Firewallのメーカーや取扱い企業、製品情報、参考価格、ランキングをまとめています。
イプロスは、 製造業 BtoB における情報を集めた国内最大級の技術データベースサイトです。

Firewall - メーカー・企業21社の製品一覧とランキング

更新日: 集計期間:Nov 19, 2025~Dec 16, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

Firewallのメーカー・企業ランキング

更新日: 集計期間:Nov 19, 2025~Dec 16, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. ナセル Tokyo//Industrial Electrical Equipment
  2. アイ・ビー・エス・ジャパン Kanagawa//IT/Telecommunications
  3. BREXA Technology(旧社名:アウトソーシングテクノロジー) Tokyo//others
  4. ジャパンコンピューターサービス 本社、大阪事業所、LCMセンター Tokyo//IT/Telecommunications
  5. ベストプランナー Saitama//IT/Telecommunications

Firewallの製品ランキング

更新日: 集計期間:Nov 19, 2025~Dec 16, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. IPS-compatible ultra-rugged firewall SNxr1200 ナセル
  2. Industrial Next-Generation Firewall EDF-G1002-BP Series アイ・ビー・エス・ジャパン
  3. DeepKeep AI Prompt Firewall BREXA Technology(旧社名:アウトソーシングテクノロジー)
  4. Sophos Firewall ジャパンコンピューターサービス 本社、大阪事業所、LCMセンター
  5. Implement UTM and firewall to strengthen security measures. ベストプランナー

Firewallの製品一覧

1~15 件を表示 / 全 32 件

表示件数

IPS-compatible ultra-rugged firewall SNxr1200

Next-generation firewall for defense with IPS/IDS support and environmental resilience.

The SNxr1200 is a next-generation firewall developed for harsh environments in defense applications, providing the advanced security required for communications. It maximally protects the most sensitive communications through secure storage of confidential information, IPS analysis of VPN flows, and compliance with Restricted Distribution (RD) mode. The SNxr1200 firewall offers optimal service continuity with features such as redundant access links and communication flow management. It has environmental performance compliant with MIL-STD-810G / MIL-STD-461F / DO-160G / IP67, with an operating temperature range of -40° to +71°C, and can withstand harsh environments including vibration, shock, electromagnetic waves, high humidity, high altitude, water, dust, and salt spray.

  • Communications
  • Firewall and intrusion prevention

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Moxa IEF-G9010 Series

8 GbE Copper + 2 GbE SFP Multi-Port Industrial IPS Firewall

The Moxa IEF-G9010 series industrial IPS firewall can segment and obscure networks, protecting mission-critical assets with industrial-grade IPS and fine-grained access control. Meanwhile, the Security Dashboard Console (SDC) software, when used in conjunction with the IEF-G9010 series, provides an additional layer of protection through centralized visualization of critical assets, network analysis, and automatic pattern updates.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[To member companies of the Automotive Workers Union and affiliated unions] Cloud-based WAF service Scutum

We protect companies' websites from the risks of information leaks and tampering with industry-leading cutting-edge technology.

To the information systems personnel of companies using externally available web applications in the automotive industry! The new web application firewall "Scutum" serves as a "shield" on the internet, protecting your company's website from unauthorized access with a security service. It operates with low cost and without operational burden. You can provide a safer web service without the need for unnecessary in-house equipment. For more details, please visit the product homepage from the "Related Links" and feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Report] Market for Network Security Firewalls

"Free samples" are currently being offered! Please check the application method from the [PDF download] button, or apply directly through the related links.

The network security firewall market is expected to grow to $4.73 billion from 2023 to 2028, with a CAGR of 13.27% during the forecast period. This report includes a comprehensive analysis of the network security firewall market, market size and forecasts, trends, growth drivers, challenges, and vendor analysis covering approximately 25 vendors.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

aGALAXY FOR THUNDER TPS

Real-time implementation of global-scale DDoS attack countermeasures!

"aGALAXY FOR THUNDER TPS" is a DDoS attack defense dedicated appliance that works in conjunction with Thunder TPS(R) (Threat Protection System) to provide monitoring functions, defense capabilities, attack detection, alerts, and reporting functions for the purpose of protecting systems from global DDoS attacks in a centralized management system. With the DDoS attack countermeasure solution, enterprises and service providers can accurately identify legitimate users and DDoS attackers. Security personnel can effectively achieve DDoS attack defense with industry-leading defense performance and appropriate workflows. 【Benefits】 ■ Defense across the entire network ■ Simple management ■ Maximization of agility ■ Reporting *For more details, please download the PDF or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Application delivery + firewall Thunder CFW

It is an application delivery product that integrates features such as high-performance server load balancing, firewall, SSL visualization, and proxy.

The A10 Thunder CFW is an integrated firewall (L4-7 switch) product equipped with a proprietary OS called "ACOS," capable of processing application traffic at high speed, enabling the stable and secure delivery of business-critical web applications. In addition to server load balancing capabilities that facilitate fast web application delivery, it consolidates multiple security features such as firewall, IPSec VPN, secure web gateway, DNS over HTTPS (DoH), CGNAT, and DDoS protection into one solution, allowing for reductions in rack space, operational costs, and equipment costs. Furthermore, all features are included as standard, so there is no need to purchase separate feature or performance licenses. You can immediately use the features you want.

  • Routers, Switches, and Hubs
  • Firewall and intrusion prevention

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Palo Alto Networks® Next-Generation Firewall

Introduction to Toshiba IT Services' One-Stop Network Security Service

We provide comprehensive support for network security utilizing Palo Alto Networks' next-generation firewall. We offer a one-stop solution for suitable network security measures tailored to the scale and purpose of use. Based on our extensive experience, we ensure peace of mind in network security from "arrangement, design, and construction" to "operation and maintenance" regarding Palo Alto Networks' next-generation firewall. 【Benefits】 ■ A smooth and cost-effective secure environment can be established ■ Reduces the management burden on customers ■ Enables identification of latent risks ■ Suitable for customers without a remote environment *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Other contract services
  • Other services

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Cloud-managed UTM firewall "DBG Series"

Easily build a high-speed IPv6 network in the cloud!

The cloud-based network management service "Nuclias Cloud" compatible UTM firewall 'DBG Series' offers two models to choose from: the compact wireless model "DBG-1000," which supports Wi-Fi 6 (IEEE802.11ax) with 2 spatial streams, and the wired model "DBG-2000," which supports 2.5G dual WAN ports. With Nuclias zero-touch setup, configuration work on-site is completed simply by connecting to the internet line. The DBG series supports not only traditional connection methods like PPPoE but also the next-generation internet connection environment IPoE, making it easy to build networks with high-speed IPv6 communication. Additionally, for VPN connections, the DBG series includes a Quick VPN feature that allows for easy connections between DBG units without complex configuration input, as well as security features such as application control, web content filtering, and WAN load balancing (available only on DBG-2000), making it an ideal network product for small to medium-sized enterprises expanding their business across multiple locations.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Implement UTM and firewall to strengthen security measures.

Let's strengthen the company's information security measures by implementing UTM and firewalls.

A firewall that protects against threats from external networks such as businesses through its firewall functions. In the first place, a firewall does not have zero holes. If all holes were closed, it would lead to inconveniences such as being unable to access the internet or email, so there are intentionally open holes. The mechanism of a firewall allows permitted data (packets) to enter the internal network while discarding or notifying about unauthorized packets as invalid data, functioning like a 'guard' or gatekeeper at a large factory or company. In other words, If a malicious virus, for example, manages to evade the guard's watch and disguises itself with false information, it could potentially infiltrate the internal network.

  • filtering
  • Firewall and intrusion prevention
  • Other PCs and OA equipment

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Proven Track Record] Targeted Attack Email Response Training Service to Protect the Manufacturing Industry

Improving security awareness comes from training and education. Cybersecurity measures to protect the manufacturing industry from increasingly serious cyber attacks every day!

"Training is conducted every year, but since the content is the same, we want some changes." "We would like to customize the training content to fit our company's circumstances." Do you have any concerns? SCC's "Training Service" allows for training that closely resembles normal conditions by varying the content and difficulty of email messages according to job positions. By including training for related and group companies, we aim to grasp the overall situation of the organization and enhance security awareness. Additionally, the educational content can be customized to fit the customer's circumstances. [Features] ■ Diverse email templates ■ Abundant customization options ■ Comprehensive educational services *For more details, please refer to the PDF materials or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Why do attackers target Active Directory first?

High-value ransom theft: Aiming for large-scale information theft from file servers and the shutdown of core systems, seizing administrator privileges of Active Directory that can take over the network.

Active Directory is a convenient system for users and administrators as an authentication infrastructure for authentication and authorization. At the same time, it is also a system that is advantageous for ransomware attackers. By taking over Active Directory, attackers can change user account passwords or create new accounts, allowing them to access the entire system. Once compromised, they can use the organization's management information and user account modification privileges to carry out cross-cutting attacks such as service disruption or interference. As a result, the entire organization can suffer serious impacts on its operations. This document explains the attackers' objectives, the flow of attacks, and at which stages it is possible to prevent damage.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

What are the pitfalls of countermeasures seen from real examples of attacks? (With countermeasure checklist)

Managing AD is a turning point of fate! Practical security measures to prevent damage caused by mismatched responses, based on S&J's examples of cyber attack responses.

S&J Corporation has provided responses to cyber attacks for numerous companies up to this point. Based on the situation of cyber attack damages reported daily and the actual cases of attacks that S&J has responded to, one of the factors that can lead to suffering from cyber attacks, including ransomware, is the mismatch of response measures. Here, we have prepared a checklist in the form of "checking the company's status" based on the cyber attack flow, allowing you to recognize the current state of your countermeasures. We will also explain the effective monitoring of "Active Directory" as a post-intrusion measure to prevent the expansion of damages.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Information] How to Choose the Right Industrial Firewall: 7 Points to Consider

Here are seven considerations for implementing industrial network security!

This document outlines how to choose the appropriate industrial firewall, including seven key points to consider. It explains important considerations for implementing network security and managing network security risks. Additionally, it introduces methods for developing mitigation strategies for specific issues to ensure the safety and reliability of industrial networks, as well as how to select the appropriate industrial firewall. [Contents] ■ The appropriate industrial firewall enhances the safety and reliability of control systems ■ Considerations for implementing industrial network security *For more details, please download the PDF or feel free to contact us.

  • Firewall and intrusion prevention

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Prisma Access

Cloud firewall that enables flexible network expansion.

Prisma Access is a cloud-native Secure Access Service Edge (SASE) solution provided by Palo Alto Networks. The feature of Prisma Access is that it integrates comprehensive network security with seamless user access, enabling the creation of a safe and efficient network environment regardless of location. **Reasons to Choose Prisma Access** - **Global Security Coverage**: It provides secure access from anywhere in the world through a cloud-based infrastructure. - **Multi-layered Security Features**: It integrates multiple security features such as firewalls, Intrusion Prevention Systems (IPS), and URL filtering to achieve comprehensive protection. - **Consistent Security Policies**: It allows for the application of unified security policies across all users, devices, and applications. - **Network Performance Optimization**: Its cloud-native architecture enables fast and low-latency access, enhancing the user experience.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録