We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software Product List and Ranking from 64 Manufacturers, Suppliers and Companies | IPROS GMS

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

  1. ハミングヘッズ 本社 Tokyo//software
  2. 飛天ジャパン Tokyo//IT/Telecommunications
  3. アンカーテクノロジーズ Tokyo//IT/Telecommunications
  4. 4 日本ファインアート Tokyo//IT/Telecommunications
  5. 5 Spelldata Tokyo//Information and Communications

Security software Product ranking

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

  1. [Information Leakage Countermeasures] Security Platform 'SeP' ハミングヘッズ 本社
  2. One-Time Password Token "C200" *Free trial version available for loan. 飛天ジャパン
  3. VirusTotal Enterprise アンカーテクノロジーズ
  4. 4 [Case Study Collection] Information Leakage Prevention System Total Security Fort 日本ファインアート
  5. 5 Burp Suite アンカーテクノロジーズ

Security software Product List

1~30 item / All 128 items

Displayed results

High Security Access Point FortiGate

Broadly respond to environmental changes! High-security wireless access point FortiAP that works with FortiGate.

The security appliance FortiGate is a UTM appliance that provides essential security functions required for a company's internet gateway in a single device. The security switch TiFRONT can implement three internal measures: "prevention of threats," "prevention of spread," and "network visualization." It works in conjunction with entrance and exit measures, enabling "immediate blocking upon detection." The wireless access point FortiAP supports the latest 802.11ac with minimal interference and security. 【Features】 [FortiGate] ○ Comprehensive security functions in one device ○ Measures against external threats from the internet [TiFRONT] ○ Visualization of internal networks and measures against internal threats ○ "Immediate blocking upon detection" in conjunction with entrance and exit measures [FortiAP] ○ Measures against invisible threats via wireless AP For more details, please contact us.

  • Other security and surveillance systems
  • Other security
  • Wireless LAN
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Comprehensively respond to cyber threats! Heimdal Security Suite

Integrate all cybersecurity measures into a single platform to combat threats!

The "Heimdal Security Suite" is a comprehensive cybersecurity cloud service necessary for modern cyber threat countermeasures. It is integrated into a single platform, providing a security solution that combines convenience and safety while simplifying IT infrastructure and mitigating risks. With one dashboard, you can prevent, detect, and manage all threats. You can use all features or just individual functions as needed. It has been recognized by the FBI (Federal Bureau of Investigation) for its technical support in malware tracking. Are you facing any of these issues? - Want to consolidate cybersecurity measures onto a single platform to improve operational efficiency and reduce costs? - Have you experienced a security breach from ransomware or feel anxious about ransomware countermeasures? - Want to strengthen weaknesses without changing the systems you are currently using? We can solve these concerns. *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Secure Print Suite

Achieve secure authentication with IC card security! Keep your existing multifunction printer as is, and control printing, copying, scanning, and more with just one card reader!

Secure print is the solution to common office concerns such as "annual printing costs do not decrease" and "abandoned printed materials do not disappear." By simply installing a card reader on existing multifunction printers and printers, it enables authenticated printing while keeping new investments to a minimum. It supports various IC cards used for employee IDs and is a security product that satisfies customers who want to "support various manufacturers' models and printer environments" and "centralize management of printed logs."

  • Personal authentication
  • Entrance and exit control system
  • Printer
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[AUTOCRYPT] Outcrypt V2X

Support for a safe V2X communication environment.

V2X-EE is a software development kit (SDK) provided for integration into onboard units (OBUs) and roadside units (RSUs), supporting the storage of necessary certificates for secure communications such as Basic Safety Messages (BSMs) transmitted between vehicles and between vehicles and signals/infrastructure, as well as assisting with electronic signatures, encryption, and decryption, thereby supporting a secure V2X communication environment. V2X-PKI provides a PKI architecture that verifies message signatures and integrity, ensuring trust in the source of messages, and supports management throughout the entire lifecycle, including the generation, distribution, and revocation of certificates based on the PKI architecture. For the increasingly advanced autonomous driving functions, it offers encryption and authentication solutions for V2X communication, having secured 100% of the government project for C-ITS in South Korea, and proving the solution's validity by integrating it into communication modules.

  • Other Auto Parts
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Is the security of the cloud email service okay?

Introduction to an integrated cloud security product that offers security features for email sending and receiving, as well as for web browsing.

"Matrix Cloud" is an integrated cloud security product that offers security features for email sending and receiving, as well as for web browsing. It is increasingly used for countermeasures against impersonation (EMOTET), which traditional anti-malware measures can no longer fully prevent, as well as for information leakage prevention through attachment encryption and supervisor approval (third-party approval). Please consider it for minimizing security risks in cloud environments. ■ Basic Features - AI Anti-Spam (in-house developed engine) - AI Anti-Virus (in-house developed engine) - IP Reputation - Information Leakage Prevention - Attachment Encryption - Supervisor Approval - Temporary Hold Function for Sent Emails - Personal Information Protection Filter (planned for next version) - Simple Archive Function (requires HDD expansion contract) ■ Sanitization Features - Macro Removal - Attachment Image/Text Conversion - Attachment Deletion (specified file extensions) - HTML Email Body Text Conversion - URL Link Removal ■ Web Security Features - AI Anti-Malware (in-house developed engine) - URL Filtering

  • Software (middle, driver, security, etc.)
  • Other security
  • Other server related
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AssetView GOLD

A security software that allows you to add only the necessary features as needed!

~ There is software that allows you to add only the necessary features as needed ~ Have you ever purchased packaged software that has unnecessary features or lacks necessary ones? With AssetView GOLD, you can solve those problems all at once! □ Purchase at minimal cost You can choose and purchase five features, avoiding unnecessary implementation. Buying all features is also a great deal. □ Easy installation It has an automatic installation feature for each PC, and adding features can be done with simple operations. □ Easy operation Operation is achieved with simple actions. In particular, the strengths are the ability to save past logs and the automatic version upgrade feature. ◆◆ If you would like a catalog, please inquire through the request for materials ◆◆ ~ You can view some content from the download ~

  • others
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Panopticon Case Study] Embedded in Our Own Solution

Achieving the provision of business intelligence and optimization of data visualization! Introduction of case studies.

We would like to introduce a case study of Imagine Software, which implemented our "Altair Panopticon." The company was considering the introduction of a visual analytics system that could be embedded into their scalable enterprise risk management and compliance platform, allowing customers to embed dashboards into in-house or third-party systems. As a result, they adopted our product. As a result of these enhancements, they were able to reduce the average sales cycle by half compared to before. [Challenges] ■ There is a need to quickly integrate the ever-increasing data. ■ They were considering the introduction of a visual analytics system. *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other embedded systems (software and hardware)
  • Business Intelligence and Data Analysis
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IAST『Seeker』

Accurately identify and verify vulnerabilities! You can grasp the URL detection and coverage of web applications at a glance.

The interactive application security testing (IAST) solution "Seeker" from Synopsis maximizes the visibility of the security status of web applications and identifies vulnerability trends in relation to compliance standards such as OWASP Top 10, PCIDSS, GDPR, and CAPEC. It also has the capability to identify sensitive data and track whether it is being handled securely, preventing this information from being stored in log files or databases that are not protected by strong encryption. Since it can be seamlessly integrated into CI/CD workflows, IAST security testing can be executed quickly at the speed of DevOps. 【Features】 ■ Equipped with active verification capabilities ■ Easy from implementation to operation ■ Provides a clear overview of web application URL detection and coverage ■ Tracking of sensitive data ■ Achieves high scores on OWASP benchmarks *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Software (middle, driver, security, etc.)
  • Other security and surveillance systems
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[June 10] Invitation to the Web Seminar hosted by Rihyo Electro

Introduction to Windows 10 IoT and Intel(R) AI Tools - Medical Devices and Hospital Equipment Edition

Rihyo Electro Co., Ltd. will hold a webinar on June 10, 2020 (Wednesday) titled "Perfect for the Embedded Industry! Introduction to Windows 10 IoT and Intel(R) AI Tools - Medical Devices and Hospital Equipment Edition." In this seminar, we will introduce the latest information on Windows 10 IoT Enterprise suitable for embedded devices, McAfee Embedded security software, and the latest information on Intel AI tool OpenVINO, along with case studies related to medical devices and hospital equipment. We invite you to take this opportunity to register for the seminar. 【Event Overview】 ■ Date and Time: June 10, 2020 (Wednesday) 16:00 - 17:30 (Entry available 10 minutes before start) ■ Participation Fee: Free <Pre-registration required> ■ Venue: Webinar tool "Cocripo" (https://www.cocripo.co.jp/) ■ Registration Method: Registration can only be done through our company website. *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introduction of suitable security measures for industrial equipment and medical devices.

Whitelist type is effective for embedded devices! McAfee Embedded Control provides the solution!

"McAfee Embedded Control" is a whitelist-based security product widely used in the industrial, medical, retail, and office automation sectors as a security measure for IoT devices. By creating a whitelist of safe system states and controlling access to files and the execution of applications, it prevents various unauthorized executions. As a result, it protects systems from ransomware and unknown malware attacks. Since it is a perpetual license, there is no need for license renewal after device shipment, and it protects over 4 million embedded devices worldwide. [Reasons for Choosing Us] ■ Guarantees long-term operation ■ Provides ironclad security measures for IoT devices ■ Numerous successful implementations *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Threat Insight Report

Malware lurking in images hosted on legitimate websites spreads VIP keyloggers!

Every quarter, our security experts will highlight notable malware campaigns, trends, and techniques identified by HP Wolf Security. By isolating threats that have bypassed detection tools and reached endpoints, HP Wolf Security gains insight into new techniques used by cybercriminals, providing security teams with knowledge to combat new threats and enhance their security posture. This report will discuss the threats that actually occurred in the third quarter of 2024. *For detailed information, please refer to the attached PDF. For more information, feel free to contact us.*

  • 8-2.png
  • 8-3.png
  • Software (middle, driver, security, etc.)
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Security Implementation Case] Naha City, Okinawa Prefecture

HP Sure Click Enterprise contributes to improving the internet browsing environment of local governments and enhancing operational efficiency!

We would like to introduce a case study of our "HP Sure Click Enterprise" implemented in Naha City, Okinawa Prefecture, which uniquely combines the culture and scenery of the southern region. The implementation aimed to improve the convenience of internet browsing and file downloads while ensuring security. We received feedback expressing great expectations that "the improvement in the convenience and usability of the internet browsing environment will contribute to enhancing resident services." 【System Effects】 ■ Convenience that can be completed within the PC terminal (LGWAN terminal) ■ Minimal impact on the overall system since there is no need to build a server for the virtual environment ■ Realization of secure browsing and file downloads *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Taiho Pharmaceutical Co., Ltd.

Swan Store has achieved a satisfactory level of security when handling highly confidential information!

We would like to introduce a case where Taiho Pharmaceutical Co., Ltd., which contributes to health by developing high-value new drugs, has implemented "SWANStor" from Area B Japan. The company commissions clinical trials to CROs (Contract Research Organizations) located around the world and has been accumulating information on drug side effects obtained from that process in an internal web system. Side effect information is highly confidential, and they were comparing products that could achieve a higher level of security, including stronger communication encryption and authentication. [Case Study] ■ Product Implemented: SWANStor ■ Purpose of Implementation: To safely input highly confidential side effect information After comparing multiple products, it was decided to implement this product due to its advantages in "no changes required to firewall settings" and "the ability to deliver specific applications precisely." *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『C4U Enterprise』

Leave the file security of in-house servers and PCs to this one solution!

"C4U Enterprise" allows you to manage encrypted files on the server using a group key. It addresses concerns such as "I want my files to be private, but I want everyone to be able to use the files on the server" and "I'm worried that USB is managed personally." 【Features】 ■ Windows login with USB key ■ Differentiation between user key and group key (manual encryption/decryption) ■ Folder settings (automatic encryption/decryption) *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[File Transfer Service Case Study] Aozora Bank

Send all documents encrypted with TLS! A case study of achieving secure file transfer (Crypto Delivery).

We would like to introduce a case where "Crypto Delivery" was implemented at Aozora Bank, Ltd., which provides unique and highly specialized financial services to its customers. In order to conduct file transfers to clients and others more securely, the bank adopted this product in 2018. Not only does it encrypt and send important data such as customer information, but it also implements advanced security management systems required by financial institutions, including audit functions in case of emergencies. 【Key Points】 ■ Sends all documents, including large files, encrypted with TLS ■ Achieves secure file transfer suitable for financial institutions ■ In addition to enhancing security, strengthens and renews the "file transfer system" from the perspective of business control ■ Response exceeded expectations after implementation, already expanded to 22 internal departments and 3 group companies *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall and intrusion prevention
  • Encryption and authentication
  • Virus software
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

App Protection/CrackProof for Android DEX

Before Android apps are affected, various protective features are added to prevent attacks and strengthen security!

【Hardening Method】 Simply upload the completed Android app (AAB/APK) that contains the DEX files you want to protect to the CrackProof cloud, and the hardening process for the Android app will be completed. 【Additional Protection Features】 - Strengthening resistance to static analysis and tampering - Prevents static analysis actions targeting the app itself through features like DEX obfuscation. - Prevents static tampering actions targeting the app itself through features like signature checks. - Strengthening resistance to dynamic analysis and tampering - Prevents analysis actions targeting the app's behavior through features like debugger blocking. - Prevents tampering actions targeting the app's behavior through features like ODEX tampering prevention. - Strengthening resistance to execution in unauthorized environments - Prevents app execution on rooted devices or emulators. Customers interested in CrackProof are welcome to consult with DNP Hypertech through the inquiry form. We will propose the most suitable usage method for you.

  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

App Protection/CrackProof for Windows

Before Windows apps are affected, various protective features are added to prevent attacks and strengthen security!

**[Hardening Method]** Simply upload the completed Windows application (EXE/DLL) to the CrackProof cloud, and the hardening process will be completed. **[Additional Protection Features]** - Enhanced resistance to static analysis and tampering - Prevents static analysis and tampering actions targeting the application itself through features such as file encryption. - Enhanced resistance to dynamic analysis and tampering - Prevents analysis actions targeting the application's behavior through features such as debugger prevention. - Prevents tampering actions targeting the application's behavior through features such as memory tampering prevention. - Enhanced resistance to execution in unauthorized environments - Prevents application execution on emulators. Customers interested in CrackProof are encouraged to contact DNP Hypertech through the inquiry form for consultation. We will propose the most suitable usage method for you.

  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Sealing device "MT-F Security Label"

Seal type sealing device that indicates if it has been opened, for preventing tampering and removal!

The "MT-F Security Label" is a seal-type adhesive. When removed, it leaves a trace of tampering, indicating that it has been opened. Available in non-transfer and transfer types, it helps prevent tampering such as foreign substance contamination and unauthorized removal during transportation and storage. Additionally, customization of size, color, and opening messages is possible. 【Features】 ■ Leaves a trace of tampering when removed, indicating that it has been opened. ■ Prevents tampering such as foreign substance contamination and leaves traces in case of any tampering. ■ Deters unauthorized removal during transportation and storage, aiding in accident-free delivery and storage. ■ Useful for protecting personal information, corporate confidential information, and security measures. ■ Helps prevent theft of high-end products by applying resale prevention labels. *For more details, please refer to the PDF document or feel free to contact us.

  • Adhesive tape
  • Office supplies and stationery
  • Packaging materials
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cloud authentication service "Raku-Nin" *Free trial version available for loan.

"Cloud Authentication Service" that allows you to choose from multiple authentication methods.

"Raku-Nin" is a cloud authentication service that enables two-factor authentication and two-step verification by being integrated into systems. You can choose from multiple authentication methods to add. It can be developed and implemented in a short period of time, and it is priced significantly lower than other cloud services. 【Features】 ■ Excellent usability ■ Simplification through cloud services ■ Compatible with various systems ■ Peace of mind with international security standards ■ Utilizes domestic servers ★ Please apply for a free trial version through "Contact Us" ★ *For more details, please download the PDF or feel free to contact us.*

  • Encryption and authentication
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Data] IoT Platform "IoT Cube" Pay BOX

Bring offline devices online! Check cash and cashless sales in real time.

In this document, we introduce the IoT platform "IoT Cube" Pay BOX. It allows for centralized management of sales, including cash and QR code payments, remotely, as well as monitoring the operational status of machines and managing the inventory of prizes. Additionally, it enables precise maintenance responses for machines, leading to improved labor productivity and efficiency in operations. We have included sections such as "What is the IoT platform/Pay BOX," "Solving the challenges of coin-operated devices," and "Case studies of implementation effects," so please take a look. [Contents (excerpt)] ■ What is the IoT platform/Pay BOX ■ Solving the challenges of coin-operated devices ■ Feature 1: Remote management ■ Feature 2: Supports various cashless payment options with a single QR code ■ Feature 3: Compatible with various devices and usage scenarios ■ Feature 4: Security-focused IoT platform *For more details, please refer to the PDF document or feel free to contact us.

  • Sales Management
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Case Study Interview on Cloud Authentication Service - Applied Geology Co., Ltd.

The reason for choosing "Raku-nin" from Hiten Japan is its ease of operation! Case study of the certification service *Free trial version available for loan.

Applied Geology Co., Ltd. is a geological survey company / construction consulting company. Hiten Japan's "Raku-Nin" is used for authentication when private developers and house manufacturers, who are customers of the company, access the survey data related to ground and geology provided by the company. "It is a management system that can be understood without looking at the manual most of the time if you understand the system, and the user log management is well organized, which gives us peace of mind," is the feedback we have received. ★ Please apply for a free trial version from "Contact Us" ★ For detailed case information, please refer to the related links below. 【Case Overview】 ■ Implementation Site: Applied Geology Co., Ltd. ■ Implemented Product: Cloud Authentication Service "Raku-Nin" ■ Effects - After implementation, customers were able to switch without discomfort. - The replacement also enabled the use of software tokens. * For more details, please refer to the PDF materials or feel free to contact us.

  • Personal authentication
  • Encryption and authentication
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

OTP token "c610" *Free trial version available for loan.

A dedicated device for OTP token authentication as an alternative to smartphone apps.

The OTP token "c610" is an authenticator that generates a multi-factor authentication (MFA) one-time password (6-digit number). Registration is completed simply by having the user scan the displayed QR code with this product. Therefore, it can be operated without placing a burden on the administrator. It can be used as an alternative to the mobile authenticator app for employees who are not provided with a company mobile phone. 【Features】 ■ Easy to implement ■ Easy to operate ■ Peace of mind even without a smartphone ■ Compliant with OATH standards ★ Please apply for a free trial version through the "Contact Us" section ★ * For more details, please refer to the PDF document or feel free to contact us.

  • Personal authentication
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Management Security Services

★Free webinar on cybersecurity measures to be held in April, now accepting reservations! An explanation of managed security services and vulnerability measures for network devices.

Our managed security services provide a one-stop solution for addressing corporate security and network challenges, offering the necessary equipment, operation and maintenance, and technical support to implement security measures within companies. ★April Webinar On April 13: "[A Must-See for IT Managers] Vulnerabilities in Network Devices Leading to Security Incidents! <What are the Best Countermeasures?>" - Solving everything at once with the new Vario Managed LAN / Wi-Fi service. We will explain how to reduce the operational burden on information system personnel protecting networks from cyberattacks such as ransomware and Emotet, as well as our managed security services for internal LANs provided by experts. ↓Registration link↓ https://webinar.variosecure.net On April 20: "What is Needed for Cyber Attack Countermeasures, How to Choose, Essential Security Measures for Small and Medium Enterprises" is also open for registration. 【Features】 ■Solving redundancy issues in network security ■Providing gateway security ■Services compatible with both IPv4 and IPv6 environments ■Consistent services through in-house developed equipment and monitoring systems ■Countermeasures for cloud environments and virtual machines

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email archive service "Archive"

I want to keep the emails of customer interactions! @Securemail Plus series

@Securemail Plus Archive is an email service that automatically archives (duplicates) sent and received emails in the cloud. It compresses (by an average of 50%) and stores the actual sent emails, including envelope information, header information, body text, and attachment information. Additionally, it allows for keyword-based searches on the stored email body, attachment names, and attachment contents. 【Features】 ■ Automatically archives (duplicates) sent and received emails in the cloud ■ Allows full-text search, viewing, and extraction of archived emails ■ Ideal for internal controls, audits, and backup in case of email loss ■ Can be used immediately with Microsoft 365, Google Workspace, and existing email environments *For more details, please refer to the PDF document or feel free to contact us.

  • Email/Fax transmission
  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cylance OPTICS

Quickly detect incidents using artificial intelligence and prevent escalation!

"Cylance OPTICS" is an EDR feature module added to CylancePROTECT, which enables the monitoring of events on endpoints, as well as the visualization, analysis, investigation, and response to threats. By utilizing an AI-driven prevention-first security solution, it is possible to reduce noise generated across multiple security layers. It enhances security by leveraging existing resources. 【Features】 ■ Event information collection through a decentralized model ■ Identification of intrusion pathways through root cause analysis ■ Hunting for hidden threats ■ Minimization of damage through threat containment ■ Dynamic threat detection and response based on endpoint behavior *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

BlackBerry Spark UEM Suite

A solution that balances security and productivity. Supports various devices.

The "BlackBerry Spark UEM Suite" is a product that enhances productivity while ensuring and managing the security of all endpoints. Users can access the necessary applications whenever they need them. Additionally, the IT department can provide high-class security without compromising productivity. We offer a variety of products designed to meet your needs. 【Features】 ■ Supports various devices ■ Users can access the necessary applications whenever they need them ■ IT departments can provide high-class security without compromising productivity ■ Supports enterprise-level content security with CCP ■ Advanced productivity apps and built-in features *For more details, please refer to the PDF document or feel free to contact us.*

  • Other embedded systems (software and hardware)
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

BlackBerry Spark UES Suite

Filling the gap between Zero Trust and Zero Touch. Promoting the speed and agility of the security team.

The "BlackBerry Spark UES Suite" is a set of security controls designed with specific purposes in mind, providing a zero-trust framework and enabling a user experience that minimizes necessary tasks (zero-touch). In addition to security controls that extend from traditional endpoints to mobile and IoT devices, it provides the foundation for a zero-trust security architecture. 【Features】 ■ Bridges the gap between zero-trust and zero-touch ■ Achieves a user experience that minimizes necessary tasks ■ Provides the foundation for a zero-trust security architecture ■ Promotes the speed and agility of security teams ■ Offers excellent visibility across diverse IT infrastructures *For more details, please refer to the PDF document or feel free to contact us.

  • Other embedded systems (software and hardware)
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web Application Diagnosis Service

Security specialists will inspect your website and provide a detailed and easy-to-understand report on any vulnerabilities.

We will inspect whether your website is secure and check for vulnerabilities in the web application. After the inspection, we will propose the inspection results and future measures based on a detailed and easy-to-understand report. <Benefits of Service Implementation> - Optimize the duration and cost of security measures through accurate diagnosis by security specialists. - Reduce the risk of personal information leakage and associated damages. - Accurately understand the safety of the website operated by the client, enhancing the trust of the operators. - Objective identification of issues through diagnosis by an independent third party, which is also effective as a report for external audits. <Two Types of Reports> The reports created as a result of the diagnosis are very important elements for confirming the identified issues. The reports from Azgent are structured in two parts: a "Summary" for administrators and "Vulnerability Details" for engineers responsible for corrections. They can be used according to the audience, and have received positive feedback for being easy to understand.

  • Server monitoring and network management tools
  • EAI/ETL/WEB application server
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software