We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Protection software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Protection software Product List and Ranking from 7 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 03, 2025~Sep 30, 2025
This ranking is based on the number of page views on our site.

Protection software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 03, 2025~Sep 30, 2025
This ranking is based on the number of page views on our site.

  1. サイファー・テック Tokyo//software
  2. バリュープランニング Tokyo//others
  3. コーネットソリューションズ Tokyo//IT/Telecommunications
  4. 4 キッセイコムテック株式会社 Nagano//IT/Telecommunications
  5. 4 日本セーフネット Tokyo//software

Protection software Product ranking

Last Updated: Aggregation Period:Sep 03, 2025~Sep 30, 2025
This ranking is based on the number of page views on our site.

  1. Automatically contain unknown threats! Introduction to security software. バリュープランニング
  2. E-book protection (viewing restrictions, copy prevention) solution サイファー・テック
  3. Virsec Security Platform コーネットソリューションズ
  4. Privacy Protection Software Mosaic Plus キッセイコムテック株式会社
  5. 4 Software Sentinel HASP Implementation Case Study 日本セーフネット

Protection software Product List

1~15 item / All 15 items

Displayed results

Virsec Security Platform

Application protection from memory to the web! Detect fileless attacks and memory corruption attacks within milliseconds.

The "Virsec Security Platform" protects workloads and enterprise applications from dangerous cyber attacks that evade traditional security tools, securing them from within. It safeguards applications across various platforms from servers to the cloud, providing speed and accuracy while reducing noise and false alarms. Built on Trusted Execution technology, this technology ensures that business-critical applications are not compromised by performing detailed analysis of newly added programs through defenses at the memory and CPU levels. 【Features】 ■ Protection from zero-day attacks ■ Protection of database transactions ■ Defense against advanced threats ■ Detection of brute force attacks ■ Continuous policy-based authentication *For more details, please refer to the PDF materials or feel free to contact us.

  • Other network tools
  • Server monitoring and network management tools
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Privacy Protection Software Mosaic Plus

You can easily apply mosaic processing to your videos.

I started a blog about how to use it: https://note.com/kisseicomtec_bi/ (Biosignal, motion analysis, sleep analysis products) You can apply mosaic effects just by tracing the area you want to obscure, such as a person's face or personal information, with your mouse. A free trial version is also available.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Software Sentinel HASP Implementation Case Study

Protect intellectual property and make better use of corporate resources! Improve customer satisfaction as well!

We would like to introduce a case study of the implementation of Sentinel HASP. DIP tech has protected its intellectual property with "Sentinel HASP," allowing for more effective use of corporate resources and improved customer satisfaction. The robust protection has resulted in savings in costs, time, and resources, as well as improvements in internal processes. Additionally, Iritech, Inc.'s biometric authentication software has achieved diverse IP protection through "Sentinel HASP." For more details, please contact us or refer to the catalog.

  • Software (middle, driver, security, etc.)
  • Other operation management software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] How to Protect Data in Microsoft 365

Five reasons why the standard features of Microsoft 365 are not enough!

This document introduces the data protection methods for Microsoft 365 by Arcserve. It includes five reasons why the standard features of Microsoft 365 are insufficient, as well as the protection of Microsoft 365 through Arcserve UDP/UDP Appliance. We encourage you to read it. [Contents] ■ Five reasons why the standard features of Microsoft 365 are insufficient ■ Data protection methods for Microsoft 365 by Arcserve ■ Protection of Microsoft 365 through Arcserve UDP/UDP Appliance ■ Protection of Microsoft 365 through Arcserve UDP Cloud Hybrid ■ Long-term email storage through Arcserve Email Archiving/Arcserve Email Archiving Cloud *For more details, please refer to the PDF document or feel free to contact us.

  • Other operation management software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Ikeda Mohando Co., Ltd.

Introducing a case where robust data protection management has become possible alongside core business operations!

We would like to introduce the case of "Arcserve Backup / Arcserve Replication" implemented at Ikeda Mohando Co., Ltd. Until now, the company operated its information systems on a site-by-site basis, storing important business data using NAS, but it gradually began to suffer from hardware failures. As a solution, they implemented our product. As a result, the two-tiered data protection operation eliminated the risk of data loss, allowing users at each site to focus on their work without concerns about data storage. [Case Study] - Industry: Pharmaceuticals - Company Name: Ikeda Mohando Co., Ltd. - Challenge: Faced significant barriers with business data *For more details, please refer to the PDF document or feel free to contact us.*

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Automatically contain unknown threats! Introduction to security software.

[COMODO Product] Eliminate damage from unknown threats! "AutoContainment" technology with U.S. patent.

This document introduces "COMODO Advanced Endpoint Protection (AEP)," which is equipped with a patented Auto Containment feature. It provides a wide range of tools to identify safe files and known threat files. For unknown files, it consistently delivers good and bad verdicts without impacting user experience, thanks to the Auto Containment technology and verdict engine. [Contents (Excerpt)] ■ About the solution & conclusion ■ Key features ■ Minimum hardware requirements - Supported Windows OS - Supported Android OS - Also compatible with iOS and macOS *For more details, please refer to the PDF document or feel free to contact us.

  • Virus software
  • filtering
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Tool "HTML Guardian"

Equipped with various features such as "code encryption" and "password protection"!

"HTML Guardian" is a tool designed to protect the content of websites. It offers a range of features aimed at protecting intellectual property on the web. It includes various functions such as "image protection" and "advanced batch encryption." Please feel free to contact us when needed. 【Main Features (Excerpt)】 ■ Code encryption ■ Image protection ■ Password protection ■ Protection from email spiders ■ Protection from hackers and cybercriminals ■ Protection from site rippers *For more details, please refer to the PDF document or feel free to contact us.

  • Company:B7
  • Price:Other
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

E-book protection (viewing restrictions, copy prevention) solution

For building and providing eBook sales and unlimited reading services! Protect eBooks with access restrictions and copy prevention.

We want to protect Japanese information with Japanese technology. Driven by this desire, our company has been committed to product development and continues to provide the uniquely developed DRM solution, 'CypherGuard.' 'CypherGuard' protects e-books and prevents unauthorized use by limiting viewers and viewing periods through its "license management function," as well as preventing screen duplication such as capture actions. In the business sector, it is used by customers in manufacturing, infrastructure, and government agencies. 【Features】 ■ Protects digital content by preventing screen duplication such as capture actions and limiting viewers and viewing periods through the license management function. ■ Allows for the setting of distribution rules such as dates and the number of devices. ■ Provides services tailored to the sales format of books (purchase, unlimited reading) and the implementation environment (user management, license authentication server). *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

How to Protect Important Data at Your Workplace Explained in Manga

We will solve your concerns regarding backup in various industries such as schools, hospitals, and manufacturing!

This document explains easy and reliable data protection achieved with the "Arcserve series" through a manga format. It includes various chapters such as a school edition set in a certain school, as well as hospital, manufacturing, construction, government, and property insurance company editions. It addresses backup-related concerns specific to each industry. [Contents] ■ School Edition ■ Hospital Edition ■ Manufacturing Edition ■ Construction Edition ■ Government Edition ■ Property Insurance Company Edition *Please be sure to check it out by downloading the PDF below!

  • Other operation management software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Happy Corporation

Practicing system protection operations while managing the main business! A case that eliminated the risk of time lag.

We would like to introduce a case study of "Arcserve High Availability / Arcserve D2D" implemented at Happy Co., Ltd. The company has garnered significant attention with its "Care Maintenance" service, which cleans clothes by simultaneously treating both water-based and oil-based stains while protecting the fabric. They are also focusing on utilizing IT by thoroughly managing the entrusted garments with an "electronic medical record system." To further strengthen their critical system protection, they implemented "Arcserve High Availability" for data replication and "Arcserve D2D" for image backup. As a result, they achieved a high level of business continuity improvement while completing operations with in-house staff. [Case Study] - Industry: Clothing Reproduction Processing - Company Name: Happy Co., Ltd. *For more details, please refer to the PDF document or feel free to contact us.*

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] National Health Insurance Central Association

Real-time data sharing over long distances! A case of achieving cost reduction.

We would like to introduce a case study of the implementation of "ARCserve Replication," which our company handles. At the National Health Insurance Central Association, one of their businesses involves a system for processing claims and payments for comprehensive support for persons with disabilities. This system was causing operational costs and management burdens for the 47 prefectural health insurance associations that are the implementing bodies. Therefore, our product was introduced. As a result, without changing the business flow, it is expected that the costs borne by the health insurance associations will be reduced, and the long-awaited remote backup system will be established. [Case Study] - Industry: National Health Insurance Business, Long-Term Care Insurance Business, Comprehensive Support for Persons with Disabilities - Organization Name: National Health Insurance Central Association - Challenges: System operational costs and management burdens *For more details, please refer to the PDF document or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] SoftBank Technology Corporation (2)

Expanding as an in-house service is also in sight! A case study of achieving a replacement without stopping operations.

We would like to introduce a case study of the implementation of "Arcserve Replication r16.5 for Windows" at SoftBank Technology Corp. The company faced the challenge of migrating their file server to a larger capacity without interrupting business operations. To address this issue, they implemented our product. As a result, they successfully replicated approximately 6 million files and 3.5TB of large data to a clustered environment of Windows Server 2012 located remotely, all within a very short period. [Case Study] - Industry: Information and Communication - Company Name: SoftBank Technology Corp. - Challenge: Keeping up with the increasing data demands as the company continues to grow rapidly. *For more details, please refer to the PDF document or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Privacy protection software "Steganos"

Encrypt and store safely! No ads, complete protection of security and privacy.

"Steganos" is privacy protection software that includes features such as encryption, VPN, and password management. It provides encrypted private access to the internet. Your real IP address is replaced with one randomly selected from the product's IP addresses. This makes it more difficult to track your online activities. Please feel free to contact us for any inquiries. 【Features】 <Steganos VPN Online Shield> ■ Protects your connection ■ Blocks ads ■ Prevents tracking ■ Automatically deletes cookies ■ Anonymizes browser type *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

EAZ Solution

Offering a series of Windows instant restore products! Featuring options like "Eazy Fix."

"EAZ Solution" provides software to address risks related to information security, availability, compliance, and system performance. Our lineup includes "Baseline Shield," which protects computers from unwanted changes, and "EFI System Cloner," a system cloning software. Please feel free to contact us when you need assistance. 【Product Lineup】 ■Eazy Fix ■Baseline Shield ■Eazy Fix EndPoint Manager ■EFI System Cloner *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『Trellix Protect』

Smart protection with Trellix Protect, strong preparedness, and forward-looking security.

Trellix Protect is a security solution that combines Endpoint Protection (EPP) and Endpoint Detection and Response (EDR) capabilities. It is designed to protect organizations from sophisticated cyber threats using advanced AI and machine learning technologies. With Trellix Protect, you can secure your defenses intelligently, prepare strongly, and anticipate future threats. 【Key Features】 ■ Detects and blocks malware using an advanced AI engine. ■ Continuously monitors and analyzes endpoint behavior. ■ Achieves multi-layered defense against ransomware. ■ Utilizes cloud-based threat intelligence in real-time. ■ Predicts zero-day attacks using machine learning and defends against them proactively. ■ Automatically scans and identifies endpoint vulnerabilities. *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration