We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software Product List and Ranking from 64 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Nov 05, 2025~Dec 02, 2025
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Nov 05, 2025~Dec 02, 2025
This ranking is based on the number of page views on our site.

  1. 飛天ジャパン Tokyo//IT/Telecommunications
  2. アンカーテクノロジーズ Tokyo//IT/Telecommunications
  3. 日本シノプシス ソフトウェア・インテグリティ・グループ Tokyo//software
  4. 4 ハミングヘッズ 本社 Tokyo//software
  5. 4 ケイティケイソリューションズ Aichi//IT/Telecommunications

Security software Product ranking

Last Updated: Aggregation Period:Nov 05, 2025~Dec 02, 2025
This ranking is based on the number of page views on our site.

  1. OTP token "c610" *Free trial version available for loan. 飛天ジャパン
  2. VirusTotal Enterprise アンカーテクノロジーズ
  3. One-Time Password Token "C200" *Free trial version available for loan. 飛天ジャパン
  4. Burp Suite アンカーテクノロジーズ
  5. 4 [Information Leakage Countermeasures] Security Platform 'SeP' ハミングヘッズ 本社

Security software Product List

46~60 item / All 123 items

Displayed results

IP reputation service "kr:ns (Chronos)"

Domestic Cybersecurity Solution

"kr:ns (Chronos)" is an IP reputation service that correlates a vast amount of observational data collected through an extensive observation network with your IP address as unique Threat Intelligence. We have entered into a joint research agreement with the National Institute of Information and Communications Technology and Cybersecurity Nexus (CYNEX) to evaluate its effectiveness as Threat Intelligence. Additionally, this information can be integrated into and analyzed by SIEM systems. [Examples of analysis results obtained from dynamic analysis of IoT malware (partial)] ■ Target port numbers for scans conducted to spread infection ■ Communication destination information believed to be a C2 server ■ Port numbers that the malware listens on ■ DNS communications conducted by the malware *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

senda

Practice of "Threat Hunting" to identify assets exposed to threats!

"Senda" is world-class internet intelligence. It can discover publicly exposed assets through shadow IT. In addition to automatically detecting assets with configuration errors, it also identifies which assets are at higher risk. Please feel free to contact us if you have any inquiries. 【Features】 ■ Discover publicly exposed assets through shadow IT ■ Automatically detect assets with configuration errors ■ Identify management interfaces that remain exposed ■ Determine which assets are at higher risk *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

BI | System data and Excel reports systematized 'Find-BI'

The reporting tool "Find-BI" accurately retrieves and outputs various data, supporting data aggregation and report creation tasks.

Are you spending too much time on data collection and result creation to accurately obtain various system data? By implementing our system "Find-BI," you can reduce the time it takes to create result tables and spend more time on subsequent measures. What makes the "Check = Execution Evaluation" phase of the work PDCA cycle difficult? - It is challenging to compare plans and actual results. - Multiple systems lead to time-consuming data collection. - The timing for data acquisition varies by system. - It is necessary to create analysis tables each time for regular checks. - It is required to combine and analyze information beyond system output data. - You cannot compare the information from the last regular check with the current information. - There is a hassle in notifying actual improvers about the check information. - Individual system reports have limitations for overall checks. - It is difficult to delve deeper into information that seems problematic or analyze it from different perspectives. Would you like to solve these issues with Find-BI? For more details, please download our catalog! We are also available for inquiries, so please feel free to reach out.

  • Business Intelligence and Data Analysis

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

MatrixQuestWLAN/wpa 【WPA2 Supplicant】

MatrixQuestWLAN/wpa 【WPA2 Supplicant】

【Overview】 1. High Portability Designed to facilitate easy combinations with various wireless LAN drivers. 2. Supports WPA/WPA2 - WPA-PSK/WPA2-PSK - WPA-1X/WPA2-1X 3. Supports numerous authentication protocols - EAP-TLS - EAP-PEAP - EAP-TTLS - EAP-FAST (planned support)

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security Product: CFKeeper

Safe and low-cost! Strengthening cloud storage security from the endpoint.

"CFKeeper" enhances the security of endpoints that utilize cloud storage. Files in the sync folder are automatically encrypted. Files synchronized/uploaded to cloud storage are not encrypted, allowing for viewing on the go and sharing with external parties as usual. It safely and cost-effectively addresses issues such as "leakage of sync folder/cache data during targeted attacks or malware infections" and "removal of hard disks when a PC is lost." 【Features】 ■ Prohibits copying/uploading files outside the cloud storage sync folder ■ Automatically encrypts files in the sync folder ■ Limits file storage to cloud storage ■ Files synchronized/uploaded to cloud storage are not encrypted, allowing for viewing on the go and sharing with external parties as usual *For more details, please refer to the related link page or feel free to contact us.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[AUTOCRYPT] Outcrypt Security Father

A fuzz testing tool that enables early detection and response to issues that can be utilized in the automotive development lifecycle.

