We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security Management Software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security Management Software Product List and Ranking from 9 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Dec 03, 2025~Dec 30, 2025
This ranking is based on the number of page views on our site.

Security Management Software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Dec 03, 2025~Dec 30, 2025
This ranking is based on the number of page views on our site.

  1. ピコテクノロジーズ Tokyo//software
  2. ハイパーギア Saitama//IT/Telecommunications
  3. 富士ソフト インダストリービジネス事業部 Kanagawa//software
  4. 4 日本シノプシス ソフトウェア・インテグリティ・グループ Tokyo//software
  5. 5 ウィンマジック・ジャパン Tokyo//software

Security Management Software Product ranking

Last Updated: Aggregation Period:Dec 03, 2025~Dec 30, 2025
This ranking is based on the number of page views on our site.

  1. Case study / Strengthening security and improving operational efficiency through sharing drawings with overseas subsidiaries. ハイパーギア
  2. Blocking unauthorized operations, malicious software, and access on PCs - IP-guard V3 ピコテクノロジーズ
  3. Black Duck SCA for Government Agencies 富士ソフト インダストリービジネス事業部
  4. 4 Black Duck <Product Configuration and Modules> 日本シノプシス ソフトウェア・インテグリティ・グループ
  5. 4 If you're starting telework with BYOD, use 'moconavi'. アイネット

Security Management Software Product List

1~9 item / All 9 items

Displayed results

If you're starting telework with BYOD, use 'moconavi'.

"Network separation" enables work style transformation, BYOD, and telecommuting! It connects various communication methods and systems centered around people.

"Moconavi" is a secure MAM that enables safe and secure telework without leaving data on the device. By simply entering the service information you use into the management screen, you can securely use your usual cloud services through our product app. When using services accessed via the internal system on our product app, you can do so by installing our product client on the relay server. [Features] ■ Can be implemented with a subscription-based number of usage IDs ■ Separation of business and private use is achieved through the app ■ No worries about information leakage as no data is left on the device ■ Easy to implement as it is a cloud service ■ All features are available at one price, and it can also integrate with SaaS *For more details, please refer to the related links or feel free to contact us.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Platform "Forescout eyeControl"

Implement policy-based controls and automate! Respond quickly to incidents.

"Forescout eyeControl" is a platform that proactively reduces the attack surface by implementing and automating policy-based controls, allowing for rapid response to incidents. Security teams can prioritize, implement, and automate policy-based controls effectively. Additionally, organizations can improve their security hygiene, reduce the attack surface, and accelerate response and remediation to quickly mitigate threats, security incidents, and compliance gaps. 【Features】 ■ Protects sensitive data from external threats ■ Prevents malware spread from infected, vulnerable, or non-compliant devices ■ Prevents data theft and network downtime caused by targeted attacks ■ Supports secure network access and availability for employees, contractors, and customers ■ Ensures compliance with internal policies and external regulations, etc. *For more details, please download the PDF or contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Blocking unauthorized operations, malicious software, and access on PCs - IP-guard V3

Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leakage prevention through powerful violation control and logging at the kernel level.

IP-guard V3 is a product for "PC log management," "information security," and "IT asset management" that is adopted by over 20,000 major companies and government agencies in 27 countries worldwide. In Japan, it particularly contributes to solving various industry challenges with powerful controls and detailed recording functions that could not be achieved with other products. Additionally, each function, composed of 14 types of modules, allows users to select only what they need, minimizing the burden on users and reducing the workload for administrators. This product can also meet almost all the requirements outlined in the safety measures of the My Number Act (government-issued security guidelines).

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『SecureDoc Enterprise Server』

Centralized management is possible regardless of device/OS!

"SecureDoc Enterprise Serve (SES)" is a solution that enables centralized management of the entire data security environment of enterprises. It provides full disk encryption (FDE) technology and proprietary technologies such as PBConnex. This streamlines IT processes within the company and reduces the total cost of IT ownership. Additionally, it supports the management of self-encrypting drives (SED), allowing corporate customers to easily deploy and manage SEDs. 【Features】 ■ Restricts all data access in environments without a network ■ Manages all devices from a single console ■ Portable security ■ Encrypts everything *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other information systems
  • server

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security management software "MXsecurity series"

Moxa: Customizable real-time alerts! Achieving excellent detection and response to cyber threats.

