We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Protection software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Protection software Product List and Ranking from 11 Manufacturers, Suppliers and Companies | IPROS GMS

Last Updated: Aggregation Period:Jan 14, 2026~Feb 10, 2026
This ranking is based on the number of page views on our site.

Protection software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Jan 14, 2026~Feb 10, 2026
This ranking is based on the number of page views on our site.

  1. アメイジング・テクノロジー 千代田区大手町 Tokyo//IT/Telecommunications
  2. サイファー・テック Tokyo//software
  3. arcserve Japan Tokyo//IT/Telecommunications
  4. B7 Tokyo//software
  5. ビットストロング Tokyo//Industrial Electrical Equipment

Protection software Product ranking

Last Updated: Aggregation Period:Jan 14, 2026~Feb 10, 2026
This ranking is based on the number of page views on our site.

  1. [Must-See for Manufacturing Industry] Protecting Drawings and Processing Data. Instantly Neutralizing Ransomware Damage. アメイジング・テクノロジー 千代田区大手町
  2. NeuShield <Works in Safe Mode> アメイジング・テクノロジー 千代田区大手町
  3. E-book protection (viewing restrictions, copy prevention) solution サイファー・テック
  4. 4 [Information] How to Protect Data in Microsoft 365 arcserve Japan
  5. 4 Tool "HTML Guardian" B7

Protection software Product List

1~22 item / All 22 items

Displayed results

Virsec Security Platform

Application protection from memory to the web! Detect fileless attacks and memory corruption attacks within milliseconds.

The "Virsec Security Platform" protects workloads and enterprise applications from dangerous cyber attacks that evade traditional security tools, securing them from within. It safeguards applications across various platforms from servers to the cloud, providing speed and accuracy while reducing noise and false alarms. Built on Trusted Execution technology, this technology ensures that business-critical applications are not compromised by performing detailed analysis of newly added programs through defenses at the memory and CPU levels. 【Features】 ■ Protection from zero-day attacks ■ Protection of database transactions ■ Defense against advanced threats ■ Detection of brute force attacks ■ Continuous policy-based authentication *For more details, please refer to the PDF materials or feel free to contact us.

  • Other network tools
  • Server monitoring and network management tools
  • Other security
  • Protection software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Privacy Protection Software Mosaic Plus

You can easily apply mosaic processing to your videos.

I started a blog about how to use it: https://note.com/kisseicomtec_bi/ (Biosignal, motion analysis, sleep analysis products) You can apply mosaic effects just by tracing the area you want to obscure, such as a person's face or personal information, with your mouse. A free trial version is also available.

  • others
  • Protection software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Software Sentinel HASP Implementation Case Study

Protect intellectual property and make better use of corporate resources! Improve customer satisfaction as well!

We would like to introduce a case study of the implementation of Sentinel HASP. DIP tech has protected its intellectual property with "Sentinel HASP," allowing for more effective use of corporate resources and improved customer satisfaction. The robust protection has resulted in savings in costs, time, and resources, as well as improvements in internal processes. Additionally, Iritech, Inc.'s biometric authentication software has achieved diverse IP protection through "Sentinel HASP." For more details, please contact us or refer to the catalog.

  • Software (middle, driver, security, etc.)
  • Other operation management software
  • Protection software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] How to Protect Data in Microsoft 365

Five reasons why the standard features of Microsoft 365 are not enough!

This document introduces the data protection methods for Microsoft 365 by Arcserve. It includes five reasons why the standard features of Microsoft 365 are insufficient, as well as the protection of Microsoft 365 through Arcserve UDP/UDP Appliance. We encourage you to read it. [Contents] ■ Five reasons why the standard features of Microsoft 365 are insufficient ■ Data protection methods for Microsoft 365 by Arcserve ■ Protection of Microsoft 365 through Arcserve UDP/UDP Appliance ■ Protection of Microsoft 365 through Arcserve UDP Cloud Hybrid ■ Long-term email storage through Arcserve Email Archiving/Arcserve Email Archiving Cloud *For more details, please refer to the PDF document or feel free to contact us.

  • Other operation management software
  • Protection software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Ikeda Mohando Co., Ltd.

Introducing a case where robust data protection management has become possible alongside core business operations!

