We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software Product List and Ranking from 28 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Jul 23, 2025~Aug 19, 2025
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Jul 23, 2025~Aug 19, 2025
This ranking is based on the number of page views on our site.

  1. null/null
  2. null/null
  3. CRドットアイ Tokyo//IT/Telecommunications
  4. B7 Tokyo//software
  5. ケーエスピー Osaka//Information and Communications

Security software Product ranking

Last Updated: Aggregation Period:Jul 23, 2025~Aug 19, 2025
This ranking is based on the number of page views on our site.

  1. Security software [TSFS]
  2. [SentinelOne Case Study] Andpad Inc. CRドットアイ
  3. Site "AV-TEST" B7
  4. HP Wolf Security Comprehensive Catalog
  5. IT Asset Management and Information Security Software SS1 ケーエスピー

Security software Product List

1~15 item / All 48 items

Displayed results

Secure Print Suite

Achieve secure authentication with IC card security! Keep your existing multifunction printer as is, and control printing, copying, scanning, and more with just one card reader!

Secure print is the solution to common office concerns such as "annual printing costs do not decrease" and "abandoned printed materials do not disappear." By simply installing a card reader on existing multifunction printers and printers, it enables authenticated printing while keeping new investments to a minimum. It supports various IC cards used for employee IDs and is a security product that satisfies customers who want to "support various manufacturers' models and printer environments" and "centralize management of printed logs."

  • Personal authentication
  • Entrance and exit control system
  • Printer

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Is the security of the cloud email service okay?

Introduction to an integrated cloud security product that offers security features for email sending and receiving, as well as for web browsing.

"Matrix Cloud" is an integrated cloud security product that offers security features for email sending and receiving, as well as for web browsing. It is increasingly used for countermeasures against impersonation (EMOTET), which traditional anti-malware measures can no longer fully prevent, as well as for information leakage prevention through attachment encryption and supervisor approval (third-party approval). Please consider it for minimizing security risks in cloud environments. ■ Basic Features - AI Anti-Spam (in-house developed engine) - AI Anti-Virus (in-house developed engine) - IP Reputation - Information Leakage Prevention - Attachment Encryption - Supervisor Approval - Temporary Hold Function for Sent Emails - Personal Information Protection Filter (planned for next version) - Simple Archive Function (requires HDD expansion contract) ■ Sanitization Features - Macro Removal - Attachment Image/Text Conversion - Attachment Deletion (specified file extensions) - HTML Email Body Text Conversion - URL Link Removal ■ Web Security Features - AI Anti-Malware (in-house developed engine) - URL Filtering

  • Software (middle, driver, security, etc.)
  • Other security
  • Other server related

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AssetView GOLD

A security software that allows you to add only the necessary features as needed!

~ There is software that allows you to add only the necessary features as needed ~ Have you ever purchased packaged software that has unnecessary features or lacks necessary ones? With AssetView GOLD, you can solve those problems all at once! □ Purchase at minimal cost You can choose and purchase five features, avoiding unnecessary implementation. Buying all features is also a great deal. □ Easy installation It has an automatic installation feature for each PC, and adding features can be done with simple operations. □ Easy operation Operation is achieved with simple actions. In particular, the strengths are the ability to save past logs and the automatic version upgrade feature. ◆◆ If you would like a catalog, please inquire through the request for materials ◆◆ ~ You can view some content from the download ~

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Market Research Report] Domestic Information Security Products Market

"Free samples" are currently available! Please check the application method from the [PDF download] button, or apply directly through the related links.

This research report analyzes the market overview of the "domestic information security products market" for 2022, which combines the domestic security software market and the domestic security appliance market. In 2022, cyber security risks increased due to external factors such as the global economic situation and political changes/war, as well as domestic factors like the expansion of hybrid work. Vendors providing endpoint security software, network security software, and information/data security software expanded their sales and strengthened their positions in this market. In response to changes in the IT environment and increasingly sophisticated cyber attacks, the security tools used by companies have increased, leading to a growing operational burden.

  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Taiho Pharmaceutical Co., Ltd.

Swan Store has achieved a satisfactory level of security when handling highly confidential information!

We would like to introduce a case where Taiho Pharmaceutical Co., Ltd., which contributes to health by developing high-value new drugs, has implemented "SWANStor" from Area B Japan. The company commissions clinical trials to CROs (Contract Research Organizations) located around the world and has been accumulating information on drug side effects obtained from that process in an internal web system. Side effect information is highly confidential, and they were comparing products that could achieve a higher level of security, including stronger communication encryption and authentication. [Case Study] ■ Product Implemented: SWANStor ■ Purpose of Implementation: To safely input highly confidential side effect information After comparing multiple products, it was decided to implement this product due to its advantages in "no changes required to firewall settings" and "the ability to deliver specific applications precisely." *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『C4U Enterprise』

Leave the file security of in-house servers and PCs to this one solution!

"C4U Enterprise" allows you to manage encrypted files on the server using a group key. It addresses concerns such as "I want my files to be private, but I want everyone to be able to use the files on the server" and "I'm worried that USB is managed personally." 【Features】 ■ Windows login with USB key ■ Differentiation between user key and group key (manual encryption/decryption) ■ Folder settings (automatic encryption/decryption) *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[File Transfer Service Case Study] Aozora Bank

Send all documents encrypted with TLS! A case study of achieving secure file transfer (Crypto Delivery).

We would like to introduce a case where "Crypto Delivery" was implemented at Aozora Bank, Ltd., which provides unique and highly specialized financial services to its customers. In order to conduct file transfers to clients and others more securely, the bank adopted this product in 2018. Not only does it encrypt and send important data such as customer information, but it also implements advanced security management systems required by financial institutions, including audit functions in case of emergencies. 【Key Points】 ■ Sends all documents, including large files, encrypted with TLS ■ Achieves secure file transfer suitable for financial institutions ■ In addition to enhancing security, strengthens and renews the "file transfer system" from the perspective of business control ■ Response exceeded expectations after implementation, already expanded to 22 internal departments and 3 group companies *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall and intrusion prevention
  • Encryption and authentication
  • Virus software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

BlackBerry Spark UEM Suite

A solution that balances security and productivity. Supports various devices.

The "BlackBerry Spark UEM Suite" is a product that enhances productivity while ensuring and managing the security of all endpoints. Users can access the necessary applications whenever they need them. Additionally, the IT department can provide high-class security without compromising productivity. We offer a variety of products designed to meet your needs. 【Features】 ■ Supports various devices ■ Users can access the necessary applications whenever they need them ■ IT departments can provide high-class security without compromising productivity ■ Supports enterprise-level content security with CCP ■ Advanced productivity apps and built-in features *For more details, please refer to the PDF document or feel free to contact us.*

  • Other embedded systems (software and hardware)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IT Asset Management and Information Security Software SS1

If you're unsure about IT asset management tools, choose SS1.

<Standard Features> ●Asset Management - Device Management: Automatically collects and centrally manages hardware and software information of IT assets such as PCs. - System Management: Thoroughly manages the status of networks including WAN, LAN, and hubs. - Software Management: Clearly displays the software and license usage status of managed PCs. - Contract Management: Manages contract information for equipment leasing/rental, with the ability to output reports. ●Operational Support - PC Operation Functions: Supports operational tasks such as file distribution, message delivery, and alerts for changes in IT assets. - Update Program Management: Enables management of major updates for Windows 10 and update programs for Office 365. - Working Hours Management: Restricts PC usage outside of working hours to reduce long working hours. - SS1 Operation Functions: Provides comprehensive operational support by allowing users to check changes in the management environment and violation alerts in one place.

  • Integrated operation management
  • Server monitoring and network management tools
  • Other PCs and OA equipment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

PowerDMARC Features Settings

Prevent information leakage! If you have a large number of domains to register, there is a bulk registration feature!

We would like to introduce the features of the email security service 'PowerDMARC' under MENAInfoSec in the United States. It can accommodate both individual domain settings and bulk registration of a large number of domains. User management can also be centralized, with permissions set in detail. Additionally, it comes equipped with various configuration features such as a setup wizard, user access templates, auditing, and forensic encryption. Please feel free to contact us if you have any inquiries. 【Features (partial)】 ■ Setup Wizard ■ Bulk Domain Registration ■ Domain Management ■ User Management ■ User Access Templates *For more details, please refer to the PDF document or feel free to contact us.

  • Other services
  • Other security
  • Server monitoring and network management tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introduction to SentinelOne products

Not only large corporations but also small businesses can implement it! It excels in automated operations using AI technology!

We would like to introduce "SentinelOne," an AI security solution from Israel that we handle. It enables rapid response through AI operations, allowing for operation even without security personnel, thus not adding to the operational burden. Additionally, since it can be operated automatically, there is no need to outsource operational services, significantly reducing costs. 【Features】 ■ Fast response with AI for safety ■ No hassle ■ Significant cost savings ■ Can be implemented from just one PC ■ Zero ransomware incidents since the service began ■ Lightweight agent ensures that computer performance remains smooth and comfortable for work *For more details, please refer to the PDF materials or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[SentinelOne Case Study] Andpad Inc.

The user evaluation regarding detection accuracy is high, and the easy-to-use UX is a major attraction!

At AndPad Inc., a signature-based EPP had been implemented for endpoints used in operations for some time. However, due to the multi-OS environment, the measures were primarily optimized individually for each system, such as Windows and MacOS. As the business expanded and the number of members increased, there was a demand for an environment that could be managed integratively even in a multi-OS setting. As a new endpoint protection mechanism, the company adopted 'SentinelOne,' which combines the functions of both EPP and EDR, as part of its security enhancement strategy. To quickly escape the risks of the existing environment, they began deployment just four months after starting the consideration phase, following a PoC. Currently, agents have been installed on hundreds of PCs used by all employees, including verification machines for development, and operations are centered around detection. **Challenges Before Implementation** - Operations could only be conducted in an individually optimized manner due to the multi-OS environment. - There was no integrated management, and the visualization of the situation was insufficient. - A signature-based EPP with a low detection rate could not mitigate management risks. *For more details, please refer to the PDF document or feel free to contact us.*

  • Software (middle, driver, security, etc.)
  • Other security
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software