AutoCrypt Security Fuzzer is a fuzz testing tool that enables early detection and response to issues throughout the automotive development lifecycle. It is a dedicated fuzz testing tool specialized for in-vehicle software, capable of executing fuzzing on ECUs and the entire vehicle architecture in real-time within a virtual environment, and can provide functions to detect and report various bugs and vulnerabilities in an add-on manner. It achieves accurate diagnostic service differentiation and high-precision detection through smart fuzzing utilizing AI, automates testing, supports remote testing environments, and improves resource management through continuous ECU testing environment configuration. It allows for continuous ECU testing for each project, reducing the burden of test management with simple retest logic, vehicle-specific test cases, and automatic state recovery functions, while enabling highly accurate fuzzing tests tailored to vehicles through advanced decision logic.

  • Other Auto Parts

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AppGuard Small Business Edition

Launch of the new edition for 4.2 million small and medium-sized enterprises nationwide!

"AppGuard Small Business Edition" is a product aimed at small to medium-sized enterprises with 1 to 300 employees, combining the simplicity of AppGuard Solo with the integrated management features of AppGuard Enterprise. 【Features】 ■ License for Small and Medium-sized Enterprises For small and medium-sized businesses that cannot make significant investments in security, we offer licenses at an affordable price for companies with up to 300 employees, while maintaining the core technology of AppGuard. ■ Pre-installed Standard Settings By presetting policies at the same level as AppGuard Solo as default values, we can reduce the costs and time required for implementation. ■ Diversification of Implementation Services By diversifying the implementation service menu from simple options to traditional full services, we can provide proposals that align with our customers' budget considerations. *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Free rental of evaluation machine [SPAMSNIPER]

SpamSniper Evaluation Machine Free Loan Service

We are offering the SpamSniper evaluation unit for free. Here is an introduction to the SpamSniper free evaluation unit lending service. ■□■Features■□■ ~ One device, four roles: SpamSniper's multi-layered defense ~ ■ Information leakage prevention ■ SMTP attack defense ■ Virus email blocking ■ Spam email blocking ■ There are no functional restrictions on the evaluation unit, so you can evaluate it in a real environment and according to actual operations. For other functions and details, please contact us.

  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

3D Managed AST Subscription

Identify and exploit critical vulnerabilities for business to reduce the risk of leaks!

The subscription for "3D Managed Application Security Testing (AST)" allows access to all types of managed AST at a single price with one annual subscription. It covers the scope of testing applications and networks necessary to achieve risk management objectives. You can change the application or external network being tested, as well as the type and depth of the assessment (one test at a time). 【Features】 ■ Tests applications and networks that may not be testable due to resource constraints ■ Consistently provides high-quality test results at any time ■ Assists in developing a remediation plan suitable for customer needs ■ Offers scalable testing through the assessment center without hindering manual reviews *For more details, please refer to the PDF materials or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Intelligent Orchestration

Manage all test execution, policy application, prioritization of issues, and filtering!

"Intelligent Orchestration" offers a customized AppSec pipeline that automates security testing not only at certain stages of the software development lifecycle but throughout the entire process. Based on the importance of code changes, total risk scores, and the organization's unique security policies, appropriate security tools are automatically executed. Even in large enterprise environments, it becomes easy to apply security processes and policies across all applications throughout the organization. 【Features】 ■ Only information regarding high-priority vulnerabilities is presented to developers based on the organization's security policies. ■ Users can set feedback after scanning. ■ You can define and customize how weights are assigned to the criteria for calculating the total risk score. *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Corresponds to each requirement of the My Number Act's safety measures! IP-guard V3

Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leak prevention through powerful violation control and logging at the kernel level.

IP-guard V3 is a product for "PC log management," "information security," and "IT asset management" that is adopted by over 20,000 major companies and government agencies in 27 countries worldwide. In Japan, it particularly contributes to solving various industry challenges with its powerful controls and detailed recording features that were not achievable with other products. Additionally, each function, composed of 14 different modules, allows users to select only what they need, minimizing the burden on users and reducing the workload for administrators. Furthermore, it is a product that can meet almost all the requirements outlined in the safety measures of the My Number Act (government-issued security guidelines).

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email Archive and Audit Solution WISE Audit

A mail archiving and auditing solution with numerous large-scale user achievements that can handle everything from regular email audits to e-discovery requirements.

WISE Audit is a solution that archives and stores corporate emails, which are important information assets, to streamline email audits during both emergencies and normal times. ● Flexibly supports all email environments from on-premises to cloud ● High-speed search of 10 million emails per second (※1) and excellent Japanese search functionality ● Proven adoption by many companies, including NEC with 150,000 users WISE Audit has achieved the number one sales position in two domestic email archive market surveys. - Deloitte Tohmatsu Mic Economic Research Institute (11 consecutive years) ※1 - ITR (3 consecutive years) ※2 ※1 Source: Deloitte Tohmatsu Mic Economic Research Institute, "Current Status and Future Outlook of Internal Threat Countermeasure Solutions Market 2022" published in January 2023 https://mic-r.co.jp/mr/02620/ ※2 Source: ITR "ITR Market View: Information Leakage Countermeasure Market 2023" Email Archive Market: Vendor Sales Amount Share (2019-2021)

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

GDATA Total Protection Multi-License Version

World-class detection rates protect against all types of threats. Equipped with everything needed for the best protection and the highest peace of mind in PC security.

Protected from all types of threats with the world's highest virus detection rate. This is a reliable all-in-one product packed with all the security features of G DATA's personal products, including firewall, vulnerability protection, online banking protection, and backup.

  • Other security
  • Firewall and intrusion prevention
  • Virus software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software