatic Encryption Features / Sendai City Hall

Introducing examples that have made significant contributions to strengthening information security! Achieving high security with minimal burden on users. *Trial version available.

In Sendai City, management personnel from each department serve as information managers, overseeing the proper operation and management of information security. However, prompted by a notification from the Ministry of Internal Affairs and Communications, a stricter policy regarding the handling of electronic data containing personal information has been established for the entire city of Sendai. As a result, we have implemented the file encryption software 'CyberCrypt' provided by our company. Consequently, encryption is automatically completed simply by placing files into a folder, just like operating a regular Windows PC, allowing users to maintain a high level of information security with minimal burden. 【Case Study】 ■Challenges - Responsibility as an administrative agency handling personal information - Moving away from security management that relies on the field - Strengthening security measures for all information containing personal data ■Effects - Establishing an environment that meets the increasing demands for information security - Utilizing the automatic encryption feature that staff can operate with minimal burden - Expanding encryption efforts to confidential data that does not contain personal information *If you would like a trial version, please indicate "trial version consideration" in the [Contact Us] section. *For more details, please refer to the PDF materials or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Personal Information Detection and Encryption Solution

"P-Pointer" × "DataClasys" collaboration! Personal information detection and encryption solution.

Our company has collaborated with Arara Inc. to achieve an ideal operation that detects personal and confidential information and encrypts files. Using "P-Pointer," which is utilized by many companies for its fast and advanced detection capabilities, we detect My Number and personal information, and encrypt files with "DataClasys." Even if files are leaked externally, information will not be compromised. 【Features】 ■ "P-Pointer" × "DataClasys" ■ Detection of My Number and personal information ■ Automatic encryption to prevent leakage *For more details, please refer to the PDF materials or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Presentation materials on file encryption technology for the manufacturing industry are available.

A must-read for those concerned about the leakage of technical information! How can file encryption prevent information leaks such as CAD and drawings? Measures in China are also included.

Our company, which handles file encryption software and security systems, is currently offering materials that explain file encryption technology for the manufacturing industry. We discuss security measures in environments that handle design drawings, such as CAD, concerns when using encrypted files in China, and the necessity of controlling printing and screen capturing. 【Contents】 ■ Advantages of file encryption technology ■ Functions and features of products necessary for encryption operations ■ Strengthening security and improving operational efficiency *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security and surveillance systems
  • Other security
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

CAD/CAM compatible transparent file encryption software, usable in China!

[Presenting Materials!] Detailed explanation of necessary information leakage countermeasures and basic security measures for manufacturing sites!

IP-guardV+ is a next-generation file encryption product that is location and application agnostic. It allows files to be used in an encrypted state without awareness from the time they are created until they are deleted, across various scenarios such as internal/external, offline/online, thin client/fat client, and domestic/international. Additionally, it supports various Windows applications, including CAD/CAM systems, enabling the protection of not only general document files but also files that are critical to businesses from leakage. 【Summary of Features】 - Capable of preventing information leakage both internally and externally - Usable globally (including China) - Employs a unique encryption engine that minimizes operational delays ★ Currently, you can also download the detailed explanation of basic security measures in the document titled 【Information Leakage Countermeasures Necessary for Manufacturing Sites: Manufacturing Industry Edition】. For more details, please download the catalog or contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cryptographic Software Next-Generation Electronic Filing SEA

Document management of digital information

Storage of all electronic information Keeping the data from that time as is Easy generation management

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introduction to "Secure Doc"

Protecting data with secure encryption solutions from the cloud to client PCs.

"Secure Doc" protects data from unauthorized use by encrypting the entire HDD/SSD. It requires authentication before the operating system of the encrypted device boots up. It detects the number of failed authentication attempts, and if the specified number of failures occurs, the PC becomes unbootable. Additionally, it can encrypt the entire drive of Windows tablets, allowing you to utilize the convenience of the tablet while enhancing security. 【Features】 ■ Control of PC booting through pre-boot authentication ■ Flexible operational forms ■ Usable on tablet devices ■ Abundant feature settings *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Other information systems
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『FP Pro.』

Advanced security with easy operation! The definitive encryption tool that can handle various situations.

"FP Pro." is a security application for Windows devices that ensures advanced security. Based on the powerful and fast encryption capabilities of CA FILE PROTECTOR, it has been equipped with new features to meet emerging needs. By creating encrypted files that can be decrypted simply by entering the encryption key, it allows the recipient to decrypt the files even if they do not have FP Pro. 【Features】 ■ Main three functions of encryption, decryption, and secure deletion displayed as icons ■ Create encrypted files tailored to specific uses, such as compressing and encrypting or splitting and encrypting ■ Ability to set encryption keys up to 65,536 bits in length ■ Secure key exchange functionality using public keys for safe transmission of encryption keys ■ Multi-user support allows management of key information for each user *For more details, please refer to the PDF documentation or feel free to contact us.

  • EAI/ETL/WEB application server

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『CRYPTO RELAY』

Encryption measures for data exchange between general-purpose machines, UNIX, and WinglayS!

"CRYPTO RELAY" is a file encryption tool equipped with the domestically developed high-speed encryption technology C4S, boasting high security. Due to its simple commands, it is easy to integrate into routine operations. It is effective in addressing issues such as the protection of customer information during outsourcing of tasks like invoicing and direct mail, as well as data protection for various outsourced computing tasks in accounting and finance. 【Features】 ■ Safe and easy file encryption security ■ Supports encryption keys up to 65,536 bits ■ Fast encryption and decryption with minimal impact on business operations ■ Easy integration into Shel/JCL/CL through batch processing, allowing for use with minimal changes *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information Leakage Countermeasures and Case Studies] Aflac Life Insurance (File Transfer)

A complete abolition of the transfer of personal information using physical media such as CD-ROMs and USB drives! Significantly reduce the risk of leaks and the burden of media management!

To Aflac Life Insurance Co., Ltd., which provides insurance products and services, we would like to introduce a case study of the implementation of "Crypto Delivery." In conjunction with the enforcement of the Personal Information Protection Law, the company adopted our product as a more secure method for the transfer of customer information and other data. They completely eliminated the use of CD-ROMs and USB drives, significantly minimizing the risk of information leaks while also achieving a substantial reduction in the operational burden of media management. 【Key Points】 - Complete elimination of data transfer via physical media - Reduction of information leakage risks and media management burdens - Encryption features that meet the necessary security levels for insurance companies - Implementation of the AES encryption standard, which is the U.S. encryption standard *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall and intrusion prevention
  • Encryption and authentication
  • Virus software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

簡単ファイル暗号化ソフト『セキュアプライムFE』

簡単操作でファイルのセキュリティを強化!今あるセキュリティ課題を解決します

『セキュアプライムFE』は、簡単操作で使えるファイル暗号化ソフトです。 ファイルをドラッグ&ドロップするだけで簡単に暗号化。 ファイル利用後は自動で再暗号化して安全性を継続します。 さらに、自動再暗号化や一時ファイルの削除により、情報漏洩を防止。 Windows/Macに対応し、同じファイルを相互のOSで利用することができます。 【特長】 ■簡単操作でファイルを暗号化 ■Windowsでは自己復号型で暗号化、アプリをインストールしなくても復号可能 ■Windows/Macでは、再暗号化機能で、平文を残さず、暗号化し忘れも防止 ■日本語OS以外にも対応しているので海外へのファイル送付にも利用可能 ※詳しくはPDF資料をご覧いただくか、お気軽にお問い合わせ下さい。

  • Encryption and authentication
  • Personal authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

USB file encryption software "Secure Prime UFE"

Enhance security without managing USB devices! Use them in an always-encrypted state to ensure safety.

"Secure Prime UFE" is an easy encryption software for files that you carry on USB devices. No special encryption operations are required. You can easily encrypt files just as you have been using them until now. Additionally, you can use as many USB memory devices as you have on one PC, which helps reduce implementation costs. Furthermore, there are no cumbersome registration processes, which alleviates operational burdens. 【Features】 ■ Safely use USB devices at your destination ■ No device management is required, allowing for enhanced security without operational burdens ■ No special encryption operations are necessary ■ Easy encryption using the same methods as before ■ No tedious registration processes, reducing operational burdens *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration