We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Firewall.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Firewall Product List and Ranking from 21 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Aug 20, 2025~Sep 16, 2025
This ranking is based on the number of page views on our site.

Firewall Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Aug 20, 2025~Sep 16, 2025
This ranking is based on the number of page views on our site.

  1. BREXA Technology(旧社名:アウトソーシングテクノロジー) Tokyo//others
  2. ナセル Tokyo//Industrial Electrical Equipment
  3. 東芝ITサービス Kanagawa//Service Industry
  4. 4 アイ・ビー・エス・ジャパン Kanagawa//IT/Telecommunications
  5. 5 株式会社ハイブリッチ/ビス Tokyo//IT/Telecommunications

Firewall Product ranking

Last Updated: Aggregation Period:Aug 20, 2025~Sep 16, 2025
This ranking is based on the number of page views on our site.

  1. DeepKeep AI Prompt Firewall BREXA Technology(旧社名:アウトソーシングテクノロジー)
  2. IPS-compatible ultra-rugged firewall SNxr1200 ナセル
  3. Palo Alto Networks® Next-Generation Firewall 東芝ITサービス
  4. 4 Moxa IEF-G9010 Series アイ・ビー・エス・ジャパン
  5. 4 Application delivery + firewall Thunder CFW A10ネットワークス A10ネットワークス株式会社

Firewall Product List

16~30 item / All 31 items

Displayed results

[Report] Market for Network Security Firewalls

"Free samples" are currently being offered! Please check the application method from the [PDF download] button, or apply directly through the related links.

The network security firewall market is expected to grow to $4.73 billion from 2023 to 2028, with a CAGR of 13.27% during the forecast period. This report includes a comprehensive analysis of the network security firewall market, market size and forecasts, trends, growth drivers, challenges, and vendor analysis covering approximately 25 vendors.

  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cloud-managed UTM firewall "DBG Series"

Easily build a high-speed IPv6 network in the cloud!

The cloud-based network management service "Nuclias Cloud" compatible UTM firewall 'DBG Series' offers two models to choose from: the compact wireless model "DBG-1000," which supports Wi-Fi 6 (IEEE802.11ax) with 2 spatial streams, and the wired model "DBG-2000," which supports 2.5G dual WAN ports. With Nuclias zero-touch setup, configuration work on-site is completed simply by connecting to the internet line. The DBG series supports not only traditional connection methods like PPPoE but also the next-generation internet connection environment IPoE, making it easy to build networks with high-speed IPv6 communication. Additionally, for VPN connections, the DBG series includes a Quick VPN feature that allows for easy connections between DBG units without complex configuration input, as well as security features such as application control, web content filtering, and WAN load balancing (available only on DBG-2000), making it an ideal network product for small to medium-sized enterprises expanding their business across multiple locations.

  • VPN/Wide Area Ethernet

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Proven Track Record] Targeted Attack Email Response Training Service to Protect the Manufacturing Industry

Improving security awareness comes from training and education. Cybersecurity measures to protect the manufacturing industry from increasingly serious cyber attacks every day!

"Training is conducted every year, but since the content is the same, we want some changes." "We would like to customize the training content to fit our company's circumstances." Do you have any concerns? SCC's "Training Service" allows for training that closely resembles normal conditions by varying the content and difficulty of email messages according to job positions. By including training for related and group companies, we aim to grasp the overall situation of the organization and enhance security awareness. Additionally, the educational content can be customized to fit the customer's circumstances. [Features] ■ Diverse email templates ■ Abundant customization options ■ Comprehensive educational services *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Why do attackers target Active Directory first?

High-value ransom theft: Aiming for large-scale information theft from file servers and the shutdown of core systems, seizing administrator privileges of Active Directory that can take over the network.

Active Directory is a convenient system for users and administrators as an authentication infrastructure for authentication and authorization. At the same time, it is also a system that is advantageous for ransomware attackers. By taking over Active Directory, attackers can change user account passwords or create new accounts, allowing them to access the entire system. Once compromised, they can use the organization's management information and user account modification privileges to carry out cross-cutting attacks such as service disruption or interference. As a result, the entire organization can suffer serious impacts on its operations. This document explains the attackers' objectives, the flow of attacks, and at which stages it is possible to prevent damage.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What are the pitfalls of countermeasures seen from real examples of attacks? (With countermeasure checklist)

Managing AD is a turning point of fate! Practical security measures to prevent damage caused by mismatched responses, based on S&J's examples of cyber attack responses.

