Security Solutionsのメーカーや取扱い企業、製品情報、参考価格、ランキングをまとめています。
イプロスは、 製造業 BtoB における情報を集めた国内最大級の技術データベースサイトです。

Security Solutions - メーカー・企業17社の業務用製品ランキング | イプロスものづくり

更新日: 集計期間:Feb 25, 2026~Mar 24, 2026
※当サイトの各ページの閲覧回数を元に算出したランキングです。

Security Solutionsのメーカー・企業ランキング

更新日: 集計期間:Feb 25, 2026~Mar 24, 2026
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. サブゲート Tokyo//IT/Telecommunications
  2. DAIKO XTECH Tokyo//IT/Telecommunications
  3. 日本HP Tokyo//IT/Telecommunications
  4. ビーアイ 本社 Tokyo//Resin/Plastic
  5. Blue Planet-works Tokyo//IT/Telecommunications

Security Solutionsの製品ランキング

更新日: 集計期間:Feb 25, 2026~Mar 24, 2026
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. Security solution 'SubGate' サブゲート
  2. [Data] Telework Security Enhancement Checklist DAIKO XTECH
  3. Security solution 'urlscan.io' テガラ
  4. Constella Security Japan, Inc.
  5. 4 HP Security Solutions Domestic Implementation Case Studies 日本HP

Security Solutionsの製品一覧

1~24 件を表示 / 全 24 件

表示件数

[Data] Telework Security Enhancement Checklist

With the shift to remote work, we would like to review! Introducing key points of employee training with explanations.

This document introduces six security challenges and countermeasures to consider when implementing remote work. It includes a checklist of security measures that security personnel should be aware of, along with explanations for each item. Additionally, it covers key points for employee security training and security measures utilizing OS protection. This book serves as a useful reference when considering the introduction of remote work, so please make use of it. [Contents (Excerpt)] ■ Chapter 1: Six Telework Security Measures to Prevent Information Leakage (Checklist) ■ Chapter 2: Improving Employee Security Literacy: Key Points for "Training" ■ Chapter 3: Preparing for the Unexpected: Border Control Measures Using OS Protection *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solution

From design to post-implementation operation! We provide a comprehensive physical security system.

We would like to introduce the security solutions we offer. Focusing on systems that have succeeded in the large markets of Europe and the United States, where the history of physical security is long, we carry out integration development to meet domestic needs. We provide camera solutions, access control/integrated management systems, anti-shoplifting tags, IoT solutions, and maintenance support. Please feel free to contact us when you need assistance. 【Security Solutions (Partial)】 <Camera Solutions> ■HIKVISION ■GFDesign ■EZVIZ ■i-PRO *For more details, please refer to the related links or feel free to contact us.

  • Surveillance Camera System
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security Solutions Catalog 2020 Winter

Featuring cloud-based automated vulnerability assessment services and annual monitoring web application assessment services!

This catalog introduces the security solutions offered by our company. It features a rich lineup, including the cloud-based automatic vulnerability assessment service "SCT SECURE Cloud Scan" and "netsparker," which diagnoses web applications from cloud environments. Please use this for selecting products. [Contents (partial)] ■ SCT SECURE Cloud Scan ■ SCT SECURE Manual Web Application Assessment ■ netsparker ■ Gred Security Services ■ McAfee SECURE *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Server monitoring and network management tools
  • Other services
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Data De-identification Solution "ZENMU"

Security measures that do not protect by converting and splitting data into meaningless data.

"ZENMU" is an open security infrastructure that "de-meaningizes" data, differing conceptually from conventional encryption technologies. By converting and splitting data into meaningless data, it makes it unreadable with just one fragment, and it can only be restored when all distributed fragments are gathered. [Features] ■ Achieves robust security by storing fragments in multiple locations ■ Establishes information safety without user awareness ■ Frees from new security costs *For more details, please download the PDF or contact us.

  • 企業:ZenmuTech
  • 価格:Less than 10,000 yen
  • Software (middle, driver, security, etc.)
  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solution

Are you taking measures against the rapidly increasing supply chain attacks? Internal measures are necessary to prevent the expansion of damage.

The threat of "supply chain attacks," which exploit small and medium-sized enterprises and subcontractors to target large corporate clients, is increasing. As cyberattacks continue to become more sophisticated and advanced, it is essential to implement "entry measures" to prevent intrusions, "external measures" to block communications with external attackers, and "internal measures" to prevent the expansion of damage. Security automation significantly reduces the burden on IT administrators. 【Features】 ■ Automates initial responses from threat detection to containment, preventing the spread of damage - By linking "detection" and "initial response" through security products, endpoint security measures can be implemented more reliably. ■ Flexible access control - Various actions are prepared according to the severity of security incidents and the customer's operational policies. *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security and surveillance systems
  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Paloato × SKYSEA Collaboration Solution

Detects multiware intrusions and suspicious communications to external sources! Quickly isolates infected devices from the network.

Introducing the "Paloato × SKYSEA Collaborative Solution." This solution detects unknown malware and known threats commonly associated with targeted attacks through Palo Alto Networks' firewall cloud threat analysis, "WildFire," in conjunction with "SKYSEA Client View" for client operation management. It enables rapid isolation of infected devices from the network. 【Features】 ■ Detects malware intrusions and suspicious communications to external sources ■ Allows control of client PCs ■ Visualizes and comprehends threat attacks ■ Detects movements of known and unknown malware *For more details, please refer to the PDF document or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solution 'SASTIK(R) III'

Reduced the implementation hurdle for thin clients to 1/10, achieving deployment for all employees!

The 『SASTIK(R) III』 Thin-Client Layer allows companies wishing to implement it to inherit their existing PC and software assets while achieving the high security of thin clients through cost reduction via PC virtualization. The high security features of thin clients remain intact, reducing costs, implementation barriers, and difficulty to one-tenth. 【Features】 ■ Cost Revolution: Reduces total costs by one digit ■ Implementation Revolution: No need to replace infrastructure, OS, or software ■ Convenience Revolution: Instant thin client by simply plugging it in *For more details, please download the PDF or feel free to contact us.

  • Encryption and authentication
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solution 'SubGate'

A security solution that enables intuitive network operations.

"SubGate" is a network internal security solution that automatically detects and blocks security threats occurring within the network, enhancing the stability of network services and the convenience of operations. It protects the network with patented technology from Special Patent 2011-523822, "Access Level Security Device and Security System." The MDS engine performs traffic analysis based on behavior, automatically detecting and blocking harmful traffic without degrading switch performance. [Features] - Patented technology for access level network security - Dedicated engine for harmful traffic analysis (MDS Engine) - Selection and blocking of harmful traffic to prevent its spread - Simple security settings - Perfect compatibility with other switches, etc. *For more details, please download the PDF or contact us.

  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Information] Multi-vector Defense Solutions Against Cyber Attacks

Evolving Cyber Attacks! An Introduction to Challenges and Attempts in Business

This document explains the challenges businesses face regarding cyber attacks and the solutions available. It recommends the integration of network detection and storage layers, and introduces the advantages of the solutions as well as how multi-vector defense solutions work. Please make use of this information for countermeasures against cyber attacks and ransomware attacks. 【Contents】 ■ Business Challenges ■ Integration of Network Defense and Storage Defense ■ Advantages of the Solutions ■ How Multi-Vector Defense Solutions Work ■ About Superna *For more details, please refer to the PDF document or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Cyber Attack Countermeasure Case] Orange Slovakia

Published case studies of measures against cyber attacks that solved issues in the security operations department and the network operations department.

As a measure against cyber attacks, we would like to introduce a case where our security solution "Flowmon" was implemented for Orange Slovakia. The company's security operations and network operations departments wanted to significantly improve the overall availability and security of their network. After the implementation, information that could not previously be seen by the security operations department became visualized, and they gained better technology for discovering issues. [Case Overview (Partial)] ■Implemented Product: Progress Flowmon ■Industry: Telecommunications ■Challenge: To significantly improve the overall availability and security of the network *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solution 'urlscan.io'

Commercial service of "urlscan.io" that allows scanning and analyzing page information from URLs.

A commercial service related to the web service "urlscan.io," which allows users and organizations needing deeper insights to scan and analyze page information by submitting the URL of the target website. It is useful for investigating harmful sites and protecting one's own brand. By using this API in conjunction with various third-party integrations, SOAR tools, and custom integrations by users themselves, it becomes possible to submit URLs for scanning, retrieve scan results (screenshots and DOM snapshots), and search existing scans by different attributes. There are four types of plans: Starter, Advanced, Professional, and Enterprise, depending on the number of scans and requests. Please let us know your preferred plan when making an inquiry. *Also compatible with the information visualization and analysis tool Maltego.

  • Software (middle, driver, security, etc.)
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Offshore Development Achievements: Threat Awareness-Based Data Protection

Prevent unauthorized access and abuse of APIs with a web application firewall!

We would like to introduce our achievements in the development of "threat-aware data protection" aimed at protecting your data center's data from external threats. Defending against anonymous threats is a challenge. By using encryption technology, we protect data at rest and in transit, and prevent unauthorized movement and leakage of data with our Data Loss Prevention (DLP) solutions. We have implemented end-to-end encryption, which protects against eavesdropping and tampering of data packets, and strictly controls access to private resources and corporate assets in the cloud. 【Project Overview】 ■ Challenge: Defense against anonymous threats ■ Solution - Protect data at rest and in transit using encryption technology, and prevent unauthorized movement and leakage of data with Data Loss Prevention (DLP) solutions. - Ensure data privacy and integrity by encrypting communications from the data center to end users using TLS. *For more details, please download the PDF or feel free to contact us.

  • Firewall and intrusion prevention
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Notice of Participation in "Edge Tech+ 2025"

Within our booth, domestic and international partners focused on product security will be exhibiting in their own spaces!

Rihyō Electro Co., Ltd. will be exhibiting at 'Edge Tech+ 2025' held at Pacifico Yokohama. This exhibition is one of Japan's largest comprehensive exhibitions for embedded and edge technology, and we will be showcasing our "Support Services for European CRA Compliance - Introducing Security Solutions to Secure Devices and Equipment." Within our booth, domestic and international partners focused on product security will also have their own booths, and we plan to hold short seminars on the booth stage. We sincerely look forward to your visit. 【Exhibition Overview】 ■ Dates: November 19 (Wed) - 21 (Fri), 2025, 10:00 AM - 5:00 PM  * On the 20th (Thu), due to the Festa event, it will be open until 6:00 PM ■ Admission Fee: Free (Pre-registration online is required) ■ Venue: Pacifico Yokohama Exhibition Hall/Annex Hall ■ Booth Number: CM-12 ■ Registration: https://f2ff.jp/etexpo/2025/exhibitors/detail.php?id=3464&lang=ja * For more details, please download the PDF or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

HP Security Solutions Domestic Implementation Case Studies

From local governments to private companies! Numerous case studies on the implementation of HP security solutions are featured.

This document is a collection of case studies summarizing domestic implementations of HP Wolf Pro Security and HP Sure Click Enterprise. It introduces the objectives, approaches, and effects of the implementation of three products: "HP Wolf Pro Security," "HP Sure Click Enterprise," and "HP Protect and Trace with Wolf Connect" in municipalities and private companies. Please use it as a reference for product selection. 【Featured Cases (Partial)】 ■ TOPCREW Co., Ltd. ■ GC Infotech Co., Ltd. ■ Sanyuukai Medical Corporation, Ayano Clinic ■ Yahatanhama City, Ehime Prefecture ■ Kofu Town, Tottori Prefecture ■ Tomigusuku City, Okinawa Prefecture *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

5G security solution

Providing security and scalability in the transition to 5G mobile networks!

Our company provides highly scalable security solutions, anticipating various scenarios of 5G networks. We offer mobile communication operators evolving their networks for 5G the highest levels of flexibility, scalability, and protection. Robust firewalls and DDoS mitigation and detection technologies can be deployed in various form factors (physical, virtual, bare metal, container) according to individual network topologies (4G, 5G-NSA, MEC, 5G SA). 【Key Solutions】 ■ Gi-LAN Security ■ Mobile Roaming Security ■ Network Slicing ■ Comprehensive DDoS Attack Defense for All Networks ■ Secure and Efficient MEC *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Firewall and intrusion prevention
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solution "AppGuard"

New concept OS-protect type endpoint security!

"AppGuard" is an OS-protecting endpoint security that protects PCs from any threats, whether known or unknown, without performing detection or identification. As the name suggests, it protects the OS itself and does not harm the system. Furthermore, users can use programs they have installed without the need for listing (policy settings), and it is also possible to apply updates to those software without changing the settings. 【Features】 ■ Does not harm the system regardless of unknown, zero-day, or known threats (prevents unauthorized actions in advance) ■ Ensures system safety *For more details, please download the PDF or contact us.

  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

UTM Solutions for Transportation and Operations Management

We support safe operation management with UTM solutions!

In the transportation and operation management industry, accurate management of vehicle location information and operation data is essential. System outages and information leaks due to cyberattacks can lead to delays in operations and a loss of trust from customers. UTM solutions protect the network from these threats and support safe operation management. 【Usage Scenarios】 * Strengthening the security of operation management systems * Protecting vehicle location information and operation data * Defending against unauthorized access and malware 【Benefits of Implementation】 * Establishing a safe operation management system * Reducing the risk of information leaks * Improving operational efficiency

  • firebox2.jpg
  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solutions for communication networks

We protect the network from information leaks and unauthorized access.

In the telecommunications network industry, the protection of information assets and the provision of stable services are essential. Unauthorized access to networks and information leaks can undermine customer trust and have serious implications for business continuity. Our security solutions are designed to mitigate these risks. 【Use Cases】 - Strengthening network security - Measures against unauthorized access - Measures against information leaks - Ransomware countermeasures - Security measures for remote work environments 【Benefits of Implementation】 - Reduction of information leak risks - Prevention of unauthorized access - Improvement of business continuity - Gaining customer trust - Ensuring security in remote work environments

  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solutions for smart homes

Supporting a safe and secure lifestyle with smart home security measures.

In the smart home market, the proliferation of IoT devices has led to an increase in cybersecurity risks. It is important to protect homes from threats such as personal information leaks due to unauthorized access and device takeovers. Our security solutions address various security risks in smart homes, enabling a safe living environment. 【Use Cases】 - Strengthening the security of IoT devices such as smart locks, security cameras, and home appliances - Protection against unauthorized access and malware - Security measures in remote work environments 【Benefits of Implementation】 - Reducing the risk of information leaks and unauthorized access - Safe use of smart home devices - Protection of residents' privacy

  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security Solutions for Research Institutions

We protect research data from information leaks and unauthorized access.

In research institutions, it is essential to manage highly confidential information such as research data and intellectual property securely. Unauthorized access and information leaks can lead to delays in research and a decrease in reliability. Particularly, with the increased use of cloud services and collaborative research with external parties, the importance of security measures is growing. Our security solutions offer the latest security measures tailored to the needs of research institutions. 【Usage Scenarios】 - Research data management systems - Information sharing in collaborative research - Protection of intellectual property 【Benefits of Implementation】 - Reduction of information leak risks - Protection against unauthorized access - Improvement of research data reliability - Compliance with regulations

  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Case Study / Strengthening Security and Improving Efficiency for Member Content Distribution Site

We will introduce a case study that successfully improved convenience while maintaining security in the distribution of e-books for paid members!

To the publishers, we would like to introduce a case study of our solution that combines "PsafeVIEW" and "HGDDS." We have achieved secure distribution through encrypted PDFs and improved user convenience with two viewing methods for eBook content provided to paid members. We successfully balanced advanced security requirements and large-scale user support, which contributed to increased member satisfaction and enhanced information security. 【Implementation Overview】 ■ Implementing Organization: Publishers ■ Implementation Effects: - Prevented secondary use of eBooks for paid members, enabling secure content distribution both domestically and internationally. - Achieved flexible responses to members' usage scenarios through two viewing methods (online viewing and download viewing). - With multi-browser support, we were able to implement the solution while meeting security requirements, even during the replacement of existing systems. *For more details, please download the catalog or feel free to contact us.

  • Document and Data Management
  • Encryption and authentication
  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security Solutions for the IT Industry

We protect IT infrastructure from information leaks and unauthorized access.

In the IT industry, cyber attacks that exploit system and network vulnerabilities pose a significant threat. In particular, information leaks and unauthorized access can undermine a company's trust and lead to potential damages and difficulties in business continuity. Vulnerability assessments are essential for identifying these risks in advance and implementing countermeasures. Our security solutions combine the latest security measures to robustly protect IT infrastructure. 【Use Cases】 - Vulnerability assessment of web applications - Vulnerability assessment of networks - Vulnerability assessment of operating systems and middleware 【Benefits of Implementation】 - Reduction of information leak risks - Prevention of damage from unauthorized access - Minimization of business impact due to system downtime - Rapid response in the event of a security incident

  • Other security
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Seminar Video / Targeted Manufacturing Industry: Measures Against Technical Information Leakage and Introduction of Successful Cases

Safely sharing technical information while protecting it. Introduction to security solutions for the manufacturing industry [Event held on December 11, 2024].

We would like to introduce the archived videos of seminars we have held in the past. *The video link for this seminar is included on the cover of the PDF materials. Please download the PDF and be sure to take a look. 【Seminar Overview】 With the promotion of DX, sharing technical information has become more convenient, but the risk of information leakage has also increased. On the other hand, robust security measures tend to complicate operations. In this seminar, we will introduce the solution "PsafeVIEW," which balances security and convenience. While protecting information with features such as download and print restrictions, it reduces operational burden with multi-browser support and no need for individual settings. We will mainly explain through case studies and product demonstrations, so if you are interested in security measures for sharing technical information, please take a look.

  • Document and Data Management
  • Other services
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録