We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software Product List and Ranking from 42 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. 飛天ジャパン Tokyo//IT/Telecommunications
  2. アンカーテクノロジーズ Tokyo//IT/Telecommunications
  3. ハミングヘッズ 本社 Tokyo//software
  4. 4 日本シノプシス ソフトウェア・インテグリティ・グループ Tokyo//software
  5. 5 東計電算 製造システム営業部 (第一事業所) Kanagawa//IT/Telecommunications

Security software Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. One-Time Password Token "C200" *Free trial version available for loan. 飛天ジャパン
  2. [Information Leakage Countermeasures] Security Platform 'SeP' ハミングヘッズ 本社
  3. IAST『Seeker』 日本シノプシス ソフトウェア・インテグリティ・グループ
  4. Burp Suite アンカーテクノロジーズ
  5. 4 Security software [TSFS] 東計電算 製造システム営業部 (第一事業所)

Security software Product List

61~75 item / All 119 items

Displayed results

File Security "FinalCode"

"FinalCode" protects all files handled in business without being aware of them.

"FinalCode" automatically protects files from the moment they are created. Only the individuals or groups specified by the file creator via email address can view the files, and access and operation histories can be checked in real-time, with the ability to change permissions even after the files have been shared.

  • Document and Data Management

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Explained in Manga] Understandable by Reading! How to Protect Your Company's Device Integration App

Introducing the security solution product "CrackProof" that protects apps from unauthorized attacks in a manga format!

Recently, collaboration between apps and devices has been advancing in various fields. While there are many benefits, such as increased convenience for users, there are also security risks associated with distributing apps that connect to proprietary devices, such as the sale of tampered apps and the analysis of proprietary technology from the apps. This document explains the necessary security measures for apps that connect to proprietary devices in an easy-to-understand manga format. Please download and take a look. 【Recommended for】 ■ Those considering developing apps that connect proprietary devices with smartphones or PCs ■ Those considering measures to prevent the leakage of proprietary technology from apps that operate proprietary devices ■ Those considering developing apps for operating and maintaining proprietary devices ■ Those who want to prevent unauthorized changes to the settings of proprietary devices through apps *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

App Protection/CrackProof for Android SO

Before Android apps are affected, various protective features are added to prevent attacks and strengthen security!

**[Hardening Method]** Simply upload the completed Android app (AAB/APK) that includes the native shared library (SO file) you want to protect to the CrackProof cloud, and the hardening process for the SO file and the Android app containing it will be completed. **[Additional Protection Features]** - **Enhanced Resistance to Static Analysis and Tampering** - Prevents static analysis targeting the SO file using features like AES encryption. - Prevents static tampering targeting the app itself using features like signature checks. - **Enhanced Resistance to Dynamic Analysis and Tampering** - Prevents analysis targeting the app's behavior using features like debugger prevention. - Prevents tampering targeting the app's behavior using features like SO file tampering prevention. - **Enhanced Resistance to Execution in Unauthorized Environments** - Prevents app execution on rooted devices or emulators. Customers interested in CrackProof are encouraged to contact DNP Hypertech through the inquiry form for consultation. We will propose the most suitable usage method for you.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

App Protection/CrackProof for iOS

Before iOS apps are affected, various protective features are added to prevent attacks and strengthen security!

**[Hardening Method]** Simply link the CrackProof for iOS library to your project in Xcode and upload it to the CrackProof cloud to complete the hardening process. **[Additional Protection Features]** - **Enhanced Static Tampering Resistance** - Prevents static tampering actions targeting the app itself with features such as signature tampering detection. - **Enhanced Dynamic Analysis and Tampering Resistance** - Prevents analysis actions targeting the app's behavior with features such as debugger detection and JailBreak detection. - Prevents tampering actions targeting the app's behavior with features such as JailBreak detection. - **Enhanced Execution Resistance in Unauthorized Environments** - Prevents app execution on JailBroken devices. Customers interested in CrackProof are encouraged to contact DNP Hypertech through the inquiry form for consultation. We will propose the optimal usage method for you.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

CrackProof Implementation Case: Metaverse Platform Operation

[Case Study] Understand the Security Measures for Metaverse (VR) Apps!

In recent years, the "metaverse" has gained attention across various industries. While its expansion is broad across all fields, there are also various security risks that must be considered by those operating the platforms. *Our company's column also explains the security of the metaverse↓ "Security Considerations When Utilizing the Metaverse for Business" https://www.hypertech.co.jp/column/marketing/2023/03/metaverse-security/ In this document, we have invited Company A, which operates a metaverse (VR) platform and has chosen CrackProof for their app's security measures, to discuss how CrackProof has addressed their security challenges. 【Recommended for】 - Those planning to develop apps for the metaverse (VR) platform - Those currently developing or operating metaverse (VR) apps and considering security measures - Those who want to know the benefits of choosing CrackProof as a security measure for metaverse (VR) apps

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Mega Padlock

To prevent theft, tampering, unauthorized use, and contamination by foreign substances.

The "Mega Padlock" is a padlock-type sealing device that is ideal for sealing pharmaceuticals and valuables. ■ Printing: Company name, logo, designated number (optional: barcode) Due to laser printing, it is impossible to alter or erase the printed content! ■ 6 colors: Orange, white, yellow, blue, pink, green By using different colors for the body, it is possible to improve logistics management efficiency! ■ Opening method: Equipped with pre-break points with cuts, it can be easily removed by hand.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information Leakage Countermeasures] Security Platform 'SeP'

Monitoring, controlling, and recording operations with strong comprehensiveness! A purely domestic security software that can handle all aspects with a single solution. *Case study introduction.

