We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software Product List and Ranking from 28 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Jul 23, 2025~Aug 19, 2025
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Jul 23, 2025~Aug 19, 2025
This ranking is based on the number of page views on our site.

  1. null/null
  2. null/null
  3. CRドットアイ Tokyo//IT/Telecommunications
  4. B7 Tokyo//software
  5. ケーエスピー Osaka//Information and Communications

Security software Product ranking

Last Updated: Aggregation Period:Jul 23, 2025~Aug 19, 2025
This ranking is based on the number of page views on our site.

  1. Security software [TSFS]
  2. [SentinelOne Case Study] Andpad Inc. CRドットアイ
  3. Site "AV-TEST" B7
  4. HP Wolf Security Comprehensive Catalog
  5. IT Asset Management and Information Security Software SS1 ケーエスピー

Security software Product List

16~30 item / All 48 items

Displayed results

Site "AV-TEST"

Detects spam and phishing emails! Equipped with a security certification program.

"AV-TEST" is an independent research organization based in Germany that conducts comparisons and individual tests of IT security products. It publishes test results for antivirus software compatible with operating systems such as Windows and Android. Additionally, it introduces security software that addresses ransomware technologies. [Services Offered] ■E-Mail Security Test ■AV-TEST seal of approval ■Monitored Malware Protection for Windows and Android ■The AV-TEST certificate for smart home and IoT *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Data Search Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Spybot

Malicious processes are blocked before they start! Supports many popular browsers.

"Spybot" is anti-malware and antivirus software designed to protect computers from privacy-threatening malware, spyware, adware, and other unwanted software. The anti-spyware protection uses proprietary technology to search for and remove various types of spyware and other unwanted software. 【Product Lineup】 ■Spybot Corporate ■Spybot Technician ■Spybot Anti-Beacon ■RegAlyzer *For more details, please refer to the PDF document or feel free to contact us.

  • Company:B7
  • Price:Other
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

MatrixQuestWLAN/wpa 【WPA2 Supplicant】

MatrixQuestWLAN/wpa 【WPA2 Supplicant】

【Overview】 1. High Portability Designed to facilitate easy combinations with various wireless LAN drivers. 2. Supports WPA/WPA2 - WPA-PSK/WPA2-PSK - WPA-1X/WPA2-1X 3. Supports numerous authentication protocols - EAP-TLS - EAP-PEAP - EAP-TTLS - EAP-FAST (planned support)

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security Product: CFKeeper

Safe and low-cost! Strengthening cloud storage security from the endpoint.

"CFKeeper" enhances the security of endpoints that utilize cloud storage. Files in the sync folder are automatically encrypted. Files synchronized/uploaded to cloud storage are not encrypted, allowing for viewing on the go and sharing with external parties as usual. It safely and cost-effectively addresses issues such as "leakage of sync folder/cache data during targeted attacks or malware infections" and "removal of hard disks when a PC is lost." 【Features】 ■ Prohibits copying/uploading files outside the cloud storage sync folder ■ Automatically encrypts files in the sync folder ■ Limits file storage to cloud storage ■ Files synchronized/uploaded to cloud storage are not encrypted, allowing for viewing on the go and sharing with external parties as usual *For more details, please refer to the related link page or feel free to contact us.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Free rental of evaluation machine [SPAMSNIPER]

SpamSniper Evaluation Machine Free Loan Service

We are offering the SpamSniper evaluation unit for free. Here is an introduction to the SpamSniper free evaluation unit lending service. ■□■Features■□■ ~ One device, four roles: SpamSniper's multi-layered defense ~ ■ Information leakage prevention ■ SMTP attack defense ■ Virus email blocking ■ Spam email blocking ■ There are no functional restrictions on the evaluation unit, so you can evaluate it in a real environment and according to actual operations. For other functions and details, please contact us.

  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Corresponds to each requirement of the My Number Act's safety measures! IP-guard V3

Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leak prevention through powerful violation control and logging at the kernel level.

IP-guard V3 is a product for "PC log management," "information security," and "IT asset management" that is adopted by over 20,000 major companies and government agencies in 27 countries worldwide. In Japan, it particularly contributes to solving various industry challenges with its powerful controls and detailed recording features that were not achievable with other products. Additionally, each function, composed of 14 different modules, allows users to select only what they need, minimizing the burden on users and reducing the workload for administrators. Furthermore, it is a product that can meet almost all the requirements outlined in the safety measures of the My Number Act (government-issued security guidelines).

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

GDATA Total Protection Multi-License Version

World-class detection rates protect against all types of threats. Equipped with everything needed for the best protection and the highest peace of mind in PC security.

Protected from all types of threats with the world's highest virus detection rate. This is a reliable all-in-one product packed with all the security features of G DATA's personal products, including firewall, vulnerability protection, online banking protection, and backup.

  • Other security
  • Firewall and intrusion prevention
  • Virus software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security suite package "TruSuite"

This one is enough for endpoint security!

"TruSuite" is the suite version of the TruStack series products. With one license, you can use all 32-bit or 64-bit versions of the entire TruStack series. 【Features】 ■ All TruStack products can be used with one license ■ High cost performance *For more details, please refer to the catalog or feel free to contact us.

  • Other security
  • Personal authentication
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Explained in Manga] Understandable by Reading! How to Protect Your Company's Device Integration App

Introducing the security solution product "CrackProof" that protects apps from unauthorized attacks in a manga format!

Recently, collaboration between apps and devices has been advancing in various fields. While there are many benefits, such as increased convenience for users, there are also security risks associated with distributing apps that connect to proprietary devices, such as the sale of tampered apps and the analysis of proprietary technology from the apps. This document explains the necessary security measures for apps that connect to proprietary devices in an easy-to-understand manga format. Please download and take a look. 【Recommended for】 ■ Those considering developing apps that connect proprietary devices with smartphones or PCs ■ Those considering measures to prevent the leakage of proprietary technology from apps that operate proprietary devices ■ Those considering developing apps for operating and maintaining proprietary devices ■ Those who want to prevent unauthorized changes to the settings of proprietary devices through apps *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

CrackProof Implementation Case: Metaverse Platform Operation

[Case Study] Understand the Security Measures for Metaverse (VR) Apps!

In recent years, the "metaverse" has gained attention across various industries. While its expansion is broad across all fields, there are also various security risks that must be considered by those operating the platforms. *Our company's column also explains the security of the metaverse↓ "Security Considerations When Utilizing the Metaverse for Business" https://www.hypertech.co.jp/column/marketing/2023/03/metaverse-security/ In this document, we have invited Company A, which operates a metaverse (VR) platform and has chosen CrackProof for their app's security measures, to discuss how CrackProof has addressed their security challenges. 【Recommended for】 - Those planning to develop apps for the metaverse (VR) platform - Those currently developing or operating metaverse (VR) apps and considering security measures - Those who want to know the benefits of choosing CrackProof as a security measure for metaverse (VR) apps

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information leakage prevention security software "Discovery"

Prevent information leakage from smartphone and tablet terminals!

The information leakage prevention software "Hakken-den" monitors output to external storage media such as USB memory, CDs, DVDs, and printers, as well as attached emails, to prevent information leakage by deterring the unauthorized transfer of information outside the organization. It monitors user file operations and printer outputs, storing operation history data. By managing who accessed and printed which files and when, it helps detect unauthorized access and deter the unauthorized transfer of files, thereby improving information security. Please utilize it as a DLP (Data Loss Prevention) tool. 【Features】 ■ Restrictions on the use of USB storage ■ File encryption ■ Writing to USB storage is prohibited ■ Centralized management of operation logs and unauthorized alerts *For more details, please download the PDF or feel free to contact us.

  • Server monitoring and network management tools
  • Other operation management software
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Service Introduction Materials: CrowdStrike

Of course, it provides protection through machine learning and behavior detection both when connected to the internet and offline!

This document introduces the features, functions, and strengths of the service "CrowdStrike" offered by S.M.S. Data Tech Co., Ltd. It is recommended for those who feel uneasy about the security tools currently in use, as well as for those responsible for selecting security products. Please feel free to download and take a look. 【Contents (partial)】 ■ Introduction ■ Service Introduction ■ Company Overview *For more details, please refer to the PDF document or feel free to contact us.

  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study Collection] Information Leakage Prevention System Total Security Fort

Control, recording, monitoring, approval. Introducing all-in-one internal information security measures.

This document summarizes case studies of the implementation of the information leakage prevention system "Total Security Fort." It details the background and circumstances of the implementation, as well as the effects after implementation and future prospects, covering the cases of a total of eight companies. Please use this information for your consideration of product implementation. [Featured Case Studies (Partial)] ■ NTT Data Corporation ■ Yokote City Hall, Akita Prefecture ■ Meiden System Technology Co., Ltd. ■ Veriserv Inc. ■ SII Data Service Co., Ltd. and others *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software