Firewallのメーカーや取扱い企業、製品情報、参考価格、ランキングをまとめています。
イプロスは、 製造業 BtoB における情報を集めた国内最大級の技術データベースサイトです。

Firewall - メーカー・企業21社の製品一覧とランキング

更新日: 集計期間:Nov 19, 2025~Dec 16, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

Firewallのメーカー・企業ランキング

更新日: 集計期間:Nov 19, 2025~Dec 16, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. ナセル Tokyo//Industrial Electrical Equipment
  2. アイ・ビー・エス・ジャパン Kanagawa//IT/Telecommunications
  3. BREXA Technology(旧社名:アウトソーシングテクノロジー) Tokyo//others
  4. ジャパンコンピューターサービス 本社、大阪事業所、LCMセンター Tokyo//IT/Telecommunications
  5. ベストプランナー Saitama//IT/Telecommunications

Firewallの製品ランキング

更新日: 集計期間:Nov 19, 2025~Dec 16, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. IPS-compatible ultra-rugged firewall SNxr1200 ナセル
  2. Industrial Next-Generation Firewall EDF-G1002-BP Series アイ・ビー・エス・ジャパン
  3. DeepKeep AI Prompt Firewall BREXA Technology(旧社名:アウトソーシングテクノロジー)
  4. Sophos Firewall ジャパンコンピューターサービス 本社、大阪事業所、LCMセンター
  5. Implement UTM and firewall to strengthen security measures. ベストプランナー

Firewallの製品一覧

16~30 件を表示 / 全 32 件

表示件数

Industrial Next-Generation Firewall EDF-G1002-BP Series

Security measures for OT networks. Dynamically prevent malicious cyber threat activities with IPS/IDS.

The EDF-G1002-BP series is an industrial LAN firewall designed to protect mission-critical assets at the OT network edge through advanced intrusion prevention and detection systems (IPS/IDS). It supports both "monitoring" and "protection" modes, allowing administrators to fully visualize cyber threat activities on the network in "monitoring" mode. If a threat is detected, administrators can easily switch to "protection" mode to block and contain malicious actions. With advanced deep packet inspection (DPI) technology, it recognizes industrial protocol data and enables fine-grained command control traffic to critical controllers. Additionally, it supports software-configurable Gen3 LAN bypass, facilitating bump-in-the-wire installations for industrial applications such as ITS, pump and treat systems at water supply stations, oil and gas distributed control systems, and PLC/SCADA systems for factory automation, minimizing the impact of installation.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Research Report] Global Market for Next-Generation Firewalls (NGFW)

"Free samples" are currently being offered! Please check the application method from the [PDF download] button or apply directly from the related links.

The global next-generation firewall (NGFW) market size is projected to grow from 5 billion USD in 2023 to 8.6 billion USD by 2028, with a CAGR of 11.4% during the forecast period. As cyber threats become more severe, companies are seeking advanced cybersecurity solutions, driving the growth of this market. NGFWs utilize machine learning for threat identification and integrate traditional functions with cutting-edge features such as intrusion prevention and application control. Real-world incidents like the cyberattack on Lurie Children's Hospital in 2023 highlight the urgency for robust cybersecurity, making NGFWs essential.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Gi/SGi Firewall "Thunder CFW"

Supporting the construction of mobile and cloud networks for service providers with advanced security.

"Thunder CFW" is a security product built on the Advanced Core Operating System (ACOS(R)) platform, equipped with Gi/SGi firewall capabilities. It achieves the necessary firewall connection rates and throughput for mobile carriers. Additionally, it protects subscribers through stateful firewalls and safeguards LTE services from Distributed Denial of Service (DDoS) attacks and data tampering. 【Benefits】 ■ Protects mobile infrastructure from DDoS attacks and targeted attacks ■ Extends the life of IPv4 networks ■ Meets stringent requirements for performance and scalability *For more details, please download the PDF or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

DeepKeep AI Prompt Firewall

Protecting AI safety! Real-time monitoring and defense to ensure compliance with corporate security and ethical standards.

"DeepKeep" is a firewall that protects prompts for generative AI. With advanced security features, it prevents unauthorized access. Real-time monitoring is possible, allowing for immediate detection of anomalies. Additionally, sophisticated AI algorithms block unintended inappropriate expressions and inaccurate information in advance, optimizing the quality and security of outputs. [Features] ■ Integrates risk analysis, prevention/settings, monitoring/detection, and protection/optimization into a single management platform ■ Visualizes operational AI models to ensure protection from inappropriate access ■ Covers the lifecycle of AI models from introduction to operation *For more details, please refer to the PDF document or feel free to contact us.

  • DeepKeep 生成AIプロンプト用ファイアウォール2.png
  • Firewall and intrusion prevention
  • EAI/ETL/WEB application server

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Information] Security Measures for Web Servers

To operate a website safely! We will explain the main attacks that can be prevented with a WAF.

This document introduces "Security Measures for Web Servers." It provides detailed information over 36 pages about measures for web servers, products handled by Net Assist, and WAF (Web Application Firewall), among other topics. Please make use of this information to operate your website safely. [Contents (partial)] ■ To operate a website safely ■ Measures for web servers 1. Addressing OS/middleware vulnerabilities ■ Measures for web servers 2. Reviewing authentication methods ■ Measures for web servers 3. Removing unnecessary services/accounts ■ Measures for web servers 4. Not exposing unnecessary files, etc. *For more details, please refer to the PDF document or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Firewall "AEGIS Security Systems"

The domestically produced cloud-based WAF Aegis, which requires no complicated setup or operation, supports the healthy growth of your company's web business.

"AEGIS Security Systems" is a next-generation firewall for the cloud era. It prevents intrusions by server attackers targeting your information assets from around the world with an intelligent monitoring mechanism that continues to evolve daily. By adopting cloud technology, there is no need for expensive hardware installation or replacement costs. It is a powerful security system that can be added to existing server assets. [Features] - Daily system update information on new attacks shared with all subscribers - Cloud monitoring type, with installation procedures completed via phone and email - Attack information reported through defense proof emails during attacks and monthly reports - A system that can be implemented on cloud-based servers, which is a recent trend *For more details, please download the PDF or feel free to contact us.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Features of Sophos Firewall

Identify high-risk users based on web browsing history and ATP trigger counts using the user threat index!

We would like to introduce the features of 'Sophos Firewall' that we handle. With a dedicated user interface equipped with an interactive control center, you can easily check important information at a glance with clear color coding (red, yellow, green) like a traffic light. The advanced search function allows optimized navigation, enabling you to move to your desired location with just two clicks. 【Main Features】 ■ Xstream TLS Inspection provides high performance, support for TLS 1.3 without downgrading, enterprise-level policies with built-in exceptions that are not dependent on ports, unique dashboard visibility, and troubleshooting for compatibility. ■ The Xstream DPI engine offers stream scanning protection for IPS, AV, web, application control, and TLS inspection with a single high-performance engine. *For more details, please download the PDF or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Challenges in achieving an effective CSIRT.

Instead of starting from the implementation phase, let's first understand the current situation! Achieving effective and efficient security measures.

I would like to introduce the challenges in realizing an effective CSIRT. Many companies tend to first organize their security operations under the keywords CSIRT and SOC in order to build their own security operation systems. Ideally, it is necessary to set the goals for the security operation policies that should be implemented in-house, define the roles (CSIRT, SOC) towards achieving those goals, and establish the mechanisms for operation. To do this, it is essential to understand the current state of the company's security, determine the policies and priorities, and take action. However, many companies struggle to operate effectively after establishing their systems and face various challenges. 【Phases】 ■ Current Situation Assessment Phase: Extraction of the company's situation and challenges ■ Countermeasure Planning Phase: Formulation of the order of issue resolution and responsible parties ■ System Construction Phase: Building the system decided in the previous phase ■ Operation Phase: Implementation of PDCA *For more details, please download the PDF or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

The Basics of Ransomware Countermeasures That You Can't Ask About Now

Dangerous if you don't know! Essential measures to protect your company from ransomware.

■By the time you realize it, it's too late: The Active Directory server is the first target of attackers. Recently, there have been numerous significant security incidents that greatly impact business continuity for companies. Traditional ransomware would encrypt files and demand a ransom for decryption. However, the new type of ransomware has evolved to first extract information and then encrypt files, publicly disclosing some of the extracted information on the dark web, threatening to release all information unless a ransom is paid. Specifically, these attacks target a large number of organizations indiscriminately, with hackers infiltrating organizations through vulnerabilities or misconfigurations. After taking over the network, they steal a large amount of confidential information. Subsequently, they introduce ransomware, causing large-scale system failures that lead to business shutdowns, or they threaten to publish the stolen information on the dark web to extort ransom. In these incidents, it is often the case that attackers gain administrative privileges over the AD server, which is the core of the system, at an early stage, taking over the network without the affected companies realizing it, preventing them from avoiding business shutdowns or significant damage.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Aren't you worried about how effective the existing security measures are?

Explanation of the cybersecurity measures that should be taken now.

In recent years, digital technologies such as AI, IoT, and big data have become widespread, and the methods and entry points for cyberattacks have also become diverse. In response to the sophistication and cunning of cyberattacks, as well as the frequent occurrence of ransomware attacks regardless of company size, there are voices expressing vague anxieties such as, "I am worried that a security incident might occur," "I want to implement security measures, but I don't know where to start," and "I cannot determine if the current measures are truly effective." Concerns and worries: - I have implemented security products, but I am anxious about whether they are functioning correctly. - What kind of security measures are other companies taking? - Will we be able to respond adequately if an incident occurs? - I want to hire security personnel, but I cannot find suitable candidates. This document explains the cybersecurity measures that should truly be implemented now.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Moxa LAN Firewall 'EDF-G1002-BP'

Dynamically prevent malicious cyber attacks with IPS/IDS! Protect mission-critical assets.

Moxa's "EDF-G1002-BP Series" is an industrial LAN firewall equipped with IPS and DPI functions to protect mission-critical assets and network zones. It supports software-configurable Gen3 LAN bypass, enabling bump-in-the-wire installation. This minimizes the impact of installation on industrial applications such as ITS, pump and processing systems at water supply stations, oil/gas distributed control systems, and PLC/SCADA systems for factory automation. 【Features】 ■ Bump-in-the-wire installation that does not affect the network ■ Gen3 LAN bypass for system fault tolerance ■ Industrial Intrusion Prevention/Detection System (IPS/IDS) ■ Supports secure boot to check system integrity ■ One-click check for firewall policy misconfigurations *For more details, please download the PDF or feel free to contact us.

  • Firewall and intrusion prevention

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Cloud-based WAF service 'Cloudbric'

Defend your website against various threats such as web attacks, information leaks, and website tampering, and verify the history through analysis reports!

"Cloudbric" is a top-level Web Application Firewall (WAF) that securely protects websites from web attacks. In an advanced web environment, it analyzes the data received by websites using AI to block attacks with its "Logical Operation Detection Engine." This Logical Operation Detection Engine understands the meaning and structure of data, accurately detects and blocks new web attack patterns. Additionally, due to its logical analysis of data meaning, the false detection rate is extremely low. 【Features】 ■ Logically analyzes and blocks attacks using AI ■ High precision certified by the industry ■ WAF that addresses all 10 major vulnerabilities announced by OWASP ■ Complies with the security standards for online payments, PCIDSS ■ Achieves constant SSL encryption with just registration ■ Allows for a quick overview of the website's status *For more details, please refer to the related links or feel free to contact us.

  • Other security

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Factory Security EdgeFire

Next-generation firewall with industrial-grade operating temperature and durability.

EdgeFire, the next-generation firewall for industrial use, enables flexible network segmentation and provides protection at the production line and cell level.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Three Lessons Learned from Cases of DNS Resolution Failure

We will introduce the optimal monitoring methods for DNS that all SREs, DevOps, and NetOps should pay attention to!

Despite the importance of DNS in ensuring the resilience and availability of the web, it is often not monitored correctly, resulting in undetected failures that can trigger a chain reaction in business. Furthermore, today, most companies do not maintain their own DNS infrastructure and outsource DNS to third-party companies known as "managed DNS providers." While it is important to trust vendors (and contracts are useful), it is even more crucial to verify and ensure that vendors are fulfilling their contractual obligations, as properly monitoring DNS is key to success. 【Content Overview】 ■ To shorten MTTR during DNS resolution failures, a scalpel is needed, not a sword ■ Three important lessons ■ Key points *For more details on the blog content, please refer to the related links. Feel free to contact us for more information.*

  • others

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Sophos Firewall

Features beyond the firewall! Automatic adjustment to active adversaries and responses to attacks.

The Sophos Firewall and XGS series appliances form the core of a world-class network security platform. They integrate network protection with a scalable platform to safeguard hybrid networks. By leveraging Sophos Cloud, organizations can protect themselves from cutting-edge threats while maximizing performance. 【Features】 ■ Streaming DPI engine with web protection and IPS ■ High-speed inspection of TLS 1.3 encrypted traffic ■ Zero-day analysis using AI and machine learning ■ Real-time cloud sandbox capabilities ■ DNS Protection *For more details, please download the PDF or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録