We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security Solutions.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security Solutions Product List and Ranking from 36 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Aug 27, 2025~Sep 23, 2025
This ranking is based on the number of page views on our site.

Security Solutions Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Aug 27, 2025~Sep 23, 2025
This ranking is based on the number of page views on our site.

  1. ピーエスアイ 本社 Tokyo//IT/Telecommunications
  2. null/null
  3. サブゲート Tokyo//IT/Telecommunications
  4. 4 旭電通 Tokyo//Trading company/Wholesale
  5. 5 トータルリンク Hyogo//IT/Telecommunications

Security Solutions Product ranking

Last Updated: Aggregation Period:Aug 27, 2025~Sep 23, 2025
This ranking is based on the number of page views on our site.

  1. Security Switch "TiFRONT (Cloud Management Model)" ピーエスアイ 本社
  2. Security Switch "LG1000" 旭電通
  3. Research Facility Fireproof Chemical Storage Cabinet
  4. 4 Security solution "NISG 3,000 Series" トータルリンク
  5. 4 The savior of supply chain attack measures! Highly effective security measures! サブゲート

Security Solutions Product List

1~15 item / All 57 items

Displayed results

Acid-resistant resin chemical storage cabinet Model No. M3105S-W385LM

Made of high-density polyethylene with excellent chemical resistance. It can be washed thoroughly, allowing for hygienic use.

Made of high-density polyethylene with excellent chemical resistance. It can be washed thoroughly, allowing for clean use. Due to its very sturdy one-piece molding, the top of the cabinet can also be used as a workspace.

  • Food storage equipment and facilities

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Switch "TiFRONT (Cloud Management Model)"

Simply connect for safety—no complicated setup required to get started! We provide a secure network even in locations without dedicated engineers, such as regional bases and retail stores!

The security switch "TiFRONT" is a cloud-managed model of security switch. This product can be easily connected by simply taking it out of the box, plugging in the power cable, and connecting the Ethernet. It can provide a secure network even in locations such as regional offices and retail stores where there are no dedicated engineers. No management server is required, and it can be used immediately once the decision to implement it is made. Additionally, it features an automatic security report generation function, real-time creation, and the ability to manage schedules (daily, weekly, monthly, hourly), allowing for efficient reporting tasks. 【Features】 ■ Easy and safe to use, no dedicated engineers required ■ Automatic port blocking to prevent loops ■ Cloud management with no need for management or labor ■ L2 switch-based network security ■ Automatically blocks only unauthorized communications *For more details, please refer to the PDF document or feel free to contact us.

  • Embedded Board Computers
  • Routers, Switches, and Hubs
  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

WiSAS NORA

It is a service that particularly focuses on "rogue" Wi-Fi among the WiSAS constant monitoring solutions.

The wireless network (Wi-Fi) environment automatically detects security threats 24 hours a day, 365 days a year, based on two factors: signal strength and duration of stay, protecting critical corporate data. It is also possible to automatically block threats based on settings. An alert will be issued if an unauthorized access point (AP) outside of management is discovered. Constant monitoring of unauthorized Wi-Fi usage that directly leads to information leaks: - Permanently installed APs: A list of unverified wireless APs that are permanently installed and detection of connected devices. - Temporarily used APs: A list of unverified wireless APs that have been used temporarily, usage history, and detection of connected devices.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Large-capacity file exchange service "e-Purser"

Large-capacity file exchange service "e-Pacel"

The "e-Purcel" large-capacity file exchange service allows for the safe and reliable exchange of large files, such as CAD data, through simple operations on a computer. Customers who are struggling with handling large data, such as those who are "sending CAD data overseas using media like CDs, but are troubled by the time and effort involved," or those who are "operating an FTP server for data transfer with business partners but want to be freed from the cumbersome management tasks like ID management, data backup, and deletion," will find this service to be the ideal tool. Unlike services that utilize storage servers, this service can be used more easily (there is no need for download operations when receiving data) and more securely (it has a high encryption strength, and data does not remain on the server). It is used by approximately 5,000 customers, including major automobile manufacturers and large construction machinery manufacturers.

  • Other information systems
  • EAI/ETL/WEB application server

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IEC 61162-460 Cybersecurity Switch for Ships

IEC 60945, IEC 61162-460 Edition 3 compliant cybersecurity switch for ships

The 1Gbps x 24-port managed LAN switch is the world's first Layer 3 network switch compliant with the IEC61162-460 standard. The configuration includes IPv4/IPv6 multicast and prioritization of specific ports using VLAN and QoS.

  • Routers, Switches, and Hubs

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Data] Telework Security Enhancement Checklist

With the shift to remote work, we would like to review! Introducing key points of employee training with explanations.

This document introduces six security challenges and countermeasures to consider when implementing remote work. It includes a checklist of security measures that security personnel should be aware of, along with explanations for each item. Additionally, it covers key points for employee security training and security measures utilizing OS protection. This book serves as a useful reference when considering the introduction of remote work, so please make use of it. [Contents (Excerpt)] ■ Chapter 1: Six Telework Security Measures to Prevent Information Leakage (Checklist) ■ Chapter 2: Improving Employee Security Literacy: Key Points for "Training" ■ Chapter 3: Preparing for the Unexpected: Border Control Measures Using OS Protection *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introduction to Network and Cybersecurity Learning Kit for the DX Era

This is a "Network & Security" educational learning kit. It includes workshop texts and offers thorough and attentive instruction both online and in-person (with actual transportation costs for remote locations).

You can learn the fundamentals of communication technologies such as the internet, which is the foundation of cloud/SNS and the core of DX promotion, as well as 5G mobile phones and next-generation Wi-Fi. We offer a course that teaches the basics of security through specific examples, including exercises and experiences, providing hints for your company's response. Furthermore, we will introduce the latest security technologies, such as endpoint security (EDR) and human security, to prevent information leaks from increasing ransomware incidents. - Ideal for new employee training in industrial high schools, universities, and companies! - We provide a course that teaches the basics of security through specific examples, including exercises and experiences, offering hints for your company's response. - We will also introduce security technologies such as endpoint security (EDR) to prevent information leaks. - Texts tailored to the instructor can also be edited (optional). - On-site training is available; please consult us. 【Course Overview】 ■ Overview of Information Security ■ Mechanisms of Network Communication ■ Experience Unauthorized Access ■ Network Security Measures ■ Overview of Security Technologies (such as Endpoint Security) *For more details, please feel free to contact us.

  • Business Skills Seminar

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security solution

From design to post-implementation operation! We provide a comprehensive physical security system.

We would like to introduce the security solutions we offer. Focusing on systems that have succeeded in the large markets of Europe and the United States, where the history of physical security is long, we carry out integration development to meet domestic needs. We provide camera solutions, access control/integrated management systems, anti-shoplifting tags, IoT solutions, and maintenance support. Please feel free to contact us when you need assistance. 【Security Solutions (Partial)】 <Camera Solutions> ■HIKVISION ■GFDesign ■EZVIZ ■i-PRO *For more details, please refer to the related links or feel free to contact us.

  • Surveillance Camera System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Solutions Catalog 2020 Winter

Featuring cloud-based automated vulnerability assessment services and annual monitoring web application assessment services!

This catalog introduces the security solutions offered by our company. It features a rich lineup, including the cloud-based automatic vulnerability assessment service "SCT SECURE Cloud Scan" and "netsparker," which diagnoses web applications from cloud environments. Please use this for selecting products. [Contents (partial)] ■ SCT SECURE Cloud Scan ■ SCT SECURE Manual Web Application Assessment ■ netsparker ■ Gred Security Services ■ McAfee SECURE *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Server monitoring and network management tools
  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Net Agent Co., Ltd. Introduction to Automotive Security Inspection Services

Automotive security inspection service to counter malicious hackers!

This service is an automotive security inspection service that supports the improvement of security levels as a product. Our proud white-hat hacker team conducts penetration tests from an attacker's perspective on vehicles to identify potential risks. If you have any questions about automotive security, please consult us. 【Features】 ■ Supports the improvement of security levels as a product ■ Conducts penetration tests from an attacker's perspective on vehicles ■ Investigates existing potential security weaknesses *For more details, please refer to the catalog or feel free to contact us.

  • Other security and surveillance systems
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Technical Data: Automotive Security Inspection Service

We provide inspection services for communication and collaboration systems of automotive units with abundant experience and achievements!

The "Automotive Security Inspection Service" is an inspection service focused on third-party evaluations of security for in-vehicle units. To achieve safe connected cars and autonomous driving, it is essential that each in-vehicle unit is free from security issues. This document clearly explains various case studies, evaluation procedures, and schedules in different scenarios. [Contents (excerpt)] ■ Background of our capabilities ■ Case studies 1-4 ■ Evaluation procedures ■ Investigation to identify threats (examples), main investigation items ■ Schedule *For more details, please refer to the PDF document or feel free to contact us.

  • Contract Inspection

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Automotive Security Inspection / IoT Device Penetration Testing

Third-party evaluation of the security of in-vehicle units and IoT devices. Proposals for improvements. Presentation of materials with case studies.

Our company offers a service where in-house white hat hackers evaluate the security of in-vehicle units and IoT devices from the perspective of an attacker. We assess the security of systems, including low layers (such as circuit boards and firmware), external communications, cloud services, and smartphone applications. We also provide potential threat and attack scenarios, as well as discovered vulnerabilities and their improvement proposals. After submitting the report, we will hold a briefing session. 【Applicable Examples (Partial)】 ◎ Bluetooth communication units and associated systems (in-vehicle units, Bluetooth communication, smartphone applications, CAN) ◎ Devices with Wi-Fi communication capabilities and associated systems (IoT devices, Wi-Fi communication, smartphone applications) ★ We are currently offering two documents summarizing the service description, our features, and applicable examples. You can view them via "PDF Download." Please feel free to contact us with any inquiries.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Switch "LG1000"

Prevent the spread of malware infections and provide a safe and secure internal network environment!

The "LG1000" detects and blocks unauthorized communication within the internal network, and in conjunction with the Saksa UTM "SS series," it also detects unauthorized access from external sources and blocks the devices. When you log into the LG Portal, a dashboard is displayed as the start screen, providing comprehensive real-time analysis information. Since the logs of this product are collected in the cloud, you can gain "peace of mind during implementation" and "speed during troubleshooting." Additionally, it notifies administrators of detected information in real-time and displays warnings on the browser screens of dangerous devices. 【Features】 ■ Blocking unauthorized communication ■ LG Portal (remote maintenance, security report generation) ■ Alert function ■ Blocking virus-infected PCs (integration with Saksa UTM) ■ Scheduling function *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security
  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Remote support for your business operations, such as computer operations and document creation!

Are you having trouble with things like 'sudden issues...', 'I can't explain it well over the phone or email...', or 'I can't get immediate assistance because I'm in a remote location...'?

The "Remote Support Solution" is a service that allows us to remotely access your computer via the internet and provide various types of assistance. While sharing the operation screen, we can remotely assist with tasks such as how to use the system, setting configurations, or handling administrative tasks like document creation and data entry. It can also be utilized as an internal help desk. 【Features】 ■ Remote support from a distance ■ Reduction of travel expenses ■ Quick response capability ■ Direct confirmation of the customer's environment ■ Screen sharing is possible *For more details, please refer to the PDF document or feel free to contact us.

  • Other network tools
  • CTI Support Center

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration