We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security Solutions.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security Solutions Product List and Ranking from 36 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Aug 27, 2025~Sep 23, 2025
This ranking is based on the number of page views on our site.

Security Solutions Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Aug 27, 2025~Sep 23, 2025
This ranking is based on the number of page views on our site.

  1. ピーエスアイ 本社 Tokyo//IT/Telecommunications
  2. null/null
  3. サブゲート Tokyo//IT/Telecommunications
  4. 4 旭電通 Tokyo//Trading company/Wholesale
  5. 5 トータルリンク Hyogo//IT/Telecommunications

Security Solutions Product ranking

Last Updated: Aggregation Period:Aug 27, 2025~Sep 23, 2025
This ranking is based on the number of page views on our site.

  1. Security Switch "TiFRONT (Cloud Management Model)" ピーエスアイ 本社
  2. Security Switch "LG1000" 旭電通
  3. Research Facility Fireproof Chemical Storage Cabinet
  4. 4 Security solution "NISG 3,000 Series" トータルリンク
  5. 4 The savior of supply chain attack measures! Highly effective security measures! サブゲート

Security Solutions Product List

16~30 item / All 57 items

Displayed results

Support services for internal PSIRT (Product Security Incident Response Team)

Strongly support the establishment and enhancement of PSIRT from planning and operation to improvement and incident response!

Our company offers one-stop support for PSIRT, including not only the planning of construction but also assistance in the preparation of PSIRT-related documents, security threat and incident analysis, support for obtaining Achilles certification, assessments, training, incident response support, and operational evaluations. Please feel free to contact us if you have any requests. *PSIRT refers to an organization that manages risks related to security vulnerabilities in products manufactured or sold by the company and responds to emergencies during security incidents. While CSIRTs have also become widespread, the difference from CSIRTs is that PSIRTs are security response organizations specifically for IoT products and IoT services provided to customers. [Examples of Services Offered] ■Support for PSIRT construction planning ■Assistance in the preparation of PSIRT-related documents, etc. *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[File Transfer Service Case] Sumitomo Life Insurance Company

Achieve minimization of information risk due to misdelivery by utilizing a closed transmission function for the transfer of personal information of insurance subscribers (Crypto Delivery).

We would like to introduce a case study of the implementation of "Crypto Delivery" at Sumitomo Life Insurance Mutual Company. Until now, the company has been exchanging various business information with customer companies using FD and MO, but the process of exchanging information through electronic media has been cumbersome and improvements have been desired from the perspective of information security. Therefore, the company introduced our product starting in January 2015. In addition to reducing the costs and efforts associated with data exchange, they have implemented a system for data transfer that is more efficient and protected by robust security, utilizing features such as the "Closed Group" function, which allows file exchanges only among designated users. 【Key Points】 ■ Utilization of the "Closed Transmission Function" for the exchange of personal information ■ Minimization of the risk of information leakage due to misdelivery ■ Confirmation of advantages in both security and cost aspects *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall and intrusion prevention
  • Encryption and authentication
  • Virus software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[High Privilege ID Management Case Study] Tokyu Card Co., Ltd.

An example of improved internal security awareness through the establishment of a workflow for task approval.

We would like to introduce the case of Tokyu Card Co., Ltd., which implemented the high-privilege (privileged ID) management solution "SecureCube Access Check." In 2015, the company began efforts to establish a more secure card usage environment in compliance with the security standards for credit card information protection, PCI DSS. They introduced our product as their ID management tool, further strengthening their security management system and enhancing security awareness. 【Case Overview】 ■ Client: Tokyu Card Co., Ltd. ■ Product Implemented: SecureCube Access Check ■ Implementation Effects - Achieved strong access control required by PCI DSS - Significantly improved security awareness across the organization *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Other information systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Resin Acid-Resistant Cabinet / Chemical Storage Cabinet 'TPLA-H385/320'

High-density polyethylene resin acid-resistant cabinet and chemical storage cabinet with excellent chemical resistance.

