We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software Product List and Ranking from 64 Manufacturers, Suppliers and Companies | IPROS GMS

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

  1. ハミングヘッズ 本社 Tokyo//software
  2. 飛天ジャパン Tokyo//IT/Telecommunications
  3. アンカーテクノロジーズ Tokyo//IT/Telecommunications
  4. 4 日本ファインアート Tokyo//IT/Telecommunications
  5. 5 Spelldata Tokyo//Information and Communications

Security software Product ranking

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

  1. [Information Leakage Countermeasures] Security Platform 'SeP' ハミングヘッズ 本社
  2. One-Time Password Token "C200" *Free trial version available for loan. 飛天ジャパン
  3. VirusTotal Enterprise アンカーテクノロジーズ
  4. 4 [Case Study Collection] Information Leakage Prevention System Total Security Fort 日本ファインアート
  5. 5 Burp Suite アンカーテクノロジーズ

Security software Product List

31~60 item / All 128 items

Displayed results

Shared Security Service

Expert share for executives troubled by security investigations from business partners.

At Secure System Style Co., Ltd., we offer "Shared Security Services." Field consultants with specialized skills and experience will act as your company's security representatives. We promote a risk-free action plan that does not spoil your business plans or operations. We will address individual issues, such as consultations on specific solutions, as they arise. For more details, please contact us. 【Features】 ■ No need to worry if you don't have security experts in-house ■ Easy to start as security experts are shared among multiple companies ■ Promotes a risk-free action plan that does not spoil business plans or operations ■ Provision of specific solutions *For more details, please refer to the PDF materials or feel free to contact us.

  • Other contract services
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Misdelivery Prevention Service "ALL in One Mail Gateway"

Send attachments safely even without PPAP! Also supports accidental mis-sending.

The "ALL in One Mail Gateway" is a misdelivery prevention service that not only prevents accidental mis-sending but also automatically separates and stores attached files from sent emails for 14 days. There are numerous use cases for companies handling thousands of users, as well as personal and financial information. If you consult us about your necessary requirements, we will propose misdelivery countermeasures tailored to your usage situation based on our extensive operational experience. 【Features】 ■ Information leakage countermeasures ■ Misdelivery countermeasures ■ Automatic addition of Cc/Bcc ■ Forced conversion to Bcc ■ Attachment encryption *For more details, please refer to the PDF materials or feel free to contact us.

  • Email/Fax transmission
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cloud authentication service 'CLUe' [*Demo available for loan*]

We provide a platform related to personal authentication. How about using it for time rental operations of unmanned stores such as shared offices and fitness clubs?

Introducing the cloud authentication service "CLUe." It is a cloud authentication service that provides the devices and platforms necessary for personal authentication, ranging from member and visitor management to attendance management and device management on a development platform. 【Recommended for the following scenarios】 ◆ Shared offices, conference rooms, and facility reservation management ◆ Fitness centers, screen golf clubs ◆ Other various unmanned stores operating 24 hours We provide a development and operational platform necessary for personal authentication, from API offerings for web service integration to device management and incident response. *Demo units are available for loan. Please feel free to contact us for more details. You can download the PDF for detailed specifications.

  • Encryption and authentication
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Service Introduction Materials] Cyber Fortress Inc.

Introducing our services, including managed security services!

This document introduces the services provided by Cyber Fortress Co., Ltd. We clearly explain six services, including Managed Security Services (MSS), vulnerability assessment services, and web tampering detection services. Additionally, we have included case studies and achievements of our services. We encourage you to read it. [Contents (excerpt)] ■ Company Overview ■ Managed Security Services (MSS) ■ Vulnerability Assessment Services ■ Web Tampering Detection Services ■ Infrastructure Operation Monitoring Services *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Integrated operation management
  • Other contract services
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Risk Analysis "V-sec"

Security risk analysis 'V-sec' for implementing cost-effective cybersecurity measures!

"V-sec" is a service that has received approval from the Ministry of Economy, Trade and Industry's "Information Security Audit Service Standards Compliance Service" and is listed in the IPA's Information Security Service Standards Compliance List. From the perspective of four safety management measures (human, organizational, physical, and technical) and multi-layered defense, it visualizes the company's security level and vulnerabilities, aiming to create a shared understanding between management and the field. This helps prevent unnecessary investments and establishes appropriate indicators for security investment. It is the optimal solution for customers such as: ▶ Those who do not know where to start with security measures. ▶ Those who want to know the priority of measures that should be implemented in their company. ▶ Those who want effectiveness even with the minimum necessary security measures. ▶ Those who are unsure if their current measures are sufficient. ▶ Those who are working on it themselves but want a third-party evaluation. *For more details, please download the PDF or feel free to contact us.

  • Company:バルク
  • Price:500,000 yen-1 million yen
  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Corporate Information Monitoring 'Discovery'

Already available password lists and leaked information on the dark web can be investigated!

Corporate information monitoring "Discovery" is a service that investigates and monitors whether hackers can collect information that targets your company for cyber attacks. Utilizing award-winning OSINT and AI technology, it investigates and monitors external attack surfaces. It continuously detects, tests, and scores digital and IT assets, enhancing visibility by proactively monitoring mentions of the company on the dark web and code repositories. 【Features】 ■ Easy to start ■ Information gathering from a hacker's perspective ■ Investigation of information leaks is also possible *For more details, please download the PDF or feel free to contact us.

  • Firewall and intrusion prevention
  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Ricoh Company, Ltd.

Introducing a case study that achieved visualization of the email system status and enhanced security!

We would like to introduce a case study on the implementation of the "Cloudmark Security Platform for Email" at Ricoh Company, Ltd. The company had been in a black box state, completely unaware of what emails were being sent, how many, and from where to where. To achieve security measures, promote digital transformation (DX), and improve operational efficiency, it was urgent to visualize and reconstruct the email system. To break this situation, they standardized email software while implementing the "Cloudmark Security Platform for Email" as an email gateway. This enabled real-time visualization and control of traffic, resulting in significant improvements in security through finely tunable policies. [Challenges Before Implementation] - The email system was in a black box state, posing significant security risks. - Different organizations operated on varying email systems and standards, leading to issues such as garbled text and undelivered messages. *For more details, please refer to the PDF document or feel free to contact us.*

  • Storage Backup
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

【PowerDMARC Features】API Settings

Integrated monitoring and analysis! It will serve as a concrete aid in reducing phishing email countermeasures!

We would like to introduce the features of the email security service "PowerDMARC" under MENAInfoSec in the United States. Would you like to send data to external monitoring systems or data analysis platforms for integrated monitoring and analysis? With our product, it is possible to send data to external systems via API. Please feel free to contact us if you have any inquiries. *For more details, please refer to the PDF materials or feel free to contact us.

  • Other services
  • Other security
  • Server monitoring and network management tools
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

PowerDMARC Features Settings

Prevent information leakage! If you have a large number of domains to register, there is a bulk registration feature!

We would like to introduce the features of the email security service 'PowerDMARC' under MENAInfoSec in the United States. It can accommodate both individual domain settings and bulk registration of a large number of domains. User management can also be centralized, with permissions set in detail. Additionally, it comes equipped with various configuration features such as a setup wizard, user access templates, auditing, and forensic encryption. Please feel free to contact us if you have any inquiries. 【Features (partial)】 ■ Setup Wizard ■ Bulk Domain Registration ■ Domain Management ■ User Management ■ User Access Templates *For more details, please refer to the PDF document or feel free to contact us.

  • image_01.png
  • image_02.png
  • image_03.png
  • image_04.png
  • image_05.png
  • image_06.png
  • Other services
  • Other security
  • Server monitoring and network management tools
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Protecting your business from intellectual property theft due to cyber attacks【PowerDMARC】

Rapidly increasing cyber attacks from China! The targets are the intellectual properties of small and medium-sized enterprises, such as technology, designs, and patents. If we don't protect ourselves, the company could be in crisis!?

Do you think that cyber attacks only target large companies? In reality, cybercriminals often first infect small and medium-sized enterprises with viruses, and then embed viruses in emails sent to large companies from there. The small and medium-sized enterprises that are used as stepping stones have all their intellectual property and client information stolen. They then face mass production of similar products in countries like China, leading to price competition that results in losses. Furthermore, they may be held responsible for infecting large companies with viruses and could face liability for damages (as it falls under the tort of Article 709 of the Civil Code). The actual flow of an attack typically begins with sending emails that impersonate employees of the target company or disguise themselves as clients to employees of that company. Once someone opens the email, they get infected, and the infection spreads from there. In other words, eliminating the initial "spoofed emails impersonating internal or external individuals" is crucial for protecting both your company and your clients. So, what should be done to eliminate spoofed emails? The materials provide a detailed explanation of the above content. We highly recommend downloading them and starting your countermeasures immediately.

  • Company:Spelldata
  • Price:100,000 yen-500,000 yen
  • others
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Burp Suite

An integrated platform for conducting security testing of web applications.

The Community Edition is available for free, the Professional Edition offers powerful manual and automated diagnostics, and the Enterprise Edition is an enterprise solution that allows for continuous large-scale simultaneous scanning, as well as automation and scheduling of scans. With any Burp Suite license, there is no limit to the number of targets that can be diagnosed, such as websites, URLs, and web applications, making it a highly cost-effective diagnostic tool.

  • Firewall and intrusion prevention
  • Other security
  • Other network tools
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

VirusTotal Enterprise

Google's AI-powered threat intelligence, one of the largest in the world, includes malicious judgment information on files, IPs, domains, etc.

It is a solution from Google Cloud that provides various threat intelligence, available for free or for a fee. Since the service began in 2004, it has been referred to as the "Google of Malware," holding vast amounts of files uploaded by many users and their analysis results.

  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Site "AV-TEST"

Detects spam and phishing emails! Equipped with a security certification program.

"AV-TEST" is an independent research organization based in Germany that conducts comparisons and individual tests of IT security products. It publishes test results for antivirus software compatible with operating systems such as Windows and Android. Additionally, it introduces security software that addresses ransomware technologies. [Services Offered] ■E-Mail Security Test ■AV-TEST seal of approval ■Monitored Malware Protection for Windows and Android ■The AV-TEST certificate for smart home and IoT *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Data Search Software
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Spybot

Malicious processes are blocked before they start! Supports many popular browsers.

"Spybot" is anti-malware and antivirus software designed to protect computers from privacy-threatening malware, spyware, adware, and other unwanted software. The anti-spyware protection uses proprietary technology to search for and remove various types of spyware and other unwanted software. 【Product Lineup】 ■Spybot Corporate ■Spybot Technician ■Spybot Anti-Beacon ■RegAlyzer *For more details, please refer to the PDF document or feel free to contact us.

  • Company:B7
  • Price:Other
  • Software (middle, driver, security, etc.)
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

SmartPOP2Exchange

Reliable spam and virus protection! Can be installed independently of the incoming SMTP server.

"SmartPOP2Exchange" is a product developed by JAM Software. It provides POP3 and IMAP accounts to ensure all emails are reliably connected and filtered. It includes spam and virus protection. Additionally, it features automatic parallel processing of multiple email accounts and a comprehensive rules system. [Main Features (Partial)] ■ Flexibility between systems ■ Integrated modules ■ Configuration control features ■ Compatibility and integration ■ Reliable spam and virus protection *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Software (middle, driver, security, etc.)
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IP reputation service "kr:ns (Chronos)"

Domestic Cybersecurity Solution

"kr:ns (Chronos)" is an IP reputation service that correlates a vast amount of observational data collected through an extensive observation network with your IP address as unique Threat Intelligence. We have entered into a joint research agreement with the National Institute of Information and Communications Technology and Cybersecurity Nexus (CYNEX) to evaluate its effectiveness as Threat Intelligence. Additionally, this information can be integrated into and analyzed by SIEM systems. [Examples of analysis results obtained from dynamic analysis of IoT malware (partial)] ■ Target port numbers for scans conducted to spread infection ■ Communication destination information believed to be a C2 server ■ Port numbers that the malware listens on ■ DNS communications conducted by the malware *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

senda

Practice of "Threat Hunting" to identify assets exposed to threats!

"Senda" is world-class internet intelligence. It can discover publicly exposed assets through shadow IT. In addition to automatically detecting assets with configuration errors, it also identifies which assets are at higher risk. Please feel free to contact us if you have any inquiries. 【Features】 ■ Discover publicly exposed assets through shadow IT ■ Automatically detect assets with configuration errors ■ Identify management interfaces that remain exposed ■ Determine which assets are at higher risk *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

BI | System data and Excel reports systematized 'Find-BI'

The reporting tool "Find-BI" accurately retrieves and outputs various data, supporting data aggregation and report creation tasks.

Are you spending too much time on data collection and result creation to accurately obtain various system data? By implementing our system "Find-BI," you can reduce the time it takes to create result tables and spend more time on subsequent measures. What makes the "Check = Execution Evaluation" phase of the work PDCA cycle difficult? - It is challenging to compare plans and actual results. - Multiple systems lead to time-consuming data collection. - The timing for data acquisition varies by system. - It is necessary to create analysis tables each time for regular checks. - It is required to combine and analyze information beyond system output data. - You cannot compare the information from the last regular check with the current information. - There is a hassle in notifying actual improvers about the check information. - Individual system reports have limitations for overall checks. - It is difficult to delve deeper into information that seems problematic or analyze it from different perspectives. Would you like to solve these issues with Find-BI? For more details, please download our catalog! We are also available for inquiries, so please feel free to reach out.

  • Business Intelligence and Data Analysis
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

MatrixQuestWLAN/wpa 【WPA2 Supplicant】

MatrixQuestWLAN/wpa 【WPA2 Supplicant】

【Overview】 1. High Portability Designed to facilitate easy combinations with various wireless LAN drivers. 2. Supports WPA/WPA2 - WPA-PSK/WPA2-PSK - WPA-1X/WPA2-1X 3. Supports numerous authentication protocols - EAP-TLS - EAP-PEAP - EAP-TTLS - EAP-FAST (planned support)

  • Software (middle, driver, security, etc.)
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security Product: CFKeeper

Safe and low-cost! Strengthening cloud storage security from the endpoint.

"CFKeeper" enhances the security of endpoints that utilize cloud storage. Files in the sync folder are automatically encrypted. Files synchronized/uploaded to cloud storage are not encrypted, allowing for viewing on the go and sharing with external parties as usual. It safely and cost-effectively addresses issues such as "leakage of sync folder/cache data during targeted attacks or malware infections" and "removal of hard disks when a PC is lost." 【Features】 ■ Prohibits copying/uploading files outside the cloud storage sync folder ■ Automatically encrypts files in the sync folder ■ Limits file storage to cloud storage ■ Files synchronized/uploaded to cloud storage are not encrypted, allowing for viewing on the go and sharing with external parties as usual *For more details, please refer to the related link page or feel free to contact us.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[AUTOCRYPT] Outcrypt Security Father

A fuzz testing tool that enables early detection and response to issues that can be utilized in the automotive development lifecycle.

AutoCrypt Security Fuzzer is a fuzz testing tool that enables early detection and response to issues throughout the automotive development lifecycle. It is a dedicated fuzz testing tool specialized for in-vehicle software, capable of executing fuzzing on ECUs and the entire vehicle architecture in real-time within a virtual environment, and can provide functions to detect and report various bugs and vulnerabilities in an add-on manner. It achieves accurate diagnostic service differentiation and high-precision detection through smart fuzzing utilizing AI, automates testing, supports remote testing environments, and improves resource management through continuous ECU testing environment configuration. It allows for continuous ECU testing for each project, reducing the burden of test management with simple retest logic, vehicle-specific test cases, and automatic state recovery functions, while enabling highly accurate fuzzing tests tailored to vehicles through advanced decision logic.

  • Other Auto Parts
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AppGuard Small Business Edition

Launch of the new edition for 4.2 million small and medium-sized enterprises nationwide!

"AppGuard Small Business Edition" is a product aimed at small to medium-sized enterprises with 1 to 300 employees, combining the simplicity of AppGuard Solo with the integrated management features of AppGuard Enterprise. 【Features】 ■ License for Small and Medium-sized Enterprises For small and medium-sized businesses that cannot make significant investments in security, we offer licenses at an affordable price for companies with up to 300 employees, while maintaining the core technology of AppGuard. ■ Pre-installed Standard Settings By presetting policies at the same level as AppGuard Solo as default values, we can reduce the costs and time required for implementation. ■ Diversification of Implementation Services By diversifying the implementation service menu from simple options to traditional full services, we can provide proposals that align with our customers' budget considerations. *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Free rental of evaluation machine [SPAMSNIPER]

SpamSniper Evaluation Machine Free Loan Service

We are offering the SpamSniper evaluation unit for free. Here is an introduction to the SpamSniper free evaluation unit lending service. ■□■Features■□■ ~ One device, four roles: SpamSniper's multi-layered defense ~ ■ Information leakage prevention ■ SMTP attack defense ■ Virus email blocking ■ Spam email blocking ■ There are no functional restrictions on the evaluation unit, so you can evaluate it in a real environment and according to actual operations. For other functions and details, please contact us.

  • Other services
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

3D Managed AST Subscription

Identify and exploit critical vulnerabilities for business to reduce the risk of leaks!

The subscription for "3D Managed Application Security Testing (AST)" allows access to all types of managed AST at a single price with one annual subscription. It covers the scope of testing applications and networks necessary to achieve risk management objectives. You can change the application or external network being tested, as well as the type and depth of the assessment (one test at a time). 【Features】 ■ Tests applications and networks that may not be testable due to resource constraints ■ Consistently provides high-quality test results at any time ■ Assists in developing a remediation plan suitable for customer needs ■ Offers scalable testing through the assessment center without hindering manual reviews *For more details, please refer to the PDF materials or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Intelligent Orchestration

Manage all test execution, policy application, prioritization of issues, and filtering!

"Intelligent Orchestration" offers a customized AppSec pipeline that automates security testing not only at certain stages of the software development lifecycle but throughout the entire process. Based on the importance of code changes, total risk scores, and the organization's unique security policies, appropriate security tools are automatically executed. Even in large enterprise environments, it becomes easy to apply security processes and policies across all applications throughout the organization. 【Features】 ■ Only information regarding high-priority vulnerabilities is presented to developers based on the organization's security policies. ■ Users can set feedback after scanning. ■ You can define and customize how weights are assigned to the criteria for calculating the total risk score. *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Corresponds to each requirement of the My Number Act's safety measures! IP-guard V3

Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leak prevention through powerful violation control and logging at the kernel level.

IP-guard V3 is a product for "PC log management," "information security," and "IT asset management" that is adopted by over 20,000 major companies and government agencies in 27 countries worldwide. In Japan, it particularly contributes to solving various industry challenges with its powerful controls and detailed recording features that were not achievable with other products. Additionally, each function, composed of 14 different modules, allows users to select only what they need, minimizing the burden on users and reducing the workload for administrators. Furthermore, it is a product that can meet almost all the requirements outlined in the safety measures of the My Number Act (government-issued security guidelines).

  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email Archive and Audit Solution WISE Audit

A mail archiving and auditing solution with numerous large-scale user achievements that can handle everything from regular email audits to e-discovery requirements.

WISE Audit is a solution that archives and stores corporate emails, which are important information assets, to streamline email audits during both emergencies and normal times. ● Flexibly supports all email environments from on-premises to cloud ● High-speed search of 10 million emails per second (※1) and excellent Japanese search functionality ● Proven adoption by many companies, including NEC with 150,000 users WISE Audit has achieved the number one sales position in two domestic email archive market surveys. - Deloitte Tohmatsu Mic Economic Research Institute (11 consecutive years) ※1 - ITR (3 consecutive years) ※2 ※1 Source: Deloitte Tohmatsu Mic Economic Research Institute, "Current Status and Future Outlook of Internal Threat Countermeasure Solutions Market 2022" published in January 2023 https://mic-r.co.jp/mr/02620/ ※2 Source: ITR "ITR Market View: Information Leakage Countermeasure Market 2023" Email Archive Market: Vendor Sales Amount Share (2019-2021)

  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

GDATA Total Protection Multi-License Version

World-class detection rates protect against all types of threats. Equipped with everything needed for the best protection and the highest peace of mind in PC security.

Protected from all types of threats with the world's highest virus detection rate. This is a reliable all-in-one product packed with all the security features of G DATA's personal products, including firewall, vulnerability protection, online banking protection, and backup.

  • Other security
  • Firewall and intrusion prevention
  • Virus software
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software