We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software Product List and Ranking from 42 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. 飛天ジャパン Tokyo//IT/Telecommunications
  2. アンカーテクノロジーズ Tokyo//IT/Telecommunications
  3. ハミングヘッズ 本社 Tokyo//software
  4. 4 日本シノプシス ソフトウェア・インテグリティ・グループ Tokyo//software
  5. 5 東計電算 製造システム営業部 (第一事業所) Kanagawa//IT/Telecommunications

Security software Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. One-Time Password Token "C200" *Free trial version available for loan. 飛天ジャパン
  2. [Information Leakage Countermeasures] Security Platform 'SeP' ハミングヘッズ 本社
  3. IAST『Seeker』 日本シノプシス ソフトウェア・インテグリティ・グループ
  4. Burp Suite アンカーテクノロジーズ
  5. 4 Security software [TSFS] 東計電算 製造システム営業部 (第一事業所)

Security software Product List

31~45 item / All 118 items

Displayed results

Misdelivery Prevention Service "ALL in One Mail Gateway"

Send attachments safely even without PPAP! Also supports accidental mis-sending.

The "ALL in One Mail Gateway" is a misdelivery prevention service that not only prevents accidental mis-sending but also automatically separates and stores attached files from sent emails for 14 days. There are numerous use cases for companies handling thousands of users, as well as personal and financial information. If you consult us about your necessary requirements, we will propose misdelivery countermeasures tailored to your usage situation based on our extensive operational experience. 【Features】 ■ Information leakage countermeasures ■ Misdelivery countermeasures ■ Automatic addition of Cc/Bcc ■ Forced conversion to Bcc ■ Attachment encryption *For more details, please refer to the PDF materials or feel free to contact us.

  • Email/Fax transmission

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cloud authentication service 'CLUe' [*Demo available for loan*]

We provide a platform related to personal authentication. How about using it for time rental operations of unmanned stores such as shared offices and fitness clubs?

Introducing the cloud authentication service "CLUe." It is a cloud authentication service that provides the devices and platforms necessary for personal authentication, ranging from member and visitor management to attendance management and device management on a development platform. 【Recommended for the following scenarios】 ◆ Shared offices, conference rooms, and facility reservation management ◆ Fitness centers, screen golf clubs ◆ Other various unmanned stores operating 24 hours We provide a development and operational platform necessary for personal authentication, from API offerings for web service integration to device management and incident response. *Demo units are available for loan. Please feel free to contact us for more details. You can download the PDF for detailed specifications.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Service Introduction Materials] Cyber Fortress Inc.

Introducing our services, including managed security services!

This document introduces the services provided by Cyber Fortress Co., Ltd. We clearly explain six services, including Managed Security Services (MSS), vulnerability assessment services, and web tampering detection services. Additionally, we have included case studies and achievements of our services. We encourage you to read it. [Contents (excerpt)] ■ Company Overview ■ Managed Security Services (MSS) ■ Vulnerability Assessment Services ■ Web Tampering Detection Services ■ Infrastructure Operation Monitoring Services *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Integrated operation management
  • Other contract services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Risk Analysis "V-sec"

Security risk analysis 'V-sec' for implementing cost-effective cybersecurity measures!

"V-sec" is a service that has received approval from the Ministry of Economy, Trade and Industry's "Information Security Audit Service Standards Compliance Service" and is listed in the IPA's Information Security Service Standards Compliance List. From the perspective of four safety management measures (human, organizational, physical, and technical) and multi-layered defense, it visualizes the company's security level and vulnerabilities, aiming to create a shared understanding between management and the field. This helps prevent unnecessary investments and establishes appropriate indicators for security investment. It is the optimal solution for customers such as: ▶ Those who do not know where to start with security measures. ▶ Those who want to know the priority of measures that should be implemented in their company. ▶ Those who want effectiveness even with the minimum necessary security measures. ▶ Those who are unsure if their current measures are sufficient. ▶ Those who are working on it themselves but want a third-party evaluation. *For more details, please download the PDF or feel free to contact us.

  • Company:バルク
  • Price:500,000 yen-1 million yen
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Corporate Information Monitoring 'Discovery'

Already available password lists and leaked information on the dark web can be investigated!

Corporate information monitoring "Discovery" is a service that investigates and monitors whether hackers can collect information that targets your company for cyber attacks. Utilizing award-winning OSINT and AI technology, it investigates and monitors external attack surfaces. It continuously detects, tests, and scores digital and IT assets, enhancing visibility by proactively monitoring mentions of the company on the dark web and code repositories. 【Features】 ■ Easy to start ■ Information gathering from a hacker's perspective ■ Investigation of information leaks is also possible *For more details, please download the PDF or feel free to contact us.

  • Firewall and intrusion prevention
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

【PowerDMARC Features】API Settings

Integrated monitoring and analysis! It will serve as a concrete aid in reducing phishing email countermeasures!

We would like to introduce the features of the email security service "PowerDMARC" under MENAInfoSec in the United States. Would you like to send data to external monitoring systems or data analysis platforms for integrated monitoring and analysis? With our product, it is possible to send data to external systems via API. Please feel free to contact us if you have any inquiries. *For more details, please refer to the PDF materials or feel free to contact us.

  • Other services
  • Other security
  • Server monitoring and network management tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

PowerDMARC Features Settings

Prevent information leakage! If you have a large number of domains to register, there is a bulk registration feature!

We would like to introduce the features of the email security service 'PowerDMARC' under MENAInfoSec in the United States. It can accommodate both individual domain settings and bulk registration of a large number of domains. User management can also be centralized, with permissions set in detail. Additionally, it comes equipped with various configuration features such as a setup wizard, user access templates, auditing, and forensic encryption. Please feel free to contact us if you have any inquiries. 【Features (partial)】 ■ Setup Wizard ■ Bulk Domain Registration ■ Domain Management ■ User Management ■ User Access Templates *For more details, please refer to the PDF document or feel free to contact us.

  • Other services
  • Other security
  • Server monitoring and network management tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Protecting your business from intellectual property theft due to cyber attacks【PowerDMARC】

Rapidly increasing cyber attacks from China! The targets are the intellectual properties of small and medium-sized enterprises, such as technology, designs, and patents. If we don't protect ourselves, the company could be in crisis!?

Do you think that cyber attacks only target large companies? In reality, cybercriminals often first infect small and medium-sized enterprises with viruses, and then embed viruses in emails sent to large companies from there. The small and medium-sized enterprises that are used as stepping stones have all their intellectual property and client information stolen. They then face mass production of similar products in countries like China, leading to price competition that results in losses. Furthermore, they may be held responsible for infecting large companies with viruses and could face liability for damages (as it falls under the tort of Article 709 of the Civil Code). The actual flow of an attack typically begins with sending emails that impersonate employees of the target company or disguise themselves as clients to employees of that company. Once someone opens the email, they get infected, and the infection spreads from there. In other words, eliminating the initial "spoofed emails impersonating internal or external individuals" is crucial for protecting both your company and your clients. So, what should be done to eliminate spoofed emails? The materials provide a detailed explanation of the above content. We highly recommend downloading them and starting your countermeasures immediately.

  • Company:Spelldata
  • Price:100,000 yen-500,000 yen
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Burp Suite

An integrated platform for conducting security testing of web applications.

The Community Edition is available for free, the Professional Edition offers powerful manual and automated diagnostics, and the Enterprise Edition is an enterprise solution that allows for continuous large-scale simultaneous scanning, as well as automation and scheduling of scans. With any Burp Suite license, there is no limit to the number of targets that can be diagnosed, such as websites, URLs, and web applications, making it a highly cost-effective diagnostic tool.

  • Firewall and intrusion prevention
  • Other security
  • Other network tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

VirusTotal Enterprise

Google's AI-powered threat intelligence, one of the largest in the world, includes malicious judgment information on files, IPs, domains, etc.

It is a solution from Google Cloud that provides various threat intelligence, available for free or for a fee. Since the service began in 2004, it has been referred to as the "Google of Malware," holding vast amounts of files uploaded by many users and their analysis results.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Site "AV-TEST"

Detects spam and phishing emails! Equipped with a security certification program.

"AV-TEST" is an independent research organization based in Germany that conducts comparisons and individual tests of IT security products. It publishes test results for antivirus software compatible with operating systems such as Windows and Android. Additionally, it introduces security software that addresses ransomware technologies. [Services Offered] ■E-Mail Security Test ■AV-TEST seal of approval ■Monitored Malware Protection for Windows and Android ■The AV-TEST certificate for smart home and IoT *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Data Search Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Spybot

Malicious processes are blocked before they start! Supports many popular browsers.

"Spybot" is anti-malware and antivirus software designed to protect computers from privacy-threatening malware, spyware, adware, and other unwanted software. The anti-spyware protection uses proprietary technology to search for and remove various types of spyware and other unwanted software. 【Product Lineup】 ■Spybot Corporate ■Spybot Technician ■Spybot Anti-Beacon ■RegAlyzer *For more details, please refer to the PDF document or feel free to contact us.

  • Company:B7
  • Price:Other
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

SmartPOP2Exchange

Reliable spam and virus protection! Can be installed independently of the incoming SMTP server.

"SmartPOP2Exchange" is a product developed by JAM Software. It provides POP3 and IMAP accounts to ensure all emails are reliably connected and filtered. It includes spam and virus protection. Additionally, it features automatic parallel processing of multiple email accounts and a comprehensive rules system. [Main Features (Partial)] ■ Flexibility between systems ■ Integrated modules ■ Configuration control features ■ Compatibility and integration ■ Reliable spam and virus protection *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IP reputation service "kr:ns (Chronos)"

Domestic Cybersecurity Solution

"kr:ns (Chronos)" is an IP reputation service that correlates a vast amount of observational data collected through an extensive observation network with your IP address as unique Threat Intelligence. We have entered into a joint research agreement with the National Institute of Information and Communications Technology and Cybersecurity Nexus (CYNEX) to evaluate its effectiveness as Threat Intelligence. Additionally, this information can be integrated into and analyzed by SIEM systems. [Examples of analysis results obtained from dynamic analysis of IoT malware (partial)] ■ Target port numbers for scans conducted to spread infection ■ Communication destination information believed to be a C2 server ■ Port numbers that the malware listens on ■ DNS communications conducted by the malware *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

senda

Practice of "Threat Hunting" to identify assets exposed to threats!

"Senda" is world-class internet intelligence. It can discover publicly exposed assets through shadow IT. In addition to automatically detecting assets with configuration errors, it also identifies which assets are at higher risk. Please feel free to contact us if you have any inquiries. 【Features】 ■ Discover publicly exposed assets through shadow IT ■ Automatically detect assets with configuration errors ■ Identify management interfaces that remain exposed ■ Determine which assets are at higher risk *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software