Moxa's "MXsecurity series" is a platform that provides centralized visibility and security management. It allows for easy monitoring and identification of cyber threats, building robust threat defenses by preventing security misconfigurations. By using a real-time dashboard, users can track and respond to OT network security events more efficiently. Additionally, it achieves excellent management and maintenance by centralizing the management and monitoring of firewall deployment. 【Features】 ■ Integration of security policies, firmware, licenses, and on-demand threat signatures ■ Centralized management and monitoring of security assets ■ Aggregated security logs and customizable real-time alerts ■ Enhanced visibility of malicious activities and threats through data visualization widgets *For more details, please refer to the PDF document or feel free to contact us.

  • Server monitoring and network management tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Censys Attack Surface Management

Globally or by asset, the severity level of risk can be customized!

We offer "Censys Attack Surface Management," which discovers, inventories, and monitors all resources publicly available on the internet. Every day, every hour, or on demand, the attacker's perspective on all these resources is refreshed, providing near real-time visibility and context, allowing you to manage and communicate your cybersecurity posture. 【Features and Highlights】 ■ Discovery Path ■ Workspace ■ Risk Prioritization ■ Interactive Reports ■ API Integration ■ Censys Academy *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Black Duck <Product Configuration and Modules>

We enable comprehensive open-source risk management regardless of your company's size or budget!

Black Duck Software Composition Analysis (SCA) offers two editions: "Security Edition" and "Professional Edition," both available for immediate use. Both editions allow for the additional integration of "Black Duck Binary Analysis" and cryptographic modules. This enhances visibility into the risk status of applications and enables more robust management of open source and third-party software usage. 【Features】 <Black Duck Security Edition> ■ Automatically monitors for new vulnerabilities in open source components registered in the BOM ■ Automatically generates Notice files with copyright notices ■ Allows for the definition of custom policies that can be automatically applied in Black Duck ■ Quickly analyzes vulnerabilities and policy violations in open source dependencies *For more details, please refer to the PDF materials or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security
  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Black Duck SCA for Government Agencies

Support risk management of OSS and creation of SBOM to enhance security.

For government agencies, the increasing risk of cyber attacks and the complexity of supply chains have made the security management of OSS (Open Source Software) an urgent issue. In particular, to ensure the reliability and safety of information systems, it is essential to address OSS vulnerabilities, ensure license compliance, and accurately manage SBOM (Software Bill of Materials). Black Duck SCA provides a comprehensive solution to these challenges. 【Use Cases】 - Vulnerability management of OSS in information systems - Compliance with software license requirements - Automated generation and management of SBOM - Compliance with the Cyber Resilience Act 【Benefits of Implementation】 - Visualizes security risks of OSS, enabling rapid response. - Reduces the risk of license violations and strengthens compliance. - Reduces supply chain risks through accurate management of SBOM. - Supports compliance with the European Cyber Resilience Act (CRA).

  • Software (middle, driver, security, etc.)
  • Other security
  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Case study / Strengthening security and improving operational efficiency through sharing drawings with overseas subsidiaries.

We will introduce a case where we successfully achieved efficient information sharing while maintaining security through the sharing of technical documents with overseas bases!

We would like to introduce a case study of our "PsafeVIEW" implemented at a major manufacturing company. The implementation focused on sharing drawings and technical documents with overseas subsidiaries, achieving high-level security through download restrictions and flexibility in the usage environment with multi-browser support. It successfully balanced information leakage prevention and large file management, contributing to enhanced information security and improved operational efficiency on a global scale. 【Implementation Overview】 ■ Implementation Location: Manufacturing Industry (Utilized Departments: Design and Technical Departments) Volume of Target Documents: Approximately 400,000 files (mainly drawings and technical materials) ■ Implementation Effects: - Safe sharing of drawings in a multi-browser environment without changing the main browser for each location. - User IDs and viewing dates can be displayed as watermarks, enabling measures to prevent information leakage. - Real-time security was applied to the original documents, allowing existing files to be utilized without modification. *For more details, please download the catalog or feel free to contact us.

  • Document and Data Management
  • Encryption and authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration