We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security Management Software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security Management Software Product List and Ranking from 5 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 03, 2025~Sep 30, 2025
This ranking is based on the number of page views on our site.

Security Management Software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 03, 2025~Sep 30, 2025
This ranking is based on the number of page views on our site.

  1. 日本シノプシス ソフトウェア・インテグリティ・グループ Tokyo//software
  2. ピコテクノロジーズ Tokyo//software
  3. ウィンマジック・ジャパン Tokyo//software
  4. 4 レインフォレスト Tokyo//Information and Communications
  5. 4 ハイパーギア Saitama//IT/Telecommunications

Security Management Software Product ranking

Last Updated: Aggregation Period:Sep 03, 2025~Sep 30, 2025
This ranking is based on the number of page views on our site.

  1. Black Duck <Product Configuration and Modules> 日本シノプシス ソフトウェア・インテグリティ・グループ
  2. Blocking unauthorized operations, malicious software, and access on PCs - IP-guard V3 ピコテクノロジーズ
  3. Case study / Strengthening security and improving operational efficiency through sharing drawings with overseas subsidiaries. ハイパーギア
  4. 『SecureDoc Enterprise Server』 ウィンマジック・ジャパン
  5. 4 Censys Attack Surface Management レインフォレスト

Security Management Software Product List

1~5 item / All 5 items

Displayed results

Black Duck <Product Configuration and Modules>

We enable comprehensive open-source risk management regardless of your company's size or budget!

Black Duck Software Composition Analysis (SCA) offers two editions: "Security Edition" and "Professional Edition," both available for immediate use. Both editions allow for the additional integration of "Black Duck Binary Analysis" and cryptographic modules. This enhances visibility into the risk status of applications and enables more robust management of open source and third-party software usage. 【Features】 <Black Duck Security Edition> ■ Automatically monitors for new vulnerabilities in open source components registered in the BOM ■ Automatically generates Notice files with copyright notices ■ Allows for the definition of custom policies that can be automatically applied in Black Duck ■ Quickly analyzes vulnerabilities and policy violations in open source dependencies *For more details, please refer to the PDF materials or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security
  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Blocking unauthorized operations, malicious software, and access on PCs - IP-guard V3

Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leakage prevention through powerful violation control and logging at the kernel level.

IP-guard V3 is a product for "PC log management," "information security," and "IT asset management" that is adopted by over 20,000 major companies and government agencies in 27 countries worldwide. In Japan, it particularly contributes to solving various industry challenges with powerful controls and detailed recording functions that could not be achieved with other products. Additionally, each function, composed of 14 types of modules, allows users to select only what they need, minimizing the burden on users and reducing the workload for administrators. This product can also meet almost all the requirements outlined in the safety measures of the My Number Act (government-issued security guidelines).

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『SecureDoc Enterprise Server』

Centralized management is possible regardless of device/OS!

"SecureDoc Enterprise Serve (SES)" is a solution that enables centralized management of the entire data security environment of enterprises. It provides full disk encryption (FDE) technology and proprietary technologies such as PBConnex. This streamlines IT processes within the company and reduces the total cost of IT ownership. Additionally, it supports the management of self-encrypting drives (SED), allowing corporate customers to easily deploy and manage SEDs. 【Features】 ■ Restricts all data access in environments without a network ■ Manages all devices from a single console ■ Portable security ■ Encrypts everything *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other information systems
  • server

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Case study / Strengthening security and improving operational efficiency through sharing drawings with overseas subsidiaries.

We will introduce a case where we successfully achieved efficient information sharing while maintaining security through the sharing of technical documents with overseas bases!

We would like to introduce a case study of our "PsafeVIEW" implemented at a major manufacturing company. The implementation focused on sharing drawings and technical documents with overseas subsidiaries, achieving high-level security through download restrictions and flexibility in the usage environment with multi-browser support. It successfully balanced information leakage prevention and large file management, contributing to enhanced information security and improved operational efficiency on a global scale. 【Implementation Overview】 ■ Implementation Location: Manufacturing Industry (Utilized Departments: Design and Technical Departments) Volume of Target Documents: Approximately 400,000 files (mainly drawings and technical materials) ■ Implementation Effects: - Safe sharing of drawings in a multi-browser environment without changing the main browser for each location. - User IDs and viewing dates can be displayed as watermarks, enabling measures to prevent information leakage. - Real-time security was applied to the original documents, allowing existing files to be utilized without modification. *For more details, please download the catalog or feel free to contact us.

  • Document and Data Management
  • Encryption and authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Censys Attack Surface Management

Globally or by asset, the severity level of risk can be customized!

We offer "Censys Attack Surface Management," which discovers, inventories, and monitors all resources publicly available on the internet. Every day, every hour, or on demand, the attacker's perspective on all these resources is refreshed, providing near real-time visibility and context, allowing you to manage and communicate your cybersecurity posture. 【Features and Highlights】 ■ Discovery Path ■ Workspace ■ Risk Prioritization ■ Interactive Reports ■ API Integration ■ Censys Academy *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration