We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software Product List and Ranking from 64 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Nov 05, 2025~Dec 02, 2025
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Nov 05, 2025~Dec 02, 2025
This ranking is based on the number of page views on our site.

  1. 飛天ジャパン Tokyo//IT/Telecommunications
  2. アンカーテクノロジーズ Tokyo//IT/Telecommunications
  3. 日本シノプシス ソフトウェア・インテグリティ・グループ Tokyo//software
  4. 4 ハミングヘッズ 本社 Tokyo//software
  5. 4 ケイティケイソリューションズ Aichi//IT/Telecommunications

Security software Product ranking

Last Updated: Aggregation Period:Nov 05, 2025~Dec 02, 2025
This ranking is based on the number of page views on our site.

  1. OTP token "c610" *Free trial version available for loan. 飛天ジャパン
  2. VirusTotal Enterprise アンカーテクノロジーズ
  3. One-Time Password Token "C200" *Free trial version available for loan. 飛天ジャパン
  4. Burp Suite アンカーテクノロジーズ
  5. 4 [Information Leakage Countermeasures] Security Platform 'SeP' ハミングヘッズ 本社

Security software Product List

61~75 item / All 123 items

Displayed results

Gorilla AI Appliance "AI Screen Station"

Revolutionary face recognition + mask and temperature detection solution! Easily installable on desks, walls, etc.

The "AI Screen Station" is a non-contact AI appliance equipped with access control features. It can detect body temperature and check for the wearing of masks and hats while simultaneously performing identity verification through AI facial recognition, allowing for easy monitoring of employees' health status and entry/exit conditions. It is possible to configure a flexible hardware setup, making it a useful tool for quickly implementing appropriate measures in companies, factories, medical and government institutions, and transportation hubs (airports, stations, public transportation). 【Features】 ■ Attendance management system and access control ■ Unauthorized access alerts ■ Non-contact facial recognition ■ Biometric detection through facial recognition to prevent tailgating ■ Management of access for employees and visitors on a single platform *For more details, please refer to the PDF document or feel free to contact us.

  • image_12.png
  • image001.png
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security suite package "TruSuite"

This one is enough for endpoint security!

"TruSuite" is the suite version of the TruStack series products. With one license, you can use all 32-bit or 64-bit versions of the entire TruStack series. 【Features】 ■ All TruStack products can be used with one license ■ High cost performance *For more details, please refer to the catalog or feel free to contact us.

  • Other security
  • Personal authentication
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

ECC DRAM data error correction and application protection

[White Paper] ECC DRAM Modules Utilizing Hamming Code - Ideal for Applications Requiring High Reliability and Stability

For more details, please refer to the PDF document or feel free to contact us. Computer crashes and software malfunctions caused by data errors are serious issues.

  • Memory

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

File Security "FinalCode"

"FinalCode" protects all files handled in business without being aware of them.

"FinalCode" automatically protects files from the moment they are created. Only the individuals or groups specified by the file creator via email address can view the files, and access and operation histories can be checked in real-time, with the ability to change permissions even after the files have been shared.

  • Document and Data Management

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Explained in Manga] Understandable by Reading! How to Protect Your Company's Device Integration App

Introducing the security solution product "CrackProof" that protects apps from unauthorized attacks in a manga format!

Recently, collaboration between apps and devices has been advancing in various fields. While there are many benefits, such as increased convenience for users, there are also security risks associated with distributing apps that connect to proprietary devices, such as the sale of tampered apps and the analysis of proprietary technology from the apps. This document explains the necessary security measures for apps that connect to proprietary devices in an easy-to-understand manga format. Please download and take a look. 【Recommended for】 ■ Those considering developing apps that connect proprietary devices with smartphones or PCs ■ Those considering measures to prevent the leakage of proprietary technology from apps that operate proprietary devices ■ Those considering developing apps for operating and maintaining proprietary devices ■ Those who want to prevent unauthorized changes to the settings of proprietary devices through apps *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

App Protection/CrackProof for Android SO

Before Android apps are affected, various protective features are added to prevent attacks and strengthen security!

**[Hardening Method]** Simply upload the completed Android app (AAB/APK) that includes the native shared library (SO file) you want to protect to the CrackProof cloud, and the hardening process for the SO file and the Android app containing it will be completed. **[Additional Protection Features]** - **Enhanced Resistance to Static Analysis and Tampering** - Prevents static analysis targeting the SO file using features like AES encryption. - Prevents static tampering targeting the app itself using features like signature checks. - **Enhanced Resistance to Dynamic Analysis and Tampering** - Prevents analysis targeting the app's behavior using features like debugger prevention. - Prevents tampering targeting the app's behavior using features like SO file tampering prevention. - **Enhanced Resistance to Execution in Unauthorized Environments** - Prevents app execution on rooted devices or emulators. Customers interested in CrackProof are encouraged to contact DNP Hypertech through the inquiry form for consultation. We will propose the most suitable usage method for you.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

App Protection/CrackProof for iOS

Before iOS apps are affected, various protective features are added to prevent attacks and strengthen security!

**[Hardening Method]** Simply link the CrackProof for iOS library to your project in Xcode and upload it to the CrackProof cloud to complete the hardening process. **[Additional Protection Features]** - **Enhanced Static Tampering Resistance** - Prevents static tampering actions targeting the app itself with features such as signature tampering detection. - **Enhanced Dynamic Analysis and Tampering Resistance** - Prevents analysis actions targeting the app's behavior with features such as debugger detection and JailBreak detection. - Prevents tampering actions targeting the app's behavior with features such as JailBreak detection. - **Enhanced Execution Resistance in Unauthorized Environments** - Prevents app execution on JailBroken devices. Customers interested in CrackProof are encouraged to contact DNP Hypertech through the inquiry form for consultation. We will propose the optimal usage method for you.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

CrackProof Implementation Case: Metaverse Platform Operation

[Case Study] Understand the Security Measures for Metaverse (VR) Apps!

In recent years, the "metaverse" has gained attention across various industries. While its expansion is broad across all fields, there are also various security risks that must be considered by those operating the platforms. *Our company's column also explains the security of the metaverse↓ "Security Considerations When Utilizing the Metaverse for Business" https://www.hypertech.co.jp/column/marketing/2023/03/metaverse-security/ In this document, we have invited Company A, which operates a metaverse (VR) platform and has chosen CrackProof for their app's security measures, to discuss how CrackProof has addressed their security challenges. 【Recommended for】 - Those planning to develop apps for the metaverse (VR) platform - Those currently developing or operating metaverse (VR) apps and considering security measures - Those who want to know the benefits of choosing CrackProof as a security measure for metaverse (VR) apps

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Mega Padlock

To prevent theft, tampering, unauthorized use, and contamination by foreign substances.

The "Mega Padlock" is a padlock-type sealing device that is ideal for sealing pharmaceuticals and valuables. ■ Printing: Company name, logo, designated number (optional: barcode) Due to laser printing, it is impossible to alter or erase the printed content! ■ 6 colors: Orange, white, yellow, blue, pink, green By using different colors for the body, it is possible to improve logistics management efficiency! ■ Opening method: Equipped with pre-break points with cuts, it can be easily removed by hand.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information Leakage Countermeasures] Security Platform 'SeP'

Monitoring, controlling, and recording operations with strong comprehensiveness! A purely domestic security software that can handle all aspects with a single solution. *Case study introduction.

"SeP" is a security software designed to protect companies from information leaks and fraud through various channels. It is equipped with four features: automatic encryption, defense capabilities, write restrictions, and history functions. We also offer a variety of options, such as the "Tracer Option," which decrypts operation history collected on the server and outputs it in CSV format, and the "Intranet Option." 【Features】 ■ One solution for all scenarios ■ Security that operates automatically without changing internal rules ■ Strong comprehensiveness for monitoring, controlling, and recording business activities ■ Equipped with four functions, including automatic encryption and defense capabilities *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

One-Time Password Token "C200" *Free trial version available for loan.

Compliant with OATH's TOTP (Time-based One-time Password Algorithm)!

The "C200" is a one-time password token that generates a one-time password at regular intervals, enabling two-factor authentication during login. The display of battery remaining allows for risk hedging against battery depletion in advance, such as by facilitating replacements or stock management. 【Our OTP Features】 ■ High security ■ High convenience ■ Low cost ■ Usable for a wide range of applications ■ Customizable design ★ Please apply for a free trial version through the "Contact Us" section ★ *For more details, please download the PDF or feel free to contact us.*

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information leakage prevention security software "Discovery"

Prevent information leakage from smartphone and tablet terminals!

The information leakage prevention software "Hakken-den" monitors output to external storage media such as USB memory, CDs, DVDs, and printers, as well as attached emails, to prevent information leakage by deterring the unauthorized transfer of information outside the organization. It monitors user file operations and printer outputs, storing operation history data. By managing who accessed and printed which files and when, it helps detect unauthorized access and deter the unauthorized transfer of files, thereby improving information security. Please utilize it as a DLP (Data Loss Prevention) tool. 【Features】 ■ Restrictions on the use of USB storage ■ File encryption ■ Writing to USB storage is prohibited ■ Centralized management of operation logs and unauthorized alerts *For more details, please download the PDF or feel free to contact us.

  • Server monitoring and network management tools
  • Other operation management software
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email Misdelivery Prevention Service "Filter"

Prevent "Oops! I made a mistake!" Automatically prevent email sending errors and avoid information leaks!

The @Securemail Plus Filter is a solution that prevents accidental email sending and information leakage through intentional emails (DLP). It broadly supports features such as temporary email holding and converting attachments to web downloads (eliminating PPAP). 【Features】 ■ Prevents accidental sending through temporary email holding and supervisor approval! ■ Can block web downloads and forwarding of attachments! ■ Can be used in conjunction with existing email environments like Microsoft 365. ■ Easy to try out and implement. *For more details, please refer to the PDF materials or feel free to contact us.

  • Email/Fax transmission
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Targeted Attack Email Countermeasure Service "TAP"

Protect against targeted attack emails that trick you into opening suspicious attachments and URLs!

@Securemail Plus TAP is a SaaS-based email security service that utilizes the targeted attack response engine from Proofpoint, a company with extensive experience in email security products. It verifies suspicious attachments and URLs within emails, such as those containing ransomware like Emotet and IcedID, in a sandbox environment. By validating the risks in the sandbox before they reach the customer, it protects your valuable information from targeted attack emails. 【Features】 ■ Protect against attacks that try to get you to open suspicious email attachments! ■ Protect against attacks that try to get you to click on URLs within emails! ■ Protect against targeted attack emails even during telework without VPN or UTM! ■ Easy to try and implement *For more details, please refer to the PDF document or feel free to contact us.

  • Email/Fax transmission
  • Other security
  • Virus software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software