We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software Product List and Ranking from 42 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. 飛天ジャパン Tokyo//IT/Telecommunications
  2. アンカーテクノロジーズ Tokyo//IT/Telecommunications
  3. ハミングヘッズ 本社 Tokyo//software
  4. 4 日本シノプシス ソフトウェア・インテグリティ・グループ Tokyo//software
  5. 5 東計電算 製造システム営業部 (第一事業所) Kanagawa//IT/Telecommunications

Security software Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. One-Time Password Token "C200" *Free trial version available for loan. 飛天ジャパン
  2. [Information Leakage Countermeasures] Security Platform 'SeP' ハミングヘッズ 本社
  3. IAST『Seeker』 日本シノプシス ソフトウェア・インテグリティ・グループ
  4. Burp Suite アンカーテクノロジーズ
  5. 4 Security software [TSFS] 東計電算 製造システム営業部 (第一事業所)

Security software Product List

46~60 item / All 118 items

Displayed results

BI | System data and Excel reports systematized 'Find-BI'

The reporting tool "Find-BI" accurately retrieves and outputs various data, supporting data aggregation and report creation tasks.

Are you spending too much time on data collection and result creation to accurately obtain various system data? By implementing our system "Find-BI," you can reduce the time it takes to create result tables and spend more time on subsequent measures. What makes the "Check = Execution Evaluation" phase of the work PDCA cycle difficult? - It is challenging to compare plans and actual results. - Multiple systems lead to time-consuming data collection. - The timing for data acquisition varies by system. - It is necessary to create analysis tables each time for regular checks. - It is required to combine and analyze information beyond system output data. - You cannot compare the information from the last regular check with the current information. - There is a hassle in notifying actual improvers about the check information. - Individual system reports have limitations for overall checks. - It is difficult to delve deeper into information that seems problematic or analyze it from different perspectives. Would you like to solve these issues with Find-BI? For more details, please download our catalog! We are also available for inquiries, so please feel free to reach out.

  • Business Intelligence and Data Analysis

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

MatrixQuestWLAN/wpa 【WPA2 Supplicant】

MatrixQuestWLAN/wpa 【WPA2 Supplicant】

【Overview】 1. High Portability Designed to facilitate easy combinations with various wireless LAN drivers. 2. Supports WPA/WPA2 - WPA-PSK/WPA2-PSK - WPA-1X/WPA2-1X 3. Supports numerous authentication protocols - EAP-TLS - EAP-PEAP - EAP-TTLS - EAP-FAST (planned support)

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security Product: CFKeeper

Safe and low-cost! Strengthening cloud storage security from the endpoint.

"CFKeeper" enhances the security of endpoints that utilize cloud storage. Files in the sync folder are automatically encrypted. Files synchronized/uploaded to cloud storage are not encrypted, allowing for viewing on the go and sharing with external parties as usual. It safely and cost-effectively addresses issues such as "leakage of sync folder/cache data during targeted attacks or malware infections" and "removal of hard disks when a PC is lost." 【Features】 ■ Prohibits copying/uploading files outside the cloud storage sync folder ■ Automatically encrypts files in the sync folder ■ Limits file storage to cloud storage ■ Files synchronized/uploaded to cloud storage are not encrypted, allowing for viewing on the go and sharing with external parties as usual *For more details, please refer to the related link page or feel free to contact us.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[AUTOCRYPT] Outcrypt Security Father

A fuzz testing tool that enables early detection and response to issues that can be utilized in the automotive development lifecycle.

AutoCrypt Security Fuzzer is a fuzz testing tool that enables early detection and response to issues throughout the automotive development lifecycle. It is a dedicated fuzz testing tool specialized for in-vehicle software, capable of executing fuzzing on ECUs and the entire vehicle architecture in real-time within a virtual environment, and can provide functions to detect and report various bugs and vulnerabilities in an add-on manner. It achieves accurate diagnostic service differentiation and high-precision detection through smart fuzzing utilizing AI, automates testing, supports remote testing environments, and improves resource management through continuous ECU testing environment configuration. It allows for continuous ECU testing for each project, reducing the burden of test management with simple retest logic, vehicle-specific test cases, and automatic state recovery functions, while enabling highly accurate fuzzing tests tailored to vehicles through advanced decision logic.

  • Other Auto Parts

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

PC login authentication management one-time password token 'C100'

Compatible with various applications! Portable design that's easy to carry.

The "C100" is a one-time password token that does not require connection to a PC, so there is no need to install drivers or applications. By pressing the button on the token, a one-time disposable password is displayed, and there is no need to remember it. It can be integrated with various applications and features a portable design that is easy to carry. Additionally, we also offer the "C200," which is suitable for time-based use, and the multifunctional, high-performance "C400." 【Features】 ■ No need to connect to a PC, so no driver or application installation is required ■ A one-time disposable password is displayed, and there is no need to remember it ■ High security ■ Low price ■ Easy to implement *For more details, please refer to the PDF document or feel free to contact us.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AppGuard Small Business Edition

Launch of the new edition for 4.2 million small and medium-sized enterprises nationwide!

"AppGuard Small Business Edition" is a product aimed at small to medium-sized enterprises with 1 to 300 employees, combining the simplicity of AppGuard Solo with the integrated management features of AppGuard Enterprise. 【Features】 ■ License for Small and Medium-sized Enterprises For small and medium-sized businesses that cannot make significant investments in security, we offer licenses at an affordable price for companies with up to 300 employees, while maintaining the core technology of AppGuard. ■ Pre-installed Standard Settings By presetting policies at the same level as AppGuard Solo as default values, we can reduce the costs and time required for implementation. ■ Diversification of Implementation Services By diversifying the implementation service menu from simple options to traditional full services, we can provide proposals that align with our customers' budget considerations. *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Free rental of evaluation machine [SPAMSNIPER]

SpamSniper Evaluation Machine Free Loan Service

We are offering the SpamSniper evaluation unit for free. Here is an introduction to the SpamSniper free evaluation unit lending service. ■□■Features■□■ ~ One device, four roles: SpamSniper's multi-layered defense ~ ■ Information leakage prevention ■ SMTP attack defense ■ Virus email blocking ■ Spam email blocking ■ There are no functional restrictions on the evaluation unit, so you can evaluate it in a real environment and according to actual operations. For other functions and details, please contact us.

  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

3D Managed AST Subscription

Identify and exploit critical vulnerabilities for business to reduce the risk of leaks!

The subscription for "3D Managed Application Security Testing (AST)" allows access to all types of managed AST at a single price with one annual subscription. It covers the scope of testing applications and networks necessary to achieve risk management objectives. You can change the application or external network being tested, as well as the type and depth of the assessment (one test at a time). 【Features】 ■ Tests applications and networks that may not be testable due to resource constraints ■ Consistently provides high-quality test results at any time ■ Assists in developing a remediation plan suitable for customer needs ■ Offers scalable testing through the assessment center without hindering manual reviews *For more details, please refer to the PDF materials or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Intelligent Orchestration

Manage all test execution, policy application, prioritization of issues, and filtering!

"Intelligent Orchestration" offers a customized AppSec pipeline that automates security testing not only at certain stages of the software development lifecycle but throughout the entire process. Based on the importance of code changes, total risk scores, and the organization's unique security policies, appropriate security tools are automatically executed. Even in large enterprise environments, it becomes easy to apply security processes and policies across all applications throughout the organization. 【Features】 ■ Only information regarding high-priority vulnerabilities is presented to developers based on the organization's security policies. ■ Users can set feedback after scanning. ■ You can define and customize how weights are assigned to the criteria for calculating the total risk score. *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Corresponds to each requirement of the My Number Act's safety measures! IP-guard V3

Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leak prevention through powerful violation control and logging at the kernel level.

IP-guard V3 is a product for "PC log management," "information security," and "IT asset management" that is adopted by over 20,000 major companies and government agencies in 27 countries worldwide. In Japan, it particularly contributes to solving various industry challenges with its powerful controls and detailed recording features that were not achievable with other products. Additionally, each function, composed of 14 different modules, allows users to select only what they need, minimizing the burden on users and reducing the workload for administrators. Furthermore, it is a product that can meet almost all the requirements outlined in the safety measures of the My Number Act (government-issued security guidelines).

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email Archive and Audit Solution WISE Audit

A mail archiving and auditing solution with numerous large-scale user achievements that can handle everything from regular email audits to e-discovery requirements.

WISE Audit is a solution that archives and stores corporate emails, which are important information assets, to streamline email audits during both emergencies and normal times. ● Flexibly supports all email environments from on-premises to cloud ● High-speed search of 10 million emails per second (※1) and excellent Japanese search functionality ● Proven adoption by many companies, including NEC with 150,000 users WISE Audit has achieved the number one sales position in two domestic email archive market surveys. - Deloitte Tohmatsu Mic Economic Research Institute (11 consecutive years) ※1 - ITR (3 consecutive years) ※2 ※1 Source: Deloitte Tohmatsu Mic Economic Research Institute, "Current Status and Future Outlook of Internal Threat Countermeasure Solutions Market 2022" published in January 2023 https://mic-r.co.jp/mr/02620/ ※2 Source: ITR "ITR Market View: Information Leakage Countermeasure Market 2023" Email Archive Market: Vendor Sales Amount Share (2019-2021)

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

GDATA Total Protection Multi-License Version

World-class detection rates protect against all types of threats. Equipped with everything needed for the best protection and the highest peace of mind in PC security.

Protected from all types of threats with the world's highest virus detection rate. This is a reliable all-in-one product packed with all the security features of G DATA's personal products, including firewall, vulnerability protection, online banking protection, and backup.

  • Other security
  • Firewall and intrusion prevention
  • Virus software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Gorilla AI Appliance "AI Screen Station"

Revolutionary face recognition + mask and temperature detection solution! Easily installable on desks, walls, etc.

The "AI Screen Station" is a non-contact AI appliance equipped with access control features. It can detect body temperature and check for the wearing of masks and hats while simultaneously performing identity verification through AI facial recognition, allowing for easy monitoring of employees' health status and entry/exit conditions. It is possible to configure a flexible hardware setup, making it a useful tool for quickly implementing appropriate measures in companies, factories, medical and government institutions, and transportation hubs (airports, stations, public transportation). 【Features】 ■ Attendance management system and access control ■ Unauthorized access alerts ■ Non-contact facial recognition ■ Biometric detection through facial recognition to prevent tailgating ■ Management of access for employees and visitors on a single platform *For more details, please refer to the PDF document or feel free to contact us.

  • image_12.png
  • image001.png
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security suite package "TruSuite"

This one is enough for endpoint security!

"TruSuite" is the suite version of the TruStack series products. With one license, you can use all 32-bit or 64-bit versions of the entire TruStack series. 【Features】 ■ All TruStack products can be used with one license ■ High cost performance *For more details, please refer to the catalog or feel free to contact us.

  • Other security
  • Personal authentication
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software