We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software Product List and Ranking from 64 Manufacturers, Suppliers and Companies | IPROS GMS

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

  1. ハミングヘッズ 本社 Tokyo//software
  2. 飛天ジャパン Tokyo//IT/Telecommunications
  3. アンカーテクノロジーズ Tokyo//IT/Telecommunications
  4. 4 日本ファインアート Tokyo//IT/Telecommunications
  5. 5 Spelldata Tokyo//Information and Communications

Security software Product ranking

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

  1. [Information Leakage Countermeasures] Security Platform 'SeP' ハミングヘッズ 本社
  2. One-Time Password Token "C200" *Free trial version available for loan. 飛天ジャパン
  3. VirusTotal Enterprise アンカーテクノロジーズ
  4. 4 [Case Study Collection] Information Leakage Prevention System Total Security Fort 日本ファインアート
  5. 5 Burp Suite アンカーテクノロジーズ

Security software Product List

121~128 item / All 128 items

Displayed results

Risk Assessment Service

It is possible to understand situations deemed vulnerable and analyze the business impact of identified risks.

The "Risk Assessment Service" involves reviewing your environment and information assets to visualize, identify, and evaluate security risks, and propose countermeasures. We conduct confirmations through interviews and checklists, and create a confirmation result report for visualization. This allows us to understand situations deemed vulnerable and analyze the business impact of identified risks. 【Features】 ■ Confirmation methods: Interviews / Checklists / Review of documents such as regulations, procedures, and design documents / Business confirmations ■ Visualization: Creation of confirmation result reports ■ Identification: Understanding of situations deemed vulnerable ■ Evaluation: Analysis of the business impact of identified risks *For more details, please refer to the related link page or feel free to contact us.

  • Other security
  • Other services
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Sophos Intercept X

Prevent security breaches, ransomware, and data leaks!

"Sophos Intercept X" provides unparalleled protection against advanced attacks. By adopting a wide range of advanced technologies, it prevents extensive threats before they impact the system. With powerful EDR and XDR tools, organizations can track, investigate, and respond to suspicious activities and signs of attacks. [Key Features] ■ Utilizes deep learning AI to block unknown threats ■ Blocks ransomware and safely rolls back affected files ■ Prevents exploit techniques and malicious activities used throughout the attack chain *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Useful Information: Self-Service BI

Introducing the features of self-service and the benefits of implementation!

A Thorough Explanation of the Differences from Traditional BI Tools! In recent years, data has become the core of business, and data-driven decision-making is essential for companies to succeed. Business Intelligence (BI) tools are important tools for collecting and analyzing data to provide insights, but among them, self-service BI has been gaining attention recently. This article will explain in detail the differences between self-service BI and traditional BI tools, and introduce the features of self-service BI along with the benefits of its implementation. *For more detailed content, please refer to the related links. Feel free to contact us for more information.*

  • Business Intelligence and Data Analysis
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Explanation of Invoices and Revised Electronic Bookkeeping Law] Accidents and Troubles That May Occur in the Manufacturing Industry

Have you been receiving suspicious emails lately? Fake invoices from impersonation emails created by tools like ChatGPT are being sent to your company.

The invoice system will begin on October 1, 2023. Additionally, the revised Electronic Bookkeeping Act will become mandatory starting January 1, 2024. As a result, the entire industry has started to send invoices electronically. This raises the issue of "spoofing emails (phishing emails)." With the advent of generative AI like ChatGPT, it has become possible to create emails in natural-sounding Japanese, leading to an increase in cases where cybercriminals send sophisticated "fake invoices." If a fake email impersonating your company reaches your business partners or customers, the following problems may arise: - Personal information of employees or customers may be leaked, leading to lawsuits. - Important corporate secrets may be stolen and resold, causing your company to lose competitive advantage. - Company funds may be siphoned off. - Business partners may become infected with viruses through your company, resulting in huge compensation costs. (According to Article 709 of the Civil Code, your company may be deemed to have "not taken necessary measures" against spoofing emails and could bear liability for damages.) We have prepared a document that explains this situation in more detail and outlines potential solutions. Please download it and use it to ensure safe operations!

  • Company:Spelldata
  • Price:100,000 yen-500,000 yen
  • Email/Fax transmission
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What phishing emails target

Reselling of trade secrets and personal information of customers. Various things are being targeted.

The targets of phishing emails are diverse. They include "reading credit card information for fraudulent use," "withdrawing large amounts of cash from bank accounts," and "stopping systems to demand money." Additionally, there are "terrorism aimed at disrupting factories and infrastructure." 【Targets (partial)】 ■ Reselling corporate secrets ■ Reselling customer personal information ■ Sending phishing emails impersonating business partners *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Workplace Risk Assessment Service

We provide risk assessments that contribute to the prevention of occupational diseases!

Our company provides appropriate risk assessments for the workplace using personal exposure and biological monitoring. To prevent occupational diseases, it is important to conduct comprehensive measurements that utilize the characteristics of three types of assessments: workplace environmental measurements, personal exposure monitoring, and biological monitoring (such as measuring urinary metabolites). This enables appropriate risk assessments in workplaces handling hazardous substances. 【Service Menu】 ■ Personal Exposure Monitoring: Measurement of external exposure levels ⇒ Non-routine work, irregular work, work inside equipment during troubles, outdoor work, etc. ■ Biological Monitoring: Measurement of internal exposure levels ⇒ Confirmation of the effectiveness of protective equipment, evaluation of skin absorption, substantiation of the effects of the substance in question ■ Workplace Environmental Measurements: Measurement of concentrations in the ambient air *For more details, please download the PDF or feel free to contact us.

  • Contract measurement
  • Other services
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Securely share seminar videos and important documents! PDF security software.

Securely sharing important information, PDF security solutions [Held on April 23, 2025]

We would like to introduce the archived videos of seminars we have held in the past. *The video link for this seminar is included on the cover of the PDF materials. Please download the PDF materials and be sure to take a look. 【Seminar Overview】 As the advancement of digitalization increases file sharing, do you have concerns about "wanting to share information but feeling uneasy about file sharing"? In this seminar, we will demonstrate "PsafeVIEW," a solution that allows safe sharing of important information via a web system without allowing downloads, along with case studies of its implementation. This is a proven solution that has been widely adopted for sharing design documents by major manufacturing companies. If you are struggling with secure file viewing and sharing methods or are considering security proposals for your clients, please be sure to watch.

  • Document and Data Management
  • Other services
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software