S&J Corporation has provided responses to cyber attacks for numerous companies up to this point. Based on the situation of cyber attack damages reported daily and the actual cases of attacks that S&J has responded to, one of the factors that can lead to suffering from cyber attacks, including ransomware, is the mismatch of response measures. Here, we have prepared a checklist in the form of "checking the company's status" based on the cyber attack flow, allowing you to recognize the current state of your countermeasures. We will also explain the effective monitoring of "Active Directory" as a post-intrusion measure to prevent the expansion of damages.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] How to Choose the Right Industrial Firewall: 7 Points to Consider

Here are seven considerations for implementing industrial network security!

This document outlines how to choose the appropriate industrial firewall, including seven key points to consider. It explains important considerations for implementing network security and managing network security risks. Additionally, it introduces methods for developing mitigation strategies for specific issues to ensure the safety and reliability of industrial networks, as well as how to select the appropriate industrial firewall. [Contents] ■ The appropriate industrial firewall enhances the safety and reliability of control systems ■ Considerations for implementing industrial network security *For more details, please download the PDF or feel free to contact us.

  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Prisma Access

Cloud firewall that enables flexible network expansion.

Prisma Access is a cloud-native Secure Access Service Edge (SASE) solution provided by Palo Alto Networks. The feature of Prisma Access is that it integrates comprehensive network security with seamless user access, enabling the creation of a safe and efficient network environment regardless of location. **Reasons to Choose Prisma Access** - **Global Security Coverage**: It provides secure access from anywhere in the world through a cloud-based infrastructure. - **Multi-layered Security Features**: It integrates multiple security features such as firewalls, Intrusion Prevention Systems (IPS), and URL filtering to achieve comprehensive protection. - **Consistent Security Policies**: It allows for the application of unified security policies across all users, devices, and applications. - **Network Performance Optimization**: Its cloud-native architecture enables fast and low-latency access, enhancing the user experience.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Industrial Next-Generation Firewall EDF-G1002-BP Series

Security measures for OT networks. Dynamically prevent malicious cyber threat activities with IPS/IDS.

The EDF-G1002-BP series is an industrial LAN firewall designed to protect mission-critical assets at the OT network edge through advanced intrusion prevention and detection systems (IPS/IDS). It supports both "monitoring" and "protection" modes, allowing administrators to fully visualize cyber threat activities on the network in "monitoring" mode. If a threat is detected, administrators can easily switch to "protection" mode to block and contain malicious actions. With advanced deep packet inspection (DPI) technology, it recognizes industrial protocol data and enables fine-grained command control traffic to critical controllers. Additionally, it supports software-configurable Gen3 LAN bypass, facilitating bump-in-the-wire installations for industrial applications such as ITS, pump and treat systems at water supply stations, oil and gas distributed control systems, and PLC/SCADA systems for factory automation, minimizing the impact of installation.

  • 0085fe6deb00d64a277610b5996e7ed9339889fc66c2cae114ed3_l.jpg
  • ca9d9bf7dadd558a77dc5e63a005d9991b6dd1d766c2cae17ee2d_l (1).jpg
  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Research Report] Global Market for Next-Generation Firewalls (NGFW)

"Free samples" are currently being offered! Please check the application method from the [PDF download] button or apply directly from the related links.

The global next-generation firewall (NGFW) market size is projected to grow from 5 billion USD in 2023 to 8.6 billion USD by 2028, with a CAGR of 11.4% during the forecast period. As cyber threats become more severe, companies are seeking advanced cybersecurity solutions, driving the growth of this market. NGFWs utilize machine learning for threat identification and integrate traditional functions with cutting-edge features such as intrusion prevention and application control. Real-world incidents like the cyberattack on Lurie Children's Hospital in 2023 highlight the urgency for robust cybersecurity, making NGFWs essential.

  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

DeepKeep AI Prompt Firewall

Protecting AI safety! Real-time monitoring and defense to ensure compliance with corporate security and ethical standards.

"DeepKeep" is a firewall that protects prompts for generative AI. With advanced security features, it prevents unauthorized access. Real-time monitoring is possible, allowing for immediate detection of anomalies. Additionally, sophisticated AI algorithms block unintended inappropriate expressions and inaccurate information in advance, optimizing the quality and security of outputs. [Features] ■ Integrates risk analysis, prevention/settings, monitoring/detection, and protection/optimization into a single management platform ■ Visualizes operational AI models to ensure protection from inappropriate access ■ Covers the lifecycle of AI models from introduction to operation *For more details, please refer to the PDF document or feel free to contact us.

  • DeepKeep 生成AIプロンプト用ファイアウォール2.png
  • Firewall and intrusion prevention
  • EAI/ETL/WEB application server

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Features of Sophos Firewall

Identify high-risk users based on web browsing history and ATP trigger counts using the user threat index!

We would like to introduce the features of 'Sophos Firewall' that we handle. With a dedicated user interface equipped with an interactive control center, you can easily check important information at a glance with clear color coding (red, yellow, green) like a traffic light. The advanced search function allows optimized navigation, enabling you to move to your desired location with just two clicks. 【Main Features】 ■ Xstream TLS Inspection provides high performance, support for TLS 1.3 without downgrading, enterprise-level policies with built-in exceptions that are not dependent on ports, unique dashboard visibility, and troubleshooting for compatibility. ■ The Xstream DPI engine offers stream scanning protection for IPS, AV, web, application control, and TLS inspection with a single high-performance engine. *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Challenges in achieving an effective CSIRT.

Instead of starting from the implementation phase, let's first understand the current situation! Achieving effective and efficient security measures.

I would like to introduce the challenges in realizing an effective CSIRT. Many companies tend to first organize their security operations under the keywords CSIRT and SOC in order to build their own security operation systems. Ideally, it is necessary to set the goals for the security operation policies that should be implemented in-house, define the roles (CSIRT, SOC) towards achieving those goals, and establish the mechanisms for operation. To do this, it is essential to understand the current state of the company's security, determine the policies and priorities, and take action. However, many companies struggle to operate effectively after establishing their systems and face various challenges. 【Phases】 ■ Current Situation Assessment Phase: Extraction of the company's situation and challenges ■ Countermeasure Planning Phase: Formulation of the order of issue resolution and responsible parties ■ System Construction Phase: Building the system decided in the previous phase ■ Operation Phase: Implementation of PDCA *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The Basics of Ransomware Countermeasures That You Can't Ask About Now

Dangerous if you don't know! Essential measures to protect your company from ransomware.

■By the time you realize it, it's too late: The Active Directory server is the first target of attackers. Recently, there have been numerous significant security incidents that greatly impact business continuity for companies. Traditional ransomware would encrypt files and demand a ransom for decryption. However, the new type of ransomware has evolved to first extract information and then encrypt files, publicly disclosing some of the extracted information on the dark web, threatening to release all information unless a ransom is paid. Specifically, these attacks target a large number of organizations indiscriminately, with hackers infiltrating organizations through vulnerabilities or misconfigurations. After taking over the network, they steal a large amount of confidential information. Subsequently, they introduce ransomware, causing large-scale system failures that lead to business shutdowns, or they threaten to publish the stolen information on the dark web to extort ransom. In these incidents, it is often the case that attackers gain administrative privileges over the AD server, which is the core of the system, at an early stage, taking over the network without the affected companies realizing it, preventing them from avoiding business shutdowns or significant damage.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Aren't you worried about how effective the existing security measures are?

Explanation of the cybersecurity measures that should be taken now.

In recent years, digital technologies such as AI, IoT, and big data have become widespread, and the methods and entry points for cyberattacks have also become diverse. In response to the sophistication and cunning of cyberattacks, as well as the frequent occurrence of ransomware attacks regardless of company size, there are voices expressing vague anxieties such as, "I am worried that a security incident might occur," "I want to implement security measures, but I don't know where to start," and "I cannot determine if the current measures are truly effective." Concerns and worries: - I have implemented security products, but I am anxious about whether they are functioning correctly. - What kind of security measures are other companies taking? - Will we be able to respond adequately if an incident occurs? - I want to hire security personnel, but I cannot find suitable candidates. This document explains the cybersecurity measures that should truly be implemented now.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Moxa LAN Firewall 'EDF-G1002-BP'

Dynamically prevent malicious cyber attacks with IPS/IDS! Protect mission-critical assets.

Moxa's "EDF-G1002-BP Series" is an industrial LAN firewall equipped with IPS and DPI functions to protect mission-critical assets and network zones. It supports software-configurable Gen3 LAN bypass, enabling bump-in-the-wire installation. This minimizes the impact of installation on industrial applications such as ITS, pump and processing systems at water supply stations, oil/gas distributed control systems, and PLC/SCADA systems for factory automation. 【Features】 ■ Bump-in-the-wire installation that does not affect the network ■ Gen3 LAN bypass for system fault tolerance ■ Industrial Intrusion Prevention/Detection System (IPS/IDS) ■ Supports secure boot to check system integrity ■ One-click check for firewall policy misconfigurations *For more details, please download the PDF or feel free to contact us.

  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration