We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Information leakage prevention.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Information leakage prevention Product List and Ranking from 6 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Oct 01, 2025~Oct 28, 2025
This ranking is based on the number of page views on our site.

Information leakage prevention Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Oct 01, 2025~Oct 28, 2025
This ranking is based on the number of page views on our site.

  1. MHIパワーエンジニアリング 高砂事業部 Hyogo//Industrial Machinery
  2. INTERLINE Tokyo//IT/Telecommunications
  3. オプティマ・ソリューションズ Tokyo//Service Industry
  4. 4 Spelldata Tokyo//Information and Communications
  5. 4 Offpro Tokyo//others

Information leakage prevention Product ranking

Last Updated: Aggregation Period:Oct 01, 2025~Oct 28, 2025
This ranking is based on the number of page views on our site.

  1. Enhanced Security OWCD How to Use in Medical Institutions MHIパワーエンジニアリング 高砂事業部
  2. "Watermark" to enhance security awareness for telework information leakage prevention! INTERLINE
  3. [Blog] What is Dumpster Diving in Cybersecurity? Spelldata
  4. Learn from domestic cases! Consider what should be done now based on the causes of information leaks. オプティマ・ソリューションズ
  5. 4 Offshore Development Achievements: Measures Against Confidential Information Leakage Offpro

Information leakage prevention Product List

1~6 item / All 6 items

Displayed results

Enhanced Security OWCD How to Use in Medical Institutions

The number of ransom demands and suspension of medical services due to ransomware infections is increasing. As IT advances, the risks also grow. Don't forget to implement effective intrusion prevention measures.

In security measures, it is said that "Zero Trust" is sufficient and that boundary control for preventing unauthorized intrusions is outdated, but is that really the case? In the end, there are security holes somewhere that can be exploited, leading to intrusions, requiring days to reboot the system and restore data, during which medical services are halted—this often makes the news. The physical data diode OWCD provides hassle-free boundary control, but did you know there are actually two ways to use it? One is to protect the core without allowing intrusions. The other is to ensure that "nothing goes out," preventing actual damage. By combining it with access authentication and virus intrusion detection mechanisms, you can enhance the overall availability of your hospital's medical management system and protect medical services. Government agencies and major system integrators are rapidly increasing their use of OWCD to effectively reduce costs. Companies that sell access authentication and virus intrusion detection functions are simply remaining silent. We encourage your company to consider utilizing the physical data diode OWCD. Please refer to our website for more information. There are also video explanations available! https://power.mhi.com/jp/group/eng/business/products/owcd

  • Firewall and intrusion prevention
  • filtering
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information leakage prevention + IT asset management service 'MaLionCloud'

Analyzing the tendency of excessive overtime work among employees from multiple perspectives using an AI engine.

"MaLionCloud" is a cloud service that supports the operational management of client PCs, from information leakage prevention to IT asset management (software asset management). Being a cloud service, there is no burden of server construction or maintenance. You can manage Windows and Mac systems centrally and utilize features equivalent to the on-premises version of "MaLion" with "zero initial setup costs" and "no server operational burden." [Features] ■ Multi-dimensional analysis of labor conditions using AI engine ■ Support for labor management systems compliant with the 36 Agreement ■ Strong capabilities in Mac operation monitoring ■ All-in-one standard features ■ No initial costs, etc. *For more details, please download the PDF or feel free to contact us.

  • Server monitoring and network management tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Blog] What is Dumpster Diving in Cybersecurity?

Targeting the "trash can" with weak security! Introducing the mechanisms and benefits in a blog.

It is a well-known fact that cybersecurity is currently a hot topic, but what relationship does dumpster diving have with it? Dumpster diving is the act of searching through unsecured trash bins for useful information. In the context of cybersecurity, this means stealing confidential data or accessing proprietary information. [Contents] ■ What is dumpster diving? ■ Benefits of dumpster diving in IT ■ Dumpster divers using social engineering techniques ■ How to stop cyber attacks through dumpster diving? *You can view the detailed content of the blog through the related links. Please feel free to contact us for more information.

  • Other security
  • Server monitoring and network management tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Learn from domestic cases! Consider what should be done now based on the causes of information leaks.

Introducing cases of ransomware damage, internal fraud, and unauthorized use of credit card information!

There are various types of information that companies handle, such as customer information, financial information, and human resources information. These can be considered important information assets that require proper management. If information assets are leaked externally, the company may significantly damage its social credibility, and in the worst-case scenario, it may become difficult to continue operations. This time, I would like to introduce some case studies that may be helpful in preparing for the risk of information leakage. *For detailed content of the column, you can view it in the PDF. Please feel free to contact us for more information.*

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

"Watermark" to enhance security awareness for telework information leakage prevention!

Strengthen incident response with easy management! Display watermarks that identify individuals on information devices to avoid and mitigate the risk of information leakage through camera photography.

"InnoMark" is a tool designed to prevent information leakage through camera photography. The risk of exposing company confidential information and customer data through devices like smartphones has increased due to conducting business outside the office. As a countermeasure, a system is needed that displays identifiable information about individuals and PCs on mobile PCs used outside the office. This solution enhances individual security awareness and reduces the risk of information leakage by displaying a watermark on the monitor screen that identifies the individual and the PC. [Main Features (Excerpt)] - Easily configure the content, position, and method of displaying the watermark. - Administrators can easily operate from the manager screen. - Tracking function for information leakage sources. - Screen capture prevention function for monitor screens. - Compatible with Remote Desktop (Windows Remote Desktop). *For more details, please refer to the related links or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Offshore Development Achievements: Measures Against Confidential Information Leakage

Using SOAR, SIEM, UEBA, and packet analysis technologies! Implementing information leakage prevention systems and disaster recovery systems.

We would like to introduce our development achievements in "confidential information leakage countermeasures" aimed at ensuring the safety of customer data and preventing leaks. The challenge was to build an end-user level information leakage countermeasure system and disaster recovery system at the customer's data center. We developed a system that prevents the leakage of internal IP addresses, prevents the emergence of new attack targets within the network, and ensures the safety of personally identifiable information through encryption. 【Project Overview】 ■ Challenge: Building an end-user level information leakage countermeasure system and disaster recovery system at the customer's data center. ■ Solution: Implementing information leakage countermeasure systems and disaster recovery systems using technologies such as SOAR, SIEM, UEBA, and packet analysis. *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration