We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software Product List and Ranking from 64 Manufacturers, Suppliers and Companies | IPROS GMS

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

  1. ハミングヘッズ 本社 Tokyo//software
  2. 飛天ジャパン Tokyo//IT/Telecommunications
  3. アンカーテクノロジーズ Tokyo//IT/Telecommunications
  4. 4 日本ファインアート Tokyo//IT/Telecommunications
  5. 5 Spelldata Tokyo//Information and Communications

Security software Product ranking

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

  1. [Information Leakage Countermeasures] Security Platform 'SeP' ハミングヘッズ 本社
  2. One-Time Password Token "C200" *Free trial version available for loan. 飛天ジャパン
  3. VirusTotal Enterprise アンカーテクノロジーズ
  4. 4 [Case Study Collection] Information Leakage Prevention System Total Security Fort 日本ファインアート
  5. 5 Burp Suite アンカーテクノロジーズ

Security software Product List

61~90 item / All 128 items

Displayed results

Gorilla AI Appliance "AI Screen Station"

Revolutionary face recognition + mask and temperature detection solution! Easily installable on desks, walls, etc.

The "AI Screen Station" is a non-contact AI appliance equipped with access control features. It can detect body temperature and check for the wearing of masks and hats while simultaneously performing identity verification through AI facial recognition, allowing for easy monitoring of employees' health status and entry/exit conditions. It is possible to configure a flexible hardware setup, making it a useful tool for quickly implementing appropriate measures in companies, factories, medical and government institutions, and transportation hubs (airports, stations, public transportation). 【Features】 ■ Attendance management system and access control ■ Unauthorized access alerts ■ Non-contact facial recognition ■ Biometric detection through facial recognition to prevent tailgating ■ Management of access for employees and visitors on a single platform *For more details, please refer to the PDF document or feel free to contact us.

  • image_12.png
  • image001.png
  • Personal authentication
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Security Implementation Case] Ishigaki City, Okinawa Prefecture

The southernmost municipality in Japan has adopted 'HP Sure Click Enterprise' for internet utilization!

We would like to introduce a case where our "HP Sure Click Enterprise" was implemented in Ishigaki City, which functions as the central city of the Yaeyama Islands in Okinawa Prefecture. With the aim of enhancing security for further utilization of the internet, this product was adopted to strengthen endpoint security. "After implementation, internet usage has become very smooth and secure. The complaints from staff have disappeared, and we can use various services with peace of mind," we have received feedback. 【System Effects】 ■ Strengthens security without burdening staff ■ Promotes internet utilization ■ Increases convenience and improves productivity *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Security Implementation Case] Social Welfare Corporation San'ikukai

"HP Sure Click Enterprise" greatly contributes to the efficiency of security administrators' operations!

We would like to introduce a case where our "HP Sure Click Enterprise" was implemented at the social welfare corporation Sanikukai, which provides community-based medical and welfare services. The aim was to introduce a security solution that does not rely on administrators, enabling security operations with minimal operational burden using HP SCE. We have received feedback stating, "There is almost no management burden, and we can trust the security. We expect that from now on, even with limited personnel, we will be able to focus on our core business." 【Case Overview】 ■ System Effects - Security benefits achievable even without a dedicated administrator - Does not reduce user productivity ■ Business Effects - Strengthens security while compensating for personnel shortages - High cost performance *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security suite package "TruSuite"

This one is enough for endpoint security!

"TruSuite" is the suite version of the TruStack series products. With one license, you can use all 32-bit or 64-bit versions of the entire TruStack series. 【Features】 ■ All TruStack products can be used with one license ■ High cost performance *For more details, please refer to the catalog or feel free to contact us.

  • Other security
  • Personal authentication
  • Encryption and authentication
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

ECC DRAM data error correction and application protection

[White Paper] ECC DRAM Modules Utilizing Hamming Code - Ideal for Applications Requiring High Reliability and Stability

For more details, please refer to the PDF document or feel free to contact us. Computer crashes and software malfunctions caused by data errors are serious issues.

  • Memory
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Platform "SWANStor"

A secure remote access platform that provides various security features!

"SWANStor" is a secure remote access platform that provides various security features necessary for accessing cloud services and internal business systems. It can be implemented without opening holes in the firewall. Authentication information, access management information, logs, and other information required for remote access can be securely stored on a LAN that is completely isolated from external access. 【Features】 ■ Easy implementation ■ Safe operation ■ A wide range of selectable security options ■ Versatility to support various applications and devices *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Other information systems
  • Encryption and authentication
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

File Security "FinalCode"

"FinalCode" protects all files handled in business without being aware of them.

"FinalCode" automatically protects files from the moment they are created. Only the individuals or groups specified by the file creator via email address can view the files, and access and operation histories can be checked in real-time, with the ability to change permissions even after the files have been shared.

  • Document and Data Management
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Explained in Manga] Understandable by Reading! How to Protect Your Company's Device Integration App

Introducing the security solution product "CrackProof" that protects apps from unauthorized attacks in a manga format!

Recently, collaboration between apps and devices has been advancing in various fields. While there are many benefits, such as increased convenience for users, there are also security risks associated with distributing apps that connect to proprietary devices, such as the sale of tampered apps and the analysis of proprietary technology from the apps. This document explains the necessary security measures for apps that connect to proprietary devices in an easy-to-understand manga format. Please download and take a look. 【Recommended for】 ■ Those considering developing apps that connect proprietary devices with smartphones or PCs ■ Those considering measures to prevent the leakage of proprietary technology from apps that operate proprietary devices ■ Those considering developing apps for operating and maintaining proprietary devices ■ Those who want to prevent unauthorized changes to the settings of proprietary devices through apps *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

App Protection/CrackProof for Android SO

Before Android apps are affected, various protective features are added to prevent attacks and strengthen security!

**[Hardening Method]** Simply upload the completed Android app (AAB/APK) that includes the native shared library (SO file) you want to protect to the CrackProof cloud, and the hardening process for the SO file and the Android app containing it will be completed. **[Additional Protection Features]** - **Enhanced Resistance to Static Analysis and Tampering** - Prevents static analysis targeting the SO file using features like AES encryption. - Prevents static tampering targeting the app itself using features like signature checks. - **Enhanced Resistance to Dynamic Analysis and Tampering** - Prevents analysis targeting the app's behavior using features like debugger prevention. - Prevents tampering targeting the app's behavior using features like SO file tampering prevention. - **Enhanced Resistance to Execution in Unauthorized Environments** - Prevents app execution on rooted devices or emulators. Customers interested in CrackProof are encouraged to contact DNP Hypertech through the inquiry form for consultation. We will propose the most suitable usage method for you.

  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

App Protection/CrackProof for iOS

Before iOS apps are affected, various protective features are added to prevent attacks and strengthen security!

**[Hardening Method]** Simply link the CrackProof for iOS library to your project in Xcode and upload it to the CrackProof cloud to complete the hardening process. **[Additional Protection Features]** - **Enhanced Static Tampering Resistance** - Prevents static tampering actions targeting the app itself with features such as signature tampering detection. - **Enhanced Dynamic Analysis and Tampering Resistance** - Prevents analysis actions targeting the app's behavior with features such as debugger detection and JailBreak detection. - Prevents tampering actions targeting the app's behavior with features such as JailBreak detection. - **Enhanced Execution Resistance in Unauthorized Environments** - Prevents app execution on JailBroken devices. Customers interested in CrackProof are encouraged to contact DNP Hypertech through the inquiry form for consultation. We will propose the optimal usage method for you.

  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

CrackProof Implementation Case: Metaverse Platform Operation

[Case Study] Understand the Security Measures for Metaverse (VR) Apps!

In recent years, the "metaverse" has gained attention across various industries. While its expansion is broad across all fields, there are also various security risks that must be considered by those operating the platforms. *Our company's column also explains the security of the metaverse↓ "Security Considerations When Utilizing the Metaverse for Business" https://www.hypertech.co.jp/column/marketing/2023/03/metaverse-security/ In this document, we have invited Company A, which operates a metaverse (VR) platform and has chosen CrackProof for their app's security measures, to discuss how CrackProof has addressed their security challenges. 【Recommended for】 - Those planning to develop apps for the metaverse (VR) platform - Those currently developing or operating metaverse (VR) apps and considering security measures - Those who want to know the benefits of choosing CrackProof as a security measure for metaverse (VR) apps

  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Mega Padlock

To prevent theft, tampering, unauthorized use, and contamination by foreign substances.

The "Mega Padlock" is a padlock-type sealing device that is ideal for sealing pharmaceuticals and valuables. ■ Printing: Company name, logo, designated number (optional: barcode) Due to laser printing, it is impossible to alter or erase the printed content! ■ 6 colors: Orange, white, yellow, blue, pink, green By using different colors for the body, it is possible to improve logistics management efficiency! ■ Opening method: Equipped with pre-break points with cuts, it can be easily removed by hand.

  • others
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information Leakage Countermeasures] Security Platform 'SeP'

Monitoring, controlling, and recording operations with strong comprehensiveness! A purely domestic security software that can handle all aspects with a single solution. *Case study introduction.

"SeP" is a security software designed to protect companies from information leaks and fraud through various channels. It is equipped with four features: automatic encryption, defense capabilities, write restrictions, and history functions. We also offer a variety of options, such as the "Tracer Option," which decrypts operation history collected on the server and outputs it in CSV format, and the "Intranet Option." 【Features】 ■ One solution for all scenarios ■ Security that operates automatically without changing internal rules ■ Strong comprehensiveness for monitoring, controlling, and recording business activities ■ Equipped with four functions, including automatic encryption and defense capabilities *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

One-Time Password Token "C200" *Free trial version available for loan.

Compliant with OATH's TOTP (Time-based One-time Password Algorithm)!

The "C200" is a one-time password token that generates a one-time password at regular intervals, enabling two-factor authentication during login. The display of battery remaining allows for risk hedging against battery depletion in advance, such as by facilitating replacements or stock management. 【Our OTP Features】 ■ High security ■ High convenience ■ Low cost ■ Usable for a wide range of applications ■ Customizable design ★ Please apply for a free trial version through the "Contact Us" section ★ *For more details, please download the PDF or feel free to contact us.*

  • Encryption and authentication
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information leakage prevention security software "Discovery"

Prevent information leakage from smartphone and tablet terminals!

The information leakage prevention software "Hakken-den" monitors output to external storage media such as USB memory, CDs, DVDs, and printers, as well as attached emails, to prevent information leakage by deterring the unauthorized transfer of information outside the organization. It monitors user file operations and printer outputs, storing operation history data. By managing who accessed and printed which files and when, it helps detect unauthorized access and deter the unauthorized transfer of files, thereby improving information security. Please utilize it as a DLP (Data Loss Prevention) tool. 【Features】 ■ Restrictions on the use of USB storage ■ File encryption ■ Writing to USB storage is prohibited ■ Centralized management of operation logs and unauthorized alerts *For more details, please download the PDF or feel free to contact us.

  • Server monitoring and network management tools
  • Other operation management software
  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email Misdelivery Prevention Service "Filter"

Prevent "Oops! I made a mistake!" Automatically prevent email sending errors and avoid information leaks!

The @Securemail Plus Filter is a solution that prevents accidental email sending and information leakage through intentional emails (DLP). It broadly supports features such as temporary email holding and converting attachments to web downloads (eliminating PPAP). 【Features】 ■ Prevents accidental sending through temporary email holding and supervisor approval! ■ Can block web downloads and forwarding of attachments! ■ Can be used in conjunction with existing email environments like Microsoft 365. ■ Easy to try out and implement. *For more details, please refer to the PDF materials or feel free to contact us.

  • Email/Fax transmission
  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Targeted Attack Email Countermeasure Service "TAP"

Protect against targeted attack emails that trick you into opening suspicious attachments and URLs!

@Securemail Plus TAP is a SaaS-based email security service that utilizes the targeted attack response engine from Proofpoint, a company with extensive experience in email security products. It verifies suspicious attachments and URLs within emails, such as those containing ransomware like Emotet and IcedID, in a sandbox environment. By validating the risks in the sandbox before they reach the customer, it protects your valuable information from targeted attack emails. 【Features】 ■ Protect against attacks that try to get you to open suspicious email attachments! ■ Protect against attacks that try to get you to click on URLs within emails! ■ Protect against targeted attack emails even during telework without VPN or UTM! ■ Easy to try and implement *For more details, please refer to the PDF document or feel free to contact us.

  • Email/Fax transmission
  • Other security
  • Virus software
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study Collection] Information Leakage Prevention System Total Security Fort

Control, recording, monitoring, approval. Introducing all-in-one internal information security measures.

This document summarizes case studies of the implementation of the information leakage prevention system "Total Security Fort." It details the background and circumstances of the implementation, as well as the effects after implementation and future prospects, covering the cases of a total of eight companies. Please use this information for your consideration of product implementation. [Featured Case Studies (Partial)] ■ NTT Data Corporation ■ Yokote City Hall, Akita Prefecture ■ Meiden System Technology Co., Ltd. ■ Veriserv Inc. ■ SII Data Service Co., Ltd. and others *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

BlackBerry Desktop

Enables secure remote connections from Windows 10 or macOS devices.

"BlackBerry Desktop" is a product that enables users to securely access email, company websites, servers, content, and files on Windows 10 and macOS devices that are not managed by the user personally or by the company. It can simplify the organization's BYOC program and improve productivity not only for traditional employees but also for non-traditional employees. Additionally, it helps your company save costs related to hardware, software, provisioning, and help desk services. 【Features】 ■ Maximizes productivity ■ Reduces costs ■ Securely operate from any device at any time ■ Use the same functionalities as computers owned or managed by the company ■ Users can freely collaborate using business-specific features *For more details, please refer to the PDF materials or feel free to contact us.

  • others
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

BlackBerry Protect for Mobile Devices

Mobile threat defense utilizing AI. It identifies security vulnerabilities and the potential for malicious activities.

The product is an MTD solution that extends the AI-based security of "BlackBerry Protect" to mobile devices. It monitors attacks from mobile malware at the device and application level, expanding protection without the need for additional manpower. Additionally, it identifies security vulnerabilities and the potential for malicious activity by monitoring OS updates, system parameters, device configurations, and system libraries at the application level. 【Features】 ■ Monitors attacks from mobile malware ■ Expands protection without the need for additional manpower ■ Simple end-user registration and activation via QR code ■ Intuitive device health status ■ Simple device security assessment *For more details, please refer to the PDF document or feel free to contact us.

  • Other embedded systems (software and hardware)
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Plus Managed Security Services

Specialized analysts monitor the configuration, operation, and status of security devices such as UTM and IPS 24 hours a day, 365 days a year.

■ 24 hours a day, 365 days a year, monitoring customer systems ■ Real-time analysis and reporting of high-risk security events ■ Maintaining the network security level in optimal condition while significantly reducing operational costs

  • Firewall and intrusion prevention
  • Integrated operation management
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

SecureLayer Browser Extension

Enhance security simply by adding it as an extension to your familiar browser!

You can easily enhance your security measures by simply adding it as an extension to your Chrome or Edge browser. 〇 Prevent malware infections from accessing malicious sites It analyzes sites and disconnects unauthorized sessions. Additionally, it keeps the browser secure by disabling risky browser extensions and performing version checks. 〇 Understanding rogue SaaS (visualization of SaaS) It monitors the SaaS being used by employees and identifies the use of unauthorized SaaS within the company. It can also prohibit access to SaaS applications and cloud storage that pose security concerns. 〇 Prevent user actions that violate policies (leakage of confidential information) It blocks actions such as attaching files to cloud storage or free email services, and pasting confidential or personal information into ChatGPT or translation sites, thereby preventing the leakage of confidential data to external sources. 〇 Provide a safe browsing environment It offers a safe browsing environment without compromising user experience. Moreover, it can be implemented easily and cost-effectively compared to technologies like VDI, which require changes to the overall network design.

  • Other information systems
  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Measures Advisory Service

We will help you implement the necessary security measures as a matter of course.

Our company offers an "Advisory Service" where our experienced staff provides advice from your perspective on concerns and consultations related to information security. We will establish an operational framework for measures that do not hinder your core business, and through the implementation of these measures, we will identify further areas for improvement. We will propose plans for the next stage. 【Features】 <Advice on Security Measures and Operations> ■ Questions or issues that arise when planning, implementing, checking, and reviewing information security measures ■ Response to security incidents and incidents ■ Security education and methods for internal dissemination of effectiveness ■ Neutral advice rather than support tied to the introduction of specific products ■ Provision of information regarding cybersecurity measures, etc. *For more details, please download the PDF or feel free to contact us.

  • Other services
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Decarbonization: Risk Analysis of CO2 Leakage

Important for evaluating safety! Analysis of the risk of CO2 leakage to the ground.

The risk analysis of CO2 leakage to the surface after CO2 injection and upon completion of injection is important for evaluating safety. It is necessary to examine the presence of faults and abandoned wells, as well as the appropriate injection pressure, and to conduct simulations that consider the impact not only on the reservoir but also on the cap rock. By coupling rock mechanics models with reservoir simulators, it is possible to perform calculations that take into account the effects of pressure changes on the geomechanical properties of the reservoir. For example, in GEM, a modified Barton-Bandis model is applied to simulate the opening and closing of fractures and to calculate CO2 leakage from the cap rock. Our company primarily focuses on calculations using the reservoir simulator GEM and literature research to investigate and examine the following items: [Investigation and Examination Items] ■ Examination of the workflow for creating simulation input data from experimental, analytical, and literature data ■ Examination of the workflow for CO2 leakage risk analysis that reflects the uncertainty analysis of input data ■ Investigation of the workflow for CO2 leakage calculations in various reservoir simulators *For more details, please feel free to contact us.

  • Other contract services
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

One-stop solution for the EU Cyber Resilience Act

We provide a support system that covers all aspects of technology, tools, and certification for companies that are unsure where to start with CRA compliance!

Introducing a one-stop solution provided by IT Access for companies struggling to comply with the EU Cyber Resilience Act (CRA). Engineers with 15 to 30 years of experience assist companies that lack understanding of the CRA or find it difficult to determine compliance standards, supporting them from organizing security requirements to modifications and obtaining certifications. We also support the provision and implementation of necessary tools such as wolfSSL's "wolfBoot" and "wolfCrypt," as well as Onward Security's "SecDevice" and "SecSAM." Furthermore, we provide comprehensive support from evaluation in our testing lab to application to the certification body DEKRA. We offer comprehensive assistance for CRA compliance.

  • Software (middle, driver, security, etc.)
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security risk analysis service

The risk analysis results are clearer with our original four-level evaluation method!

Our risk analysis support flexibly assists clients who wish to conduct their own analyses. By performing an analysis, it becomes possible to make efficient security investments. Additionally, the standard analysis methods published by the Information-Technology Promotion Agency (IPA) come with a guidebook that is 380 pages long, making it suitable for those who want to get started quickly. 【Features】 ■ Fully compliant with IPA's "Security Risk Analysis Guide for Control Systems" ■ Utilizes our developed risk analysis tools to minimize costs to the extreme ■ Achieves highly effective security risk assessments *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Other services
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

English version security risk analysis seminar video

It will serve as a powerful tool for the initial management of cybersecurity for overseas bases and business partners of the company.

This is an English version of the learning video content for asset-based risk analysis and business impact-based risk analysis, in accordance with the "Security Risk Analysis Guide for Control Systems, 2nd Edition" provided by the Information-technology Promotion Agency (IPA). Recently, there has been a significant increase in cyberattacks from overseas bases and branches. To enhance the security measures of such locations, please make use of this content. The online version of the guide is available, and the text in the image is explained in Japanese while adhering to the English (IPA Pocket Guide) standards.

  • Company:INJANET
  • Price:10,000 yen-100,000 yen
  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Risk Analysis Tool Pro (English Version)

An English version of the tool based on IPA's "Security Risk Analysis of Control Systems" for strengthening cybersecurity at overseas bases and business partners.

For customers who believe that while strengthening the security of the headquarters, it is difficult to secure the security of overseas locations. This tool can automatically generate English versions of the two types of risk analysis sheets provided in the IPA's "Guidelines for Security Risk Analysis of Control Systems, 2nd Edition": the asset-based risk analysis sheet and the business impact-based risk analysis sheet. By using it alongside the English version and the security risk analysis seminar video, you can enhance cybersecurity overseas.

  • Company:INJANET
  • Price:10,000 yen-100,000 yen
  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Risk Analysis Tool Pro

To customers who cannot avoid the labor of security risk analysis: We can significantly reduce the effort required for the tedious task of creating security risk analysis reports through automation.

The analysis method complies with the "Security Risk Analysis Guide for Control Systems" published by the IPA (Information-technology Promotion Agency) and can achieve up to 90% efficiency improvement. It automatically generates asset-based risk analysis sheets and business impact-based risk analysis sheets used in the above guide. By inputting the assets to be analyzed, their characteristics, connection information, and data flow, it automatically determines dangerous attack trees.

  • Company:INJANET
  • Price:10,000 yen-100,000 yen
  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software