We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software Product List and Ranking from 42 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. 飛天ジャパン Tokyo//IT/Telecommunications
  2. アンカーテクノロジーズ Tokyo//IT/Telecommunications
  3. ハミングヘッズ 本社 Tokyo//software
  4. 4 日本シノプシス ソフトウェア・インテグリティ・グループ Tokyo//software
  5. 5 東計電算 製造システム営業部 (第一事業所) Kanagawa//IT/Telecommunications

Security software Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. One-Time Password Token "C200" *Free trial version available for loan. 飛天ジャパン
  2. [Information Leakage Countermeasures] Security Platform 'SeP' ハミングヘッズ 本社
  3. IAST『Seeker』 日本シノプシス ソフトウェア・インテグリティ・グループ
  4. Burp Suite アンカーテクノロジーズ
  5. 4 Security software [TSFS] 東計電算 製造システム営業部 (第一事業所)

Security software Product List

16~30 item / All 118 items

Displayed results

『C4U Enterprise』

Leave the file security of in-house servers and PCs to this one solution!

"C4U Enterprise" allows you to manage encrypted files on the server using a group key. It addresses concerns such as "I want my files to be private, but I want everyone to be able to use the files on the server" and "I'm worried that USB is managed personally." 【Features】 ■ Windows login with USB key ■ Differentiation between user key and group key (manual encryption/decryption) ■ Folder settings (automatic encryption/decryption) *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[File Transfer Service Case Study] Aozora Bank

Send all documents encrypted with TLS! A case study of achieving secure file transfer (Crypto Delivery).

We would like to introduce a case where "Crypto Delivery" was implemented at Aozora Bank, Ltd., which provides unique and highly specialized financial services to its customers. In order to conduct file transfers to clients and others more securely, the bank adopted this product in 2018. Not only does it encrypt and send important data such as customer information, but it also implements advanced security management systems required by financial institutions, including audit functions in case of emergencies. 【Key Points】 ■ Sends all documents, including large files, encrypted with TLS ■ Achieves secure file transfer suitable for financial institutions ■ In addition to enhancing security, strengthens and renews the "file transfer system" from the perspective of business control ■ Response exceeded expectations after implementation, already expanded to 22 internal departments and 3 group companies *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall and intrusion prevention
  • Encryption and authentication
  • Virus software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

App Protection/CrackProof for Android DEX

Before Android apps are affected, various protective features are added to prevent attacks and strengthen security!

【Hardening Method】 Simply upload the completed Android app (AAB/APK) that contains the DEX files you want to protect to the CrackProof cloud, and the hardening process for the Android app will be completed. 【Additional Protection Features】 - Strengthening resistance to static analysis and tampering - Prevents static analysis actions targeting the app itself through features like DEX obfuscation. - Prevents static tampering actions targeting the app itself through features like signature checks. - Strengthening resistance to dynamic analysis and tampering - Prevents analysis actions targeting the app's behavior through features like debugger blocking. - Prevents tampering actions targeting the app's behavior through features like ODEX tampering prevention. - Strengthening resistance to execution in unauthorized environments - Prevents app execution on rooted devices or emulators. Customers interested in CrackProof are welcome to consult with DNP Hypertech through the inquiry form. We will propose the most suitable usage method for you.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

App Protection/CrackProof for Windows

Before Windows apps are affected, various protective features are added to prevent attacks and strengthen security!

**[Hardening Method]** Simply upload the completed Windows application (EXE/DLL) to the CrackProof cloud, and the hardening process will be completed. **[Additional Protection Features]** - Enhanced resistance to static analysis and tampering - Prevents static analysis and tampering actions targeting the application itself through features such as file encryption. - Enhanced resistance to dynamic analysis and tampering - Prevents analysis actions targeting the application's behavior through features such as debugger prevention. - Prevents tampering actions targeting the application's behavior through features such as memory tampering prevention. - Enhanced resistance to execution in unauthorized environments - Prevents application execution on emulators. Customers interested in CrackProof are encouraged to contact DNP Hypertech through the inquiry form for consultation. We will propose the most suitable usage method for you.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Sealing device "MT-F Security Label"

Seal type sealing device that indicates if it has been opened, for preventing tampering and removal!

The "MT-F Security Label" is a seal-type adhesive. When removed, it leaves a trace of tampering, indicating that it has been opened. Available in non-transfer and transfer types, it helps prevent tampering such as foreign substance contamination and unauthorized removal during transportation and storage. Additionally, customization of size, color, and opening messages is possible. 【Features】 ■ Leaves a trace of tampering when removed, indicating that it has been opened. ■ Prevents tampering such as foreign substance contamination and leaves traces in case of any tampering. ■ Deters unauthorized removal during transportation and storage, aiding in accident-free delivery and storage. ■ Useful for protecting personal information, corporate confidential information, and security measures. ■ Helps prevent theft of high-end products by applying resale prevention labels. *For more details, please refer to the PDF document or feel free to contact us.

  • Adhesive tape
  • Office supplies and stationery
  • Packaging materials

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cloud authentication service "Raku-Nin" *Free trial version available for loan.

"Cloud Authentication Service" that allows you to choose from multiple authentication methods.

"Raku-Nin" is a cloud authentication service that enables two-factor authentication and two-step verification by being integrated into systems. You can choose from multiple authentication methods to add. It can be developed and implemented in a short period of time, and it is priced significantly lower than other cloud services. 【Features】 ■ Excellent usability ■ Simplification through cloud services ■ Compatible with various systems ■ Peace of mind with international security standards ■ Utilizes domestic servers ★ Please apply for a free trial version through "Contact Us" ★ *For more details, please download the PDF or feel free to contact us.*

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Data] IoT Platform "IoT Cube" Pay BOX

Bring offline devices online! Check cash and cashless sales in real time.

In this document, we introduce the IoT platform "IoT Cube" Pay BOX. It allows for centralized management of sales, including cash and QR code payments, remotely, as well as monitoring the operational status of machines and managing the inventory of prizes. Additionally, it enables precise maintenance responses for machines, leading to improved labor productivity and efficiency in operations. We have included sections such as "What is the IoT platform/Pay BOX," "Solving the challenges of coin-operated devices," and "Case studies of implementation effects," so please take a look. [Contents (excerpt)] ■ What is the IoT platform/Pay BOX ■ Solving the challenges of coin-operated devices ■ Feature 1: Remote management ■ Feature 2: Supports various cashless payment options with a single QR code ■ Feature 3: Compatible with various devices and usage scenarios ■ Feature 4: Security-focused IoT platform *For more details, please refer to the PDF document or feel free to contact us.

  • Sales Management

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Case Study Interview on Cloud Authentication Service - Applied Geology Co., Ltd.

The reason for choosing "Raku-nin" from Hiten Japan is its ease of operation! Case study of the certification service *Free trial version available for loan.

Applied Geology Co., Ltd. is a geological survey company / construction consulting company. Hiten Japan's "Raku-Nin" is used for authentication when private developers and house manufacturers, who are customers of the company, access the survey data related to ground and geology provided by the company. "It is a management system that can be understood without looking at the manual most of the time if you understand the system, and the user log management is well organized, which gives us peace of mind," is the feedback we have received. ★ Please apply for a free trial version from "Contact Us" ★ For detailed case information, please refer to the related links below. 【Case Overview】 ■ Implementation Site: Applied Geology Co., Ltd. ■ Implemented Product: Cloud Authentication Service "Raku-Nin" ■ Effects - After implementation, customers were able to switch without discomfort. - The replacement also enabled the use of software tokens. * For more details, please refer to the PDF materials or feel free to contact us.

  • Personal authentication
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

OTP token "c610" *Free trial version available for loan.

A dedicated device for OTP token authentication as an alternative to smartphone apps.

The OTP token "c610" is an authenticator that generates a multi-factor authentication (MFA) one-time password (6-digit number). Registration is completed simply by having the user scan the displayed QR code with this product. Therefore, it can be operated without placing a burden on the administrator. It can be used as an alternative to the mobile authenticator app for employees who are not provided with a company mobile phone. 【Features】 ■ Easy to implement ■ Easy to operate ■ Peace of mind even without a smartphone ■ Compliant with OATH standards ★ Please apply for a free trial version through the "Contact Us" section ★ * For more details, please refer to the PDF document or feel free to contact us.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Management Security Services

★Free webinar on cybersecurity measures to be held in April, now accepting reservations! An explanation of managed security services and vulnerability measures for network devices.

Our managed security services provide a one-stop solution for addressing corporate security and network challenges, offering the necessary equipment, operation and maintenance, and technical support to implement security measures within companies. ★April Webinar On April 13: "[A Must-See for IT Managers] Vulnerabilities in Network Devices Leading to Security Incidents! <What are the Best Countermeasures?>" - Solving everything at once with the new Vario Managed LAN / Wi-Fi service. We will explain how to reduce the operational burden on information system personnel protecting networks from cyberattacks such as ransomware and Emotet, as well as our managed security services for internal LANs provided by experts. ↓Registration link↓ https://webinar.variosecure.net On April 20: "What is Needed for Cyber Attack Countermeasures, How to Choose, Essential Security Measures for Small and Medium Enterprises" is also open for registration. 【Features】 ■Solving redundancy issues in network security ■Providing gateway security ■Services compatible with both IPv4 and IPv6 environments ■Consistent services through in-house developed equipment and monitoring systems ■Countermeasures for cloud environments and virtual machines

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email archive service "Archive"

I want to keep the emails of customer interactions! @Securemail Plus series

@Securemail Plus Archive is an email service that automatically archives (duplicates) sent and received emails in the cloud. It compresses (by an average of 50%) and stores the actual sent emails, including envelope information, header information, body text, and attachment information. Additionally, it allows for keyword-based searches on the stored email body, attachment names, and attachment contents. 【Features】 ■ Automatically archives (duplicates) sent and received emails in the cloud ■ Allows full-text search, viewing, and extraction of archived emails ■ Ideal for internal controls, audits, and backup in case of email loss ■ Can be used immediately with Microsoft 365, Google Workspace, and existing email environments *For more details, please refer to the PDF document or feel free to contact us.

  • Email/Fax transmission
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

BlackBerry Spark UEM Suite

A solution that balances security and productivity. Supports various devices.

The "BlackBerry Spark UEM Suite" is a product that enhances productivity while ensuring and managing the security of all endpoints. Users can access the necessary applications whenever they need them. Additionally, the IT department can provide high-class security without compromising productivity. We offer a variety of products designed to meet your needs. 【Features】 ■ Supports various devices ■ Users can access the necessary applications whenever they need them ■ IT departments can provide high-class security without compromising productivity ■ Supports enterprise-level content security with CCP ■ Advanced productivity apps and built-in features *For more details, please refer to the PDF document or feel free to contact us.*

  • Other embedded systems (software and hardware)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

BlackBerry Spark UES Suite

Filling the gap between Zero Trust and Zero Touch. Promoting the speed and agility of the security team.

The "BlackBerry Spark UES Suite" is a set of security controls designed with specific purposes in mind, providing a zero-trust framework and enabling a user experience that minimizes necessary tasks (zero-touch). In addition to security controls that extend from traditional endpoints to mobile and IoT devices, it provides the foundation for a zero-trust security architecture. 【Features】 ■ Bridges the gap between zero-trust and zero-touch ■ Achieves a user experience that minimizes necessary tasks ■ Provides the foundation for a zero-trust security architecture ■ Promotes the speed and agility of security teams ■ Offers excellent visibility across diverse IT infrastructures *For more details, please refer to the PDF document or feel free to contact us.

  • Other embedded systems (software and hardware)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web Application Diagnosis Service

Security specialists will inspect your website and provide a detailed and easy-to-understand report on any vulnerabilities.

We will inspect whether your website is secure and check for vulnerabilities in the web application. After the inspection, we will propose the inspection results and future measures based on a detailed and easy-to-understand report. <Benefits of Service Implementation> - Optimize the duration and cost of security measures through accurate diagnosis by security specialists. - Reduce the risk of personal information leakage and associated damages. - Accurately understand the safety of the website operated by the client, enhancing the trust of the operators. - Objective identification of issues through diagnosis by an independent third party, which is also effective as a report for external audits. <Two Types of Reports> The reports created as a result of the diagnosis are very important elements for confirming the identified issues. The reports from Azgent are structured in two parts: a "Summary" for administrators and "Vulnerability Details" for engineers responsible for corrections. They can be used according to the audience, and have received positive feedback for being easy to understand.

  • Server monitoring and network management tools
  • EAI/ETL/WEB application server

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Shared Security Service

Expert share for executives troubled by security investigations from business partners.

At Secure System Style Co., Ltd., we offer "Shared Security Services." Field consultants with specialized skills and experience will act as your company's security representatives. We promote a risk-free action plan that does not spoil your business plans or operations. We will address individual issues, such as consultations on specific solutions, as they arise. For more details, please contact us. 【Features】 ■ No need to worry if you don't have security experts in-house ■ Easy to start as security experts are shared among multiple companies ■ Promotes a risk-free action plan that does not spoil business plans or operations ■ Provision of specific solutions *For more details, please refer to the PDF materials or feel free to contact us.

  • Other contract services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software