We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software Product List and Ranking from 42 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. 飛天ジャパン Tokyo//IT/Telecommunications
  2. アンカーテクノロジーズ Tokyo//IT/Telecommunications
  3. ハミングヘッズ 本社 Tokyo//software
  4. 4 日本シノプシス ソフトウェア・インテグリティ・グループ Tokyo//software
  5. 5 東計電算 製造システム営業部 (第一事業所) Kanagawa//IT/Telecommunications

Security software Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. One-Time Password Token "C200" *Free trial version available for loan. 飛天ジャパン
  2. [Information Leakage Countermeasures] Security Platform 'SeP' ハミングヘッズ 本社
  3. IAST『Seeker』 日本シノプシス ソフトウェア・インテグリティ・グループ
  4. Burp Suite アンカーテクノロジーズ
  5. 4 Security software [TSFS] 東計電算 製造システム営業部 (第一事業所)

Security software Product List

1~15 item / All 118 items

Displayed results

High Security Access Point FortiGate

Broadly respond to environmental changes! High-security wireless access point FortiAP that works with FortiGate.

The security appliance FortiGate is a UTM appliance that provides essential security functions required for a company's internet gateway in a single device. The security switch TiFRONT can implement three internal measures: "prevention of threats," "prevention of spread," and "network visualization." It works in conjunction with entrance and exit measures, enabling "immediate blocking upon detection." The wireless access point FortiAP supports the latest 802.11ac with minimal interference and security. 【Features】 [FortiGate] ○ Comprehensive security functions in one device ○ Measures against external threats from the internet [TiFRONT] ○ Visualization of internal networks and measures against internal threats ○ "Immediate blocking upon detection" in conjunction with entrance and exit measures [FortiAP] ○ Measures against invisible threats via wireless AP For more details, please contact us.

  • Other security and surveillance systems
  • Other security
  • Wireless LAN

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security software [TSFS]

Kaspersky's antivirus software for businesses! It prevents the intrusion of malware that causes data leaks and data destruction!

●Reduce hardware installation and maintenance costs! The management server for security measures is managed by Tokei Densan, which reduces the costs associated with hardware installation and maintenance. ●Automatically respond to unknown threats (malware) through behavior detection! Behavior detection continuously monitors application behavior, detecting and preventing abnormal actions in advance. If unauthorized actions are executed, a rollback is performed from the action history. ●Block the spread of infections with anti-cryptor! The anti-cryptor detects unauthorized encryption attacks and blocks access from infected devices, preventing data loss and information leakage. ●In the event of an infection, Tokei Densan will respond quickly! In the event of an infection, an email notification is sent to the Tokei Densan support center, allowing for confirmation of the infection status and prompt recovery support from Tokei Densan!

  • Virus software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Comprehensively respond to cyber threats! Heimdal Security Suite

Integrate all cybersecurity measures into a single platform to combat threats!

The "Heimdal Security Suite" is a comprehensive cybersecurity cloud service necessary for modern cyber threat countermeasures. It is integrated into a single platform, providing a security solution that combines convenience and safety while simplifying IT infrastructure and mitigating risks. With one dashboard, you can prevent, detect, and manage all threats. You can use all features or just individual functions as needed. It has been recognized by the FBI (Federal Bureau of Investigation) for its technical support in malware tracking. Are you facing any of these issues? - Want to consolidate cybersecurity measures onto a single platform to improve operational efficiency and reduce costs? - Have you experienced a security breach from ransomware or feel anxious about ransomware countermeasures? - Want to strengthen weaknesses without changing the systems you are currently using? We can solve these concerns. *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Secure Print Suite

Achieve secure authentication with IC card security! Keep your existing multifunction printer as is, and control printing, copying, scanning, and more with just one card reader!

Secure print is the solution to common office concerns such as "annual printing costs do not decrease" and "abandoned printed materials do not disappear." By simply installing a card reader on existing multifunction printers and printers, it enables authenticated printing while keeping new investments to a minimum. It supports various IC cards used for employee IDs and is a security product that satisfies customers who want to "support various manufacturers' models and printer environments" and "centralize management of printed logs."

  • Personal authentication
  • Entrance and exit control system
  • Printer

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[AUTOCRYPT] Outcrypt V2X

Support for a safe V2X communication environment.

V2X-EE is a software development kit (SDK) provided for integration into onboard units (OBUs) and roadside units (RSUs), supporting the storage of necessary certificates for secure communications such as Basic Safety Messages (BSMs) transmitted between vehicles and between vehicles and signals/infrastructure, as well as assisting with electronic signatures, encryption, and decryption, thereby supporting a secure V2X communication environment. V2X-PKI provides a PKI architecture that verifies message signatures and integrity, ensuring trust in the source of messages, and supports management throughout the entire lifecycle, including the generation, distribution, and revocation of certificates based on the PKI architecture. For the increasingly advanced autonomous driving functions, it offers encryption and authentication solutions for V2X communication, having secured 100% of the government project for C-ITS in South Korea, and proving the solution's validity by integrating it into communication modules.

  • Other Auto Parts

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Is the security of the cloud email service okay?

Introduction to an integrated cloud security product that offers security features for email sending and receiving, as well as for web browsing.

"Matrix Cloud" is an integrated cloud security product that offers security features for email sending and receiving, as well as for web browsing. It is increasingly used for countermeasures against impersonation (EMOTET), which traditional anti-malware measures can no longer fully prevent, as well as for information leakage prevention through attachment encryption and supervisor approval (third-party approval). Please consider it for minimizing security risks in cloud environments. ■ Basic Features - AI Anti-Spam (in-house developed engine) - AI Anti-Virus (in-house developed engine) - IP Reputation - Information Leakage Prevention - Attachment Encryption - Supervisor Approval - Temporary Hold Function for Sent Emails - Personal Information Protection Filter (planned for next version) - Simple Archive Function (requires HDD expansion contract) ■ Sanitization Features - Macro Removal - Attachment Image/Text Conversion - Attachment Deletion (specified file extensions) - HTML Email Body Text Conversion - URL Link Removal ■ Web Security Features - AI Anti-Malware (in-house developed engine) - URL Filtering

  • Software (middle, driver, security, etc.)
  • Other security
  • Other server related

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AssetView GOLD

A security software that allows you to add only the necessary features as needed!

~ There is software that allows you to add only the necessary features as needed ~ Have you ever purchased packaged software that has unnecessary features or lacks necessary ones? With AssetView GOLD, you can solve those problems all at once! □ Purchase at minimal cost You can choose and purchase five features, avoiding unnecessary implementation. Buying all features is also a great deal. □ Easy installation It has an automatic installation feature for each PC, and adding features can be done with simple operations. □ Easy operation Operation is achieved with simple actions. In particular, the strengths are the ability to save past logs and the automatic version upgrade feature. ◆◆ If you would like a catalog, please inquire through the request for materials ◆◆ ~ You can view some content from the download ~

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Panopticon Case Study] Embedded in Our Own Solution

Achieving the provision of business intelligence and optimization of data visualization! Introduction of case studies.

We would like to introduce a case study of Imagine Software, which implemented our "Altair Panopticon." The company was considering the introduction of a visual analytics system that could be embedded into their scalable enterprise risk management and compliance platform, allowing customers to embed dashboards into in-house or third-party systems. As a result, they adopted our product. As a result of these enhancements, they were able to reduce the average sales cycle by half compared to before. [Challenges] ■ There is a need to quickly integrate the ever-increasing data. ■ They were considering the introduction of a visual analytics system. *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other embedded systems (software and hardware)
  • Business Intelligence and Data Analysis

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IAST『Seeker』

Accurately identify and verify vulnerabilities! You can grasp the URL detection and coverage of web applications at a glance.

The interactive application security testing (IAST) solution "Seeker" from Synopsis maximizes the visibility of the security status of web applications and identifies vulnerability trends in relation to compliance standards such as OWASP Top 10, PCIDSS, GDPR, and CAPEC. It also has the capability to identify sensitive data and track whether it is being handled securely, preventing this information from being stored in log files or databases that are not protected by strong encryption. Since it can be seamlessly integrated into CI/CD workflows, IAST security testing can be executed quickly at the speed of DevOps. 【Features】 ■ Equipped with active verification capabilities ■ Easy from implementation to operation ■ Provides a clear overview of web application URL detection and coverage ■ Tracking of sensitive data ■ Achieves high scores on OWASP benchmarks *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Software (middle, driver, security, etc.)
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[June 10] Invitation to the Web Seminar hosted by Rihyo Electro

Introduction to Windows 10 IoT and Intel(R) AI Tools - Medical Devices and Hospital Equipment Edition

Rihyo Electro Co., Ltd. will hold a webinar on June 10, 2020 (Wednesday) titled "Perfect for the Embedded Industry! Introduction to Windows 10 IoT and Intel(R) AI Tools - Medical Devices and Hospital Equipment Edition." In this seminar, we will introduce the latest information on Windows 10 IoT Enterprise suitable for embedded devices, McAfee Embedded security software, and the latest information on Intel AI tool OpenVINO, along with case studies related to medical devices and hospital equipment. We invite you to take this opportunity to register for the seminar. 【Event Overview】 ■ Date and Time: June 10, 2020 (Wednesday) 16:00 - 17:30 (Entry available 10 minutes before start) ■ Participation Fee: Free <Pre-registration required> ■ Venue: Webinar tool "Cocripo" (https://www.cocripo.co.jp/) ■ Registration Method: Registration can only be done through our company website. *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introduction of suitable security measures for industrial equipment and medical devices.

Whitelist type is effective for embedded devices! McAfee Embedded Control provides the solution!

"McAfee Embedded Control" is a whitelist-based security product widely used in the industrial, medical, retail, and office automation sectors as a security measure for IoT devices. By creating a whitelist of safe system states and controlling access to files and the execution of applications, it prevents various unauthorized executions. As a result, it protects systems from ransomware and unknown malware attacks. Since it is a perpetual license, there is no need for license renewal after device shipment, and it protects over 4 million embedded devices worldwide. [Reasons for Choosing Us] ■ Guarantees long-term operation ■ Provides ironclad security measures for IoT devices ■ Numerous successful implementations *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Threat Insight Report

Malware lurking in images hosted on legitimate websites spreads VIP keyloggers!

Every quarter, our security experts will highlight notable malware campaigns, trends, and techniques identified by HP Wolf Security. By isolating threats that have bypassed detection tools and reached endpoints, HP Wolf Security gains insight into new techniques used by cybercriminals, providing security teams with knowledge to combat new threats and enhance their security posture. This report will discuss the threats that actually occurred in the third quarter of 2024. *For detailed information, please refer to the attached PDF. For more information, feel free to contact us.*

  • 8-2.png
  • 8-3.png
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Taiho Pharmaceutical Co., Ltd.

Swan Store has achieved a satisfactory level of security when handling highly confidential information!

We would like to introduce a case where Taiho Pharmaceutical Co., Ltd., which contributes to health by developing high-value new drugs, has implemented "SWANStor" from Area B Japan. The company commissions clinical trials to CROs (Contract Research Organizations) located around the world and has been accumulating information on drug side effects obtained from that process in an internal web system. Side effect information is highly confidential, and they were comparing products that could achieve a higher level of security, including stronger communication encryption and authentication. [Case Study] ■ Product Implemented: SWANStor ■ Purpose of Implementation: To safely input highly confidential side effect information After comparing multiple products, it was decided to implement this product due to its advantages in "no changes required to firewall settings" and "the ability to deliver specific applications precisely." *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software