We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Encryption software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Encryption software Product List and Ranking from 11 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Dec 24, 2025~Jan 20, 2026
This ranking is based on the number of page views on our site.

Encryption software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Dec 24, 2025~Jan 20, 2026
This ranking is based on the number of page views on our site.

  1. フォーカスシステムズ Tokyo//IT/Telecommunications
  2. NRIセキュアテクノロジーズ Tokyo//IT/Telecommunications
  3. DataClasys Tokyo//software
  4. 4 オーク情報システム 本社、大阪事業所 Tokyo//IT/Telecommunications
  5. 5 クリプトソフトウエア 本社 Niigata//software

Encryption software Product ranking

Last Updated: Aggregation Period:Dec 24, 2025~Jan 20, 2026
This ranking is based on the number of page views on our site.

  1. [Information Leakage Countermeasures and Case Studies] Aflac Life Insurance (File Transfer) NRIセキュアテクノロジーズ
  2. 『FP Pro.』 フォーカスシステムズ
  3. Personal Information Detection and Encryption Solution DataClasys
  4. 4 [Security Measures] Easy-to-use and inexpensive file encryption software オーク情報システム 本社、大阪事業所
  5. 4 Cryptographic Software Next-Generation Electronic Filing SEA クリプトソフトウエア 本社

Encryption software Product List

16~16 item / All 16 items

Displayed results

Encrypt almost all files regardless of file format.

Prevent information leakage even when taken out! Safe to use outside the company and with contractors.

We would like to introduce "Data Crisis," developed to balance the protection and management of confidential information such as personal and customer data with information sharing. It can encrypt and utilize almost all files regardless of file format, preventing information leakage even if taken outside. 【Features】 ■ Encrypts all types of Windows files ■ Allows for detailed operational rules to be set ■ Easy integration and collaboration with existing systems ■ Can be used safely outside the company and with contractors ■ Flexible response unique to in-house development *For more details, please refer to the PDF document or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration