We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software(work) - List of Manufacturers, Suppliers, Companies and Products

Last Updated: Aggregation Period:Sep 03, 2025~Sep 30, 2025
This ranking is based on the number of page views on our site.

Security software Product List

1~8 item / All 8 items

Displayed results

[Data] Setting, Auditing, Analysis, Counter Services 'PowerDMARC'

Reporting and threat analysis, DKIM third-party authentication! Information on value and support systems included!

This document introduces the anti-phishing email measures, settings, audits, analyses, and counter services provided by 'PowerDMARC'. It covers issues related to email, the differences between SPF & DKIM vs S/MIME, and data privacy with PowerDMARC. By setting the report email destination to this service, XML parsing can be performed to generate graphs and analyze IP addresses. 【Contents (partial)】 ■ Phishing emails used as attack tools ■ Emails that do not arrive ■ PPAP issue ■ Technical specifications ■ SPF (Sender Policy Framework) *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

MatrixQuestWLAN/wpa 【WPA2 Supplicant】

MatrixQuestWLAN/wpa 【WPA2 Supplicant】

【Overview】 1. High Portability Designed to facilitate easy combinations with various wireless LAN drivers. 2. Supports WPA/WPA2 - WPA-PSK/WPA2-PSK - WPA-1X/WPA2-1X 3. Supports numerous authentication protocols - EAP-TLS - EAP-PEAP - EAP-TTLS - EAP-FAST (planned support)

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Management Security Services

★Free webinar on cybersecurity measures to be held in April, now accepting reservations! An explanation of managed security services and vulnerability measures for network devices.

Our managed security services provide a one-stop solution for addressing corporate security and network challenges, offering the necessary equipment, operation and maintenance, and technical support to implement security measures within companies. ★April Webinar On April 13: "[A Must-See for IT Managers] Vulnerabilities in Network Devices Leading to Security Incidents! <What are the Best Countermeasures?>" - Solving everything at once with the new Vario Managed LAN / Wi-Fi service. We will explain how to reduce the operational burden on information system personnel protecting networks from cyberattacks such as ransomware and Emotet, as well as our managed security services for internal LANs provided by experts. ↓Registration link↓ https://webinar.variosecure.net On April 20: "What is Needed for Cyber Attack Countermeasures, How to Choose, Essential Security Measures for Small and Medium Enterprises" is also open for registration. 【Features】 ■Solving redundancy issues in network security ■Providing gateway security ■Services compatible with both IPv4 and IPv6 environments ■Consistent services through in-house developed equipment and monitoring systems ■Countermeasures for cloud environments and virtual machines

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Explanation of Invoices and Revised Electronic Bookkeeping Law] Accidents and Troubles That May Occur in the Manufacturing Industry

Have you been receiving suspicious emails lately? Fake invoices from impersonation emails created by tools like ChatGPT are being sent to your company.

The invoice system will begin on October 1, 2023. Additionally, the revised Electronic Bookkeeping Act will become mandatory starting January 1, 2024. As a result, the entire industry has started to send invoices electronically. This raises the issue of "spoofing emails (phishing emails)." With the advent of generative AI like ChatGPT, it has become possible to create emails in natural-sounding Japanese, leading to an increase in cases where cybercriminals send sophisticated "fake invoices." If a fake email impersonating your company reaches your business partners or customers, the following problems may arise: - Personal information of employees or customers may be leaked, leading to lawsuits. - Important corporate secrets may be stolen and resold, causing your company to lose competitive advantage. - Company funds may be siphoned off. - Business partners may become infected with viruses through your company, resulting in huge compensation costs. (According to Article 709 of the Civil Code, your company may be deemed to have "not taken necessary measures" against spoofing emails and could bear liability for damages.) We have prepared a document that explains this situation in more detail and outlines potential solutions. Please download it and use it to ensure safe operations!

  • Company:Spelldata
  • Price:100,000 yen-500,000 yen
  • Email/Fax transmission

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Protecting your business from intellectual property theft due to cyber attacks【PowerDMARC】

Rapidly increasing cyber attacks from China! The targets are the intellectual properties of small and medium-sized enterprises, such as technology, designs, and patents. If we don't protect ourselves, the company could be in crisis!?

Do you think that cyber attacks only target large companies? In reality, cybercriminals often first infect small and medium-sized enterprises with viruses, and then embed viruses in emails sent to large companies from there. The small and medium-sized enterprises that are used as stepping stones have all their intellectual property and client information stolen. They then face mass production of similar products in countries like China, leading to price competition that results in losses. Furthermore, they may be held responsible for infecting large companies with viruses and could face liability for damages (as it falls under the tort of Article 709 of the Civil Code). The actual flow of an attack typically begins with sending emails that impersonate employees of the target company or disguise themselves as clients to employees of that company. Once someone opens the email, they get infected, and the infection spreads from there. In other words, eliminating the initial "spoofed emails impersonating internal or external individuals" is crucial for protecting both your company and your clients. So, what should be done to eliminate spoofed emails? The materials provide a detailed explanation of the above content. We highly recommend downloading them and starting your countermeasures immediately.

  • Company:Spelldata
  • Price:100,000 yen-500,000 yen
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email archive service "Archive"

I want to keep the emails of customer interactions! @Securemail Plus series

@Securemail Plus Archive is an email service that automatically archives (duplicates) sent and received emails in the cloud. It compresses (by an average of 50%) and stores the actual sent emails, including envelope information, header information, body text, and attachment information. Additionally, it allows for keyword-based searches on the stored email body, attachment names, and attachment contents. 【Features】 ■ Automatically archives (duplicates) sent and received emails in the cloud ■ Allows full-text search, viewing, and extraction of archived emails ■ Ideal for internal controls, audits, and backup in case of email loss ■ Can be used immediately with Microsoft 365, Google Workspace, and existing email environments *For more details, please refer to the PDF document or feel free to contact us.

  • Email/Fax transmission
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email Archive and Audit Solution WISE Audit

A mail archiving and auditing solution with numerous large-scale user achievements that can handle everything from regular email audits to e-discovery requirements.

WISE Audit is a solution that archives and stores corporate emails, which are important information assets, to streamline email audits during both emergencies and normal times. ● Flexibly supports all email environments from on-premises to cloud ● High-speed search of 10 million emails per second (※1) and excellent Japanese search functionality ● Proven adoption by many companies, including NEC with 150,000 users WISE Audit has achieved the number one sales position in two domestic email archive market surveys. - Deloitte Tohmatsu Mic Economic Research Institute (11 consecutive years) ※1 - ITR (3 consecutive years) ※2 ※1 Source: Deloitte Tohmatsu Mic Economic Research Institute, "Current Status and Future Outlook of Internal Threat Countermeasure Solutions Market 2022" published in January 2023 https://mic-r.co.jp/mr/02620/ ※2 Source: ITR "ITR Market View: Information Leakage Countermeasure Market 2023" Email Archive Market: Vendor Sales Amount Share (2019-2021)

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software