We would like to introduce the case of "Arcserve Backup / Arcserve Replication" implemented at Ikeda Mohando Co., Ltd. Until now, the company operated its information systems on a site-by-site basis, storing important business data using NAS, but it gradually began to suffer from hardware failures. As a solution, they implemented our product. As a result, the two-tiered data protection operation eliminated the risk of data loss, allowing users at each site to focus on their work without concerns about data storage. [Case Study] - Industry: Pharmaceuticals - Company Name: Ikeda Mohando Co., Ltd. - Challenge: Faced significant barriers with business data *For more details, please refer to the PDF document or feel free to contact us.*

  • others
  • Protection software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Automatically contain unknown threats! Introduction to security software.

[COMODO Product] Eliminate damage from unknown threats! "AutoContainment" technology with U.S. patent.

This document introduces "COMODO Advanced Endpoint Protection (AEP)," which is equipped with a patented Auto Containment feature. It provides a wide range of tools to identify safe files and known threat files. For unknown files, it consistently delivers good and bad verdicts without impacting user experience, thanks to the Auto Containment technology and verdict engine. [Contents (Excerpt)] ■ About the solution & conclusion ■ Key features ■ Minimum hardware requirements - Supported Windows OS - Supported Android OS - Also compatible with iOS and macOS *For more details, please refer to the PDF document or feel free to contact us.

  • Virus software
  • filtering
  • Other security
  • Protection software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Tool "HTML Guardian"

Equipped with various features such as "code encryption" and "password protection"!

"HTML Guardian" is a tool designed to protect the content of websites. It offers a range of features aimed at protecting intellectual property on the web. It includes various functions such as "image protection" and "advanced batch encryption." Please feel free to contact us when needed. 【Main Features (Excerpt)】 ■ Code encryption ■ Image protection ■ Password protection ■ Protection from email spiders ■ Protection from hackers and cybercriminals ■ Protection from site rippers *For more details, please refer to the PDF document or feel free to contact us.

  • Company:B7
  • Price:Other
  • Software (middle, driver, security, etc.)
  • Protection software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『Trellix Protect』

Smart protection with Trellix Protect, strong preparedness, and forward-looking security.

Trellix Protect is a security solution that combines Endpoint Protection (EPP) and Endpoint Detection and Response (EDR) capabilities. It is designed to protect organizations from sophisticated cyber threats using advanced AI and machine learning technologies. With Trellix Protect, you can secure your defenses intelligently, prepare strongly, and anticipate future threats. 【Key Features】 ■ Detects and blocks malware using an advanced AI engine. ■ Continuously monitors and analyzes endpoint behavior. ■ Achieves multi-layered defense against ransomware. ■ Utilizes cloud-based threat intelligence in real-time. ■ Predicts zero-day attacks using machine learning and defends against them proactively. ■ Automatically scans and identifies endpoint vulnerabilities. *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other security
  • Protection software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Customer Case] HST Pathways

A major U.S. healthcare technology company adopts measures for data protection! Providing a revolutionary approach to data protection.

We would like to introduce a case study where HST Pathways, a leading technology provider in the U.S. healthcare industry, has adopted "NeuShield Sentinel." The company needed to establish stricter security policies to protect internal data and ensure compliance with regulations. After implementation, they appreciated the ability to recover old versions of files and highly valued the fact that continuous updates are not required. 【Case Overview】 ■Challenges - Recognized the risk of ransomware attacks a few years ago ■Effects - Able to recover data in a few minutes, preventing prolonged business disruptions - Easily undo changes to the system and quickly restore access to computers, applications, and data *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

sys/Emergency Response Tool for Personal Information Protection DataShield

We will securely protect the contents of your important hard disk from theft and unauthorized use.

Easily build a reliable data security environment. High safety and usability: "Installation takes just 3 minutes." "Simple and reliable, significantly reduces the burden on system administrators." "Automatically locks the HDD when the PC is powered off, protecting data from theft." "'Hard Lock' achieves a high level of security." "Operates at the BIOS level, so there is zero CPU load during OS startup." Are you fully prepared for personal information protection law measures? DataShield hides the existence of the HDD, making it inaccessible.

  • Software (middle, driver, security, etc.)
  • Protection software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

How to Protect Important Data at Your Workplace Explained in Manga

We will solve your concerns regarding backup in various industries such as schools, hospitals, and manufacturing!

This document explains easy and reliable data protection achieved with the "Arcserve series" through a manga format. It includes various chapters such as a school edition set in a certain school, as well as hospital, manufacturing, construction, government, and property insurance company editions. It addresses backup-related concerns specific to each industry. [Contents] ■ School Edition ■ Hospital Edition ■ Manufacturing Edition ■ Construction Edition ■ Government Edition ■ Property Insurance Company Edition *Please be sure to check it out by downloading the PDF below!

  • Other operation management software
  • Protection software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Happy Corporation

Practicing system protection operations while managing the main business! A case that eliminated the risk of time lag.

We would like to introduce a case study of "Arcserve High Availability / Arcserve D2D" implemented at Happy Co., Ltd. The company has garnered significant attention with its "Care Maintenance" service, which cleans clothes by simultaneously treating both water-based and oil-based stains while protecting the fabric. They are also focusing on utilizing IT by thoroughly managing the entrusted garments with an "electronic medical record system." To further strengthen their critical system protection, they implemented "Arcserve High Availability" for data replication and "Arcserve D2D" for image backup. As a result, they achieved a high level of business continuity improvement while completing operations with in-house staff. [Case Study] - Industry: Clothing Reproduction Processing - Company Name: Happy Co., Ltd. *For more details, please refer to the PDF document or feel free to contact us.*

  • others
  • Protection software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] National Health Insurance Central Association

Real-time data sharing over long distances! A case of achieving cost reduction.

We would like to introduce a case study of the implementation of "ARCserve Replication," which our company handles. At the National Health Insurance Central Association, one of their businesses involves a system for processing claims and payments for comprehensive support for persons with disabilities. This system was causing operational costs and management burdens for the 47 prefectural health insurance associations that are the implementing bodies. Therefore, our product was introduced. As a result, without changing the business flow, it is expected that the costs borne by the health insurance associations will be reduced, and the long-awaited remote backup system will be established. [Case Study] - Industry: National Health Insurance Business, Long-Term Care Insurance Business, Comprehensive Support for Persons with Disabilities - Organization Name: National Health Insurance Central Association - Challenges: System operational costs and management burdens *For more details, please refer to the PDF document or feel free to contact us.

  • others
  • Protection software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] SoftBank Technology Corporation (2)

Expanding as an in-house service is also in sight! A case study of achieving a replacement without stopping operations.

We would like to introduce a case study of the implementation of "Arcserve Replication r16.5 for Windows" at SoftBank Technology Corp. The company faced the challenge of migrating their file server to a larger capacity without interrupting business operations. To address this issue, they implemented our product. As a result, they successfully replicated approximately 6 million files and 3.5TB of large data to a clustered environment of Windows Server 2012 located remotely, all within a very short period. [Case Study] - Industry: Information and Communication - Company Name: SoftBank Technology Corp. - Challenge: Keeping up with the increasing data demands as the company continues to grow rapidly. *For more details, please refer to the PDF document or feel free to contact us.

  • others
  • Protection software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

VEEAM platform

Manage, protect, and retain data on any cloud! Prevent data loss and downtime.

The "VEEAM Platform" protects data from ransomware and accelerates the transition to the cloud, ensuring that data is always available and safeguarded. With its intuitive design and detailed restoration options, it reduces management costs and complexity. It is fast, secure, and adaptable to future changes, allowing for large-scale restorations to be performed instantly. Customers have repeatedly expressed that it is "usable without any special configuration." **Features** - Simple implementation and easy management - Customizable according to user needs - Portable universal license that supports hybrid environments - No restrictions on backup or restoration locations - Supports various workloads on a single platform *For more details, please refer to the PDF document or feel free to contact us.*

  • Document and Data Management
  • Software (middle, driver, security, etc.)
  • Protection software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Privacy protection software "Steganos"

Encrypt and store safely! No ads, complete protection of security and privacy.

"Steganos" is privacy protection software that includes features such as encryption, VPN, and password management. It provides encrypted private access to the internet. Your real IP address is replaced with one randomly selected from the product's IP addresses. This makes it more difficult to track your online activities. Please feel free to contact us for any inquiries. 【Features】 <Steganos VPN Online Shield> ■ Protects your connection ■ Blocks ads ■ Prevents tracking ■ Automatically deletes cookies ■ Anonymizes browser type *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Software (middle, driver, security, etc.)
  • Protection software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

EAZ Solution

Offering a series of Windows instant restore products! Featuring options like "Eazy Fix."

"EAZ Solution" provides software to address risks related to information security, availability, compliance, and system performance. Our lineup includes "Baseline Shield," which protects computers from unwanted changes, and "EFI System Cloner," a system cloning software. Please feel free to contact us when you need assistance. 【Product Lineup】 ■Eazy Fix ■Baseline Shield ■Eazy Fix EndPoint Manager ■EFI System Cloner *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Software (middle, driver, security, etc.)
  • Protection software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Must-See for Manufacturing Industry] Protecting Drawings and Processing Data. Instantly Neutralizing Ransomware Damage.

Countering attacks targeting industrial machinery and CAD data. A next-generation data protection solution that does not stop production even if damage occurs, unlike backups or EDR.

"NeuShield Data Sentinel" is a system that provides robust protection for control PCs of machine tools and terminals handling CAD data against ransomware and wipe-type malware attacks that can destroy data. It has been implemented in U.S. CNC machining manufacturers, and there are instances where it has successfully prevented data loss and production line stoppages even in locations that have faced multiple attacks in the past. With an intuitive interface that allows on-site personnel to operate it easily, recovery operations can be initiated without waiting for technicians to arrive during a cyber attack. This minimizes the risk of delays in production schedules and delivery. Additionally, it features protection for the boot area (MBR) and prevents direct access to disks (RAW access), addressing risks from external devices. 【Features】 ■ Protects critical data such as drawings and NC programs from tampering ■ One-click restore function operable at the site level ■ Defends against boot area destruction and disk erasure attacks ■ Compatible with legacy OS environments such as Windows 7 ★ You can view materials detailing damage and recovery cases in the manufacturing industry, as well as more detailed features, by clicking on "PDF Download." Please feel free to contact us with any inquiries.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Security Implementation Case] Nagakute City, Aichi Prefecture

Build a secure internet connection environment while maintaining the alpha model!

We would like to introduce a case study of our "HP Sure Click Enterprise" implemented in Nagakute City, Aichi Prefecture, which has developed as a bedroom community of the Nagoya metropolitan area. While maintaining the alpha model, the aim was to build a secure internet connection environment, protecting endpoints with this product and a harmless solution. We have received feedback stating, "Not only does it enhance security, but we are also pleased to have features that we want to use in future operations." 【Case Overview】 ■ System Effects - Enables internet use without burdening staff - Maintains productivity while seamlessly integrating with external services ■ Business Effects - Reduces management burden and optimizes human resources - Enhances citizen services through improved operational efficiency *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Protection software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Customer Case] Central Computer & Networks

Microsoft's MSP is standardly adopted to protect customer companies' systems and data! Significantly reduces recovery time and costs.

We would like to introduce a case study where the computer consulting company Central Computer & Networks adopted "NeuShield Data Sentinel." The company believed that 20% of its client companies had experienced ransomware attacks at least once in the past. After implementation, it is estimated that client companies can reduce the time and effort required for system reconstruction and data recovery due to ransomware damage by more than a week by adopting "NeuShield." 【Case Overview】 ■Challenges - A proactive approach is needed instead of measures that take weeks for recovery. ■Effects - The computer and domain server could be restored to their pre-compromise state in just a few minutes. - Client companies do not need to worry about whether to pay the ransom. - It has become a core function of the company's cybersecurity package. *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

NeuShield <Works in Safe Mode>

Not a backup, not EDR, the third option! Quickly recover even in the event of damage!

"NeuShield" is a solution recognized by Microsoft that can counter attacks even in Windows Safe Mode. With its unique "Mirror Shield" technology, it protects the original files. Even if files are tampered with, they can be instantly restored to their original state. Additionally, it protects data for databases of up to 64TB. It hides data from processes outside the database, preventing tampering, and can instantly restore the entire database in the event of a breach. 【Features】 ■ Protection without detection ■ Implementation of stronger protection ■ Rapid recovery *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

E-book protection (viewing restrictions, copy prevention) solution

For building and providing eBook sales and unlimited reading services! Protect eBooks with access restrictions and copy prevention.

We want to protect Japanese information with Japanese technology. Driven by this desire, our company has been committed to product development and continues to provide the uniquely developed DRM solution, 'CypherGuard.' 'CypherGuard' protects e-books and prevents unauthorized use by limiting viewers and viewing periods through its "license management function," as well as preventing screen duplication such as capture actions. In the business sector, it is used by customers in manufacturing, infrastructure, and government agencies. 【Features】 ■ Protects digital content by preventing screen duplication such as capture actions and limiting viewers and viewing periods through the license management function. ■ Allows for the setting of distribution rules such as dates and the number of devices. ■ Provides services tailored to the sales format of books (purchase, unlimited reading) and the implementation environment (user management, license authentication server). *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Protection software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration