We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software(Test) - List of Manufacturers, Suppliers, Companies and Products

Last Updated: Aggregation Period:Sep 03, 2025~Sep 30, 2025
This ranking is based on the number of page views on our site.

Security software Product List

1~9 item / All 9 items

Displayed results

Site "AV-TEST"

Detects spam and phishing emails! Equipped with a security certification program.

"AV-TEST" is an independent research organization based in Germany that conducts comparisons and individual tests of IT security products. It publishes test results for antivirus software compatible with operating systems such as Windows and Android. Additionally, it introduces security software that addresses ransomware technologies. [Services Offered] ■E-Mail Security Test ■AV-TEST seal of approval ■Monitored Malware Protection for Windows and Android ■The AV-TEST certificate for smart home and IoT *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Data Search Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cloud "JCS Cyber Protect Cloud"

Add "advanced malware protection features" and "remote device management capabilities" to the backup!

"JCS Cyber Protect Cloud" detects and blocks ransomware/malware, including SNAKE (EKANS), which has affected many companies. With a proven track record of providing security features for three years, it robustly protects IT assets from the threats of cyber attacks. 【Benefits of Implementation】 ■ Affordable and easy to start with a subscription ■ Enables rapid recovery and business continuity ■ Endpoint protection through remote management ■ Always utilizes advanced services *For more details, please download the PDF or contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

MatrixQuestWLAN/wpa 【WPA2 Supplicant】

MatrixQuestWLAN/wpa 【WPA2 Supplicant】

【Overview】 1. High Portability Designed to facilitate easy combinations with various wireless LAN drivers. 2. Supports WPA/WPA2 - WPA-PSK/WPA2-PSK - WPA-1X/WPA2-1X 3. Supports numerous authentication protocols - EAP-TLS - EAP-PEAP - EAP-TTLS - EAP-FAST (planned support)

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

DomainTools, an OSINT tool with one of the largest investigation scopes in the world.

An OSINT tool with over 20 years of research experience and the world's largest database covering 97% of the internet.

Open-source intelligence (OSINT) tools that are also implemented in government agencies and banks. With over 20 years of accumulated data and real-time monitoring, they quickly detect threats and vulnerabilities related to domains, DNS, and IP addresses. Supports data integration with major threat intelligence, SOAR (Security Orchestration, Automation and Response), and SIEM (Security Information and Event Management) services. Not only ideal for defense against external attacks, but also for protecting brands and information assets, as well as for professional digital investigations. We also offer the information visualization and analysis tool 'Maltego,' which can integrate DomainTools data.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Genetec Product Catalog

Listing software applications, hardware, and appliances!

This catalog introduces products from Genetec, which specializes in the field of security solutions. It features a lineup including "Genetec Security Center," which allows for smarter responses with a unified security view, as well as "Security Center Omnicast," "Streamvault," and "Synergis hardware." Industry-specific solutions are also included, so please take a moment to read through it. 【Contents】 ■About Genetec ■Products and Services ■Industry-Specific Solutions *For more details, please refer to the PDF document or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Intelligent Orchestration

Manage all test execution, policy application, prioritization of issues, and filtering!

"Intelligent Orchestration" offers a customized AppSec pipeline that automates security testing not only at certain stages of the software development lifecycle but throughout the entire process. Based on the importance of code changes, total risk scores, and the organization's unique security policies, appropriate security tools are automatically executed. Even in large enterprise environments, it becomes easy to apply security processes and policies across all applications throughout the organization. 【Features】 ■ Only information regarding high-priority vulnerabilities is presented to developers based on the organization's security policies. ■ Users can set feedback after scanning. ■ You can define and customize how weights are assigned to the criteria for calculating the total risk score. *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Decarbonization: Risk Analysis of CO2 Leakage

Important for evaluating safety! Analysis of the risk of CO2 leakage to the ground.

The risk analysis of CO2 leakage to the surface after CO2 injection and upon completion of injection is important for evaluating safety. It is necessary to examine the presence of faults and abandoned wells, as well as the appropriate injection pressure, and to conduct simulations that consider the impact not only on the reservoir but also on the cap rock. By coupling rock mechanics models with reservoir simulators, it is possible to perform calculations that take into account the effects of pressure changes on the geomechanical properties of the reservoir. For example, in GEM, a modified Barton-Bandis model is applied to simulate the opening and closing of fractures and to calculate CO2 leakage from the cap rock. Our company primarily focuses on calculations using the reservoir simulator GEM and literature research to investigate and examine the following items: [Investigation and Examination Items] ■ Examination of the workflow for creating simulation input data from experimental, analytical, and literature data ■ Examination of the workflow for CO2 leakage risk analysis that reflects the uncertainty analysis of input data ■ Investigation of the workflow for CO2 leakage calculations in various reservoir simulators *For more details, please feel free to contact us.

  • Other contract services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

VirusTotal Enterprise

Google's AI-powered threat intelligence, one of the largest in the world, includes malicious judgment information on files, IPs, domains, etc.

It is a solution from Google Cloud that provides various threat intelligence, available for free or for a fee. Since the service began in 2004, it has been referred to as the "Google of Malware," holding vast amounts of files uploaded by many users and their analysis results.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Market Research Report] Security Software and Appliance Market

"Free samples" are currently being offered! Please check the application method from the [PDF download] button, or apply directly from the related links.

This survey presents the current state of the security software and appliance spending in the Asia-Pacific region (excluding Japan) and a five-year outlook for the security industry. It utilizes IDC's Semiannual Software Tracker (Forecast 2H22), IDC's Quarterly Security Appliance Tracker (Forecast 3Q23), as well as IDC's end-user surveys and insights from IDC market analysts.

  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software