"SeP" is a security software designed to protect companies from information leaks and fraud through various channels. It is equipped with four features: automatic encryption, defense capabilities, write restrictions, and history functions. We also offer a variety of options, such as the "Tracer Option," which decrypts operation history collected on the server and outputs it in CSV format, and the "Intranet Option." 【Features】 ■ One solution for all scenarios ■ Security that operates automatically without changing internal rules ■ Strong comprehensiveness for monitoring, controlling, and recording business activities ■ Equipped with four functions, including automatic encryption and defense capabilities *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

One-Time Password Token "C200" *Free trial version available for loan.

Compliant with OATH's TOTP (Time-based One-time Password Algorithm)!

The "C200" is a one-time password token that generates a one-time password at regular intervals, enabling two-factor authentication during login. The display of battery remaining allows for risk hedging against battery depletion in advance, such as by facilitating replacements or stock management. 【Our OTP Features】 ■ High security ■ High convenience ■ Low cost ■ Usable for a wide range of applications ■ Customizable design ★ Please apply for a free trial version through the "Contact Us" section ★ *For more details, please download the PDF or feel free to contact us.*

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information leakage prevention security software "Discovery"

Prevent information leakage from smartphone and tablet terminals!

The information leakage prevention software "Hakken-den" monitors output to external storage media such as USB memory, CDs, DVDs, and printers, as well as attached emails, to prevent information leakage by deterring the unauthorized transfer of information outside the organization. It monitors user file operations and printer outputs, storing operation history data. By managing who accessed and printed which files and when, it helps detect unauthorized access and deter the unauthorized transfer of files, thereby improving information security. Please utilize it as a DLP (Data Loss Prevention) tool. 【Features】 ■ Restrictions on the use of USB storage ■ File encryption ■ Writing to USB storage is prohibited ■ Centralized management of operation logs and unauthorized alerts *For more details, please download the PDF or feel free to contact us.

  • Server monitoring and network management tools
  • Other operation management software
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email Misdelivery Prevention Service "Filter"

Prevent "Oops! I made a mistake!" Automatically prevent email sending errors and avoid information leaks!

The @Securemail Plus Filter is a solution that prevents accidental email sending and information leakage through intentional emails (DLP). It broadly supports features such as temporary email holding and converting attachments to web downloads (eliminating PPAP). 【Features】 ■ Prevents accidental sending through temporary email holding and supervisor approval! ■ Can block web downloads and forwarding of attachments! ■ Can be used in conjunction with existing email environments like Microsoft 365. ■ Easy to try out and implement. *For more details, please refer to the PDF materials or feel free to contact us.

  • Email/Fax transmission
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Targeted Attack Email Countermeasure Service "TAP"

Protect against targeted attack emails that trick you into opening suspicious attachments and URLs!

@Securemail Plus TAP is a SaaS-based email security service that utilizes the targeted attack response engine from Proofpoint, a company with extensive experience in email security products. It verifies suspicious attachments and URLs within emails, such as those containing ransomware like Emotet and IcedID, in a sandbox environment. By validating the risks in the sandbox before they reach the customer, it protects your valuable information from targeted attack emails. 【Features】 ■ Protect against attacks that try to get you to open suspicious email attachments! ■ Protect against attacks that try to get you to click on URLs within emails! ■ Protect against targeted attack emails even during telework without VPN or UTM! ■ Easy to try and implement *For more details, please refer to the PDF document or feel free to contact us.

  • Email/Fax transmission
  • Other security
  • Virus software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study Collection] Information Leakage Prevention System Total Security Fort

Control, recording, monitoring, approval. Introducing all-in-one internal information security measures.

This document summarizes case studies of the implementation of the information leakage prevention system "Total Security Fort." It details the background and circumstances of the implementation, as well as the effects after implementation and future prospects, covering the cases of a total of eight companies. Please use this information for your consideration of product implementation. [Featured Case Studies (Partial)] ■ NTT Data Corporation ■ Yokote City Hall, Akita Prefecture ■ Meiden System Technology Co., Ltd. ■ Veriserv Inc. ■ SII Data Service Co., Ltd. and others *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

BlackBerry Desktop

Enables secure remote connections from Windows 10 or macOS devices.

"BlackBerry Desktop" is a product that enables users to securely access email, company websites, servers, content, and files on Windows 10 and macOS devices that are not managed by the user personally or by the company. It can simplify the organization's BYOC program and improve productivity not only for traditional employees but also for non-traditional employees. Additionally, it helps your company save costs related to hardware, software, provisioning, and help desk services. 【Features】 ■ Maximizes productivity ■ Reduces costs ■ Securely operate from any device at any time ■ Use the same functionalities as computers owned or managed by the company ■ Users can freely collaborate using business-specific features *For more details, please refer to the PDF materials or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

BlackBerry Protect for Mobile Devices

Mobile threat defense utilizing AI. It identifies security vulnerabilities and the potential for malicious activities.

The product is an MTD solution that extends the AI-based security of "BlackBerry Protect" to mobile devices. It monitors attacks from mobile malware at the device and application level, expanding protection without the need for additional manpower. Additionally, it identifies security vulnerabilities and the potential for malicious activity by monitoring OS updates, system parameters, device configurations, and system libraries at the application level. 【Features】 ■ Monitors attacks from mobile malware ■ Expands protection without the need for additional manpower ■ Simple end-user registration and activation via QR code ■ Intuitive device health status ■ Simple device security assessment *For more details, please refer to the PDF document or feel free to contact us.

  • Other embedded systems (software and hardware)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software