The "TPLA-H385/H320 series" is a resin acid-resistant cabinet and chemical storage unit made from "impact-resistant polyethylene," which is difficult to crack even when struck with a hammer. It is extremely sturdy and molded as a single piece, allowing the top of the cabinet to be used as a workspace. Additionally, we also offer the resin acid-resistant cabinet and chemical storage unit "TS-W385 series" for hospitals. 【Features】 ■ Extremely sturdy one-piece molding ■ No assembly required ■ Washable due to plastic material ■ Excellent moisture-proof, corrosion-resistant, and rust-proof properties ■ Ventilation holes on the sides *For more details, please refer to the PDF materials or feel free to contact us.

  • cabinet

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security solution

Are you taking measures against the rapidly increasing supply chain attacks? Internal measures are necessary to prevent the expansion of damage.

The threat of "supply chain attacks," which exploit small and medium-sized enterprises and subcontractors to target large corporate clients, is increasing. As cyberattacks continue to become more sophisticated and advanced, it is essential to implement "entry measures" to prevent intrusions, "external measures" to block communications with external attackers, and "internal measures" to prevent the expansion of damage. Security automation significantly reduces the burden on IT administrators. 【Features】 ■ Automates initial responses from threat detection to containment, preventing the spread of damage - By linking "detection" and "initial response" through security products, endpoint security measures can be implemented more reliably. ■ Flexible access control - Various actions are prepared according to the severity of security incidents and the customer's operational policies. *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security and surveillance systems
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Paloato × SKYSEA Collaboration Solution

Detects multiware intrusions and suspicious communications to external sources! Quickly isolates infected devices from the network.

Introducing the "Paloato × SKYSEA Collaborative Solution." This solution detects unknown malware and known threats commonly associated with targeted attacks through Palo Alto Networks' firewall cloud threat analysis, "WildFire," in conjunction with "SKYSEA Client View" for client operation management. It enables rapid isolation of infected devices from the network. 【Features】 ■ Detects malware intrusions and suspicious communications to external sources ■ Allows control of client PCs ■ Visualizes and comprehends threat attacks ■ Detects movements of known and unknown malware *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security solution 'SASTIK(R) III'

Reduced the implementation hurdle for thin clients to 1/10, achieving deployment for all employees!

The 『SASTIK(R) III』 Thin-Client Layer allows companies wishing to implement it to inherit their existing PC and software assets while achieving the high security of thin clients through cost reduction via PC virtualization. The high security features of thin clients remain intact, reducing costs, implementation barriers, and difficulty to one-tenth. 【Features】 ■ Cost Revolution: Reduces total costs by one digit ■ Implementation Revolution: No need to replace infrastructure, OS, or software ■ Convenience Revolution: Instant thin client by simply plugging it in *For more details, please download the PDF or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security solution

We provide security enhancement solutions such as user management utilizing strengthened key unlocking and locking.

"Security Solutions" provides enhanced security solutions through video surveillance for indoor and outdoor environments, including evidence preservation, management of customer and confidential information, and user management utilizing strengthened unlocking and locking of keys. We monitor and alert for unauthorized access by individuals not registered in the facial recognition system in offices, warehouses, and server rooms. We also conduct indoor/outdoor crime prevention, video recording, and surveillance. Additionally, it can be used for managing the removal of documents containing customer and personal information, as well as for temperature measurement and health management for facility entrants. 【Features】 ■ Enhanced security ■ Customized proposals based on customer network environment and requirements ■ Ability to link facial recognition cameras with door security ■ Options to choose the size and color of security cabinets *For more details, please refer to the PDF document or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security solution 'SubGate'

A security solution that enables intuitive network operations.

"SubGate" is a network internal security solution that automatically detects and blocks security threats occurring within the network, enhancing the stability of network services and the convenience of operations. It protects the network with patented technology from Special Patent 2011-523822, "Access Level Security Device and Security System." The MDS engine performs traffic analysis based on behavior, automatically detecting and blocking harmful traffic without degrading switch performance. [Features] - Patented technology for access level network security - Dedicated engine for harmful traffic analysis (MDS Engine) - Selection and blocking of harmful traffic to prevent its spread - Simple security settings - Perfect compatibility with other switches, etc. *For more details, please download the PDF or contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Things to Address in 2022 [Security Measures]

We will introduce the key points of issues that require strengthened measures and security switches!

In preparation for the day when measures to prevent the spread of viruses become even more essential, we would like to introduce the actions to be taken in 2022. Key points for strengthening measures include the "amendment of the Personal Information Protection Act," the "amendment of the Electronic Bookkeeping Act," and "measures for telework PCs." Our security switch, 'SubGate,' allows for easy internal measures. It is suitable for preventing the spread of computer viruses, detecting and blocking harmful traffic, and preventing eavesdropping on internal IP phones and confidential data. [Key Points for Strengthening Measures] ■ Amendment of the Personal Information Protection Act Stricter reporting (mandatory), two types of reports (preliminary and final) ■ Amendment of the Electronic Bookkeeping Act Changes in storage methods, security of storage locations ■ Measures for Telework PCs Home cluster, censorship during internal connections *For more details, please refer to the PDF document or feel free to contact us.

  • Routers, Switches, and Hubs
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

<Security Measures> Introducing measures to prevent the spread of viruses.

What should we do against increasingly sophisticated cyber attacks? Introducing measures to prevent the spread of viruses!

We are offering a document summarizing the security measures implemented by SubGate Inc. It includes "Things to Address in 2022," "Security Measures for 2022," and "Necessary Actions for Supply Chain Attack Prevention," among other virus prevention measures. Our security switch, 'SubGate,' protects your network. Please feel free to download and take a look. [Offered Documents] ■ Things to Address in 2022 ■ Security Measures for 2022 ■ Necessary Actions for Supply Chain Attack Prevention ■ [Horror Newspaper] True Scary Stories, Episode 1 ■ [Horror Newspaper] True Scary Stories, Episode 2 *For more details, please refer to the PDF document or feel free to contact us.

  • Routers, Switches, and Hubs
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Endpoint protection product "AppGuard"

Endpoint security that does not search for 'OS-protected' threats.

"AppGuard" is an innovative endpoint protection product that blocks threats at the stage of attack. It has a long track record with the U.S. military and government agencies. It also prevents unauthorized processes in advance, protecting systems from threats. There is no need for file scanning, significantly reducing the system load on PCs, and there is no need for pattern file updates, with no false positives (no detection concept), making it easy to operate. 【Features】 ■ Prevention of unknown malware execution ■ Prevention of ransomware execution ■ Prevention of drive-by download execution ■ Prevention of fileless malware execution ■ Prevention of confidential information leakage due to malware ■ Prevention of OS tampering *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] Multi-vector Defense Solutions Against Cyber Attacks

Evolving Cyber Attacks! An Introduction to Challenges and Attempts in Business

This document explains the challenges businesses face regarding cyber attacks and the solutions available. It recommends the integration of network detection and storage layers, and introduces the advantages of the solutions as well as how multi-vector defense solutions work. Please make use of this information for countermeasures against cyber attacks and ransomware attacks. 【Contents】 ■ Business Challenges ■ Integration of Network Defense and Storage Defense ■ Advantages of the Solutions ■ How Multi-Vector Defense Solutions Work ■ About Superna *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Cyber Attack Countermeasure Case] Orange Slovakia

Published case studies of measures against cyber attacks that solved issues in the security operations department and the network operations department.

As a measure against cyber attacks, we would like to introduce a case where our security solution "Flowmon" was implemented for Orange Slovakia. The company's security operations and network operations departments wanted to significantly improve the overall availability and security of their network. After the implementation, information that could not previously be seen by the security operations department became visualized, and they gained better technology for discovering issues. [Case Overview (Partial)] ■Implemented Product: Progress Flowmon ■Industry: Telecommunications ■Challenge: To significantly improve the overall availability and security of the network *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

E-commerce support services for the cosmetics industry

Cosmetics can be handled at warehouses that have obtained manufacturing industry permits!

Our company offers a "Cosmetics E-Commerce Service" that provides support from site construction to shipping, as well as the creation of business flows and manuals in accordance with pharmaceutical regulations. We operate e-commerce sites for products related to pharmaceutical law, such as cosmetics and health foods, in our group’s warehouse, allowing us to propose and implement logistics solutions tailored to our customers. Additionally, in operating the e-commerce site, we design business flows that take into account relevant laws and industry regulations, create call center manuals, and conduct operator training, ensuring consistent service provision and support across the entire group. 【Benefits】 ■ It is possible to manage cosmetics and quasi-drugs produced overseas domestically. *For more details, please contact us.

  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration