We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software Product List and Ranking from 42 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. 飛天ジャパン Tokyo//IT/Telecommunications
  2. アンカーテクノロジーズ Tokyo//IT/Telecommunications
  3. ハミングヘッズ 本社 Tokyo//software
  4. 4 日本シノプシス ソフトウェア・インテグリティ・グループ Tokyo//software
  5. 5 東計電算 製造システム営業部 (第一事業所) Kanagawa//IT/Telecommunications

Security software Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. One-Time Password Token "C200" *Free trial version available for loan. 飛天ジャパン
  2. [Information Leakage Countermeasures] Security Platform 'SeP' ハミングヘッズ 本社
  3. IAST『Seeker』 日本シノプシス ソフトウェア・インテグリティ・グループ
  4. Burp Suite アンカーテクノロジーズ
  5. 4 Security software [TSFS] 東計電算 製造システム営業部 (第一事業所)

Security software Product List

76~90 item / All 118 items

Displayed results

BlackBerry Protect for Mobile Devices

Mobile threat defense utilizing AI. It identifies security vulnerabilities and the potential for malicious activities.

The product is an MTD solution that extends the AI-based security of "BlackBerry Protect" to mobile devices. It monitors attacks from mobile malware at the device and application level, expanding protection without the need for additional manpower. Additionally, it identifies security vulnerabilities and the potential for malicious activity by monitoring OS updates, system parameters, device configurations, and system libraries at the application level. 【Features】 ■ Monitors attacks from mobile malware ■ Expands protection without the need for additional manpower ■ Simple end-user registration and activation via QR code ■ Intuitive device health status ■ Simple device security assessment *For more details, please refer to the PDF document or feel free to contact us.

  • Other embedded systems (software and hardware)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Plus Managed Security Services

Specialized analysts monitor the configuration, operation, and status of security devices such as UTM and IPS 24 hours a day, 365 days a year.

■ 24 hours a day, 365 days a year, monitoring customer systems ■ Real-time analysis and reporting of high-risk security events ■ Maintaining the network security level in optimal condition while significantly reducing operational costs

  • Firewall and intrusion prevention
  • Integrated operation management

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Measures Advisory Service

We will help you implement the necessary security measures as a matter of course.

Our company offers an "Advisory Service" where our experienced staff provides advice from your perspective on concerns and consultations related to information security. We will establish an operational framework for measures that do not hinder your core business, and through the implementation of these measures, we will identify further areas for improvement. We will propose plans for the next stage. 【Features】 <Advice on Security Measures and Operations> ■ Questions or issues that arise when planning, implementing, checking, and reviewing information security measures ■ Response to security incidents and incidents ■ Security education and methods for internal dissemination of effectiveness ■ Neutral advice rather than support tied to the introduction of specific products ■ Provision of information regarding cybersecurity measures, etc. *For more details, please download the PDF or feel free to contact us.

  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Decarbonization: Risk Analysis of CO2 Leakage

Important for evaluating safety! Analysis of the risk of CO2 leakage to the ground.

The risk analysis of CO2 leakage to the surface after CO2 injection and upon completion of injection is important for evaluating safety. It is necessary to examine the presence of faults and abandoned wells, as well as the appropriate injection pressure, and to conduct simulations that consider the impact not only on the reservoir but also on the cap rock. By coupling rock mechanics models with reservoir simulators, it is possible to perform calculations that take into account the effects of pressure changes on the geomechanical properties of the reservoir. For example, in GEM, a modified Barton-Bandis model is applied to simulate the opening and closing of fractures and to calculate CO2 leakage from the cap rock. Our company primarily focuses on calculations using the reservoir simulator GEM and literature research to investigate and examine the following items: [Investigation and Examination Items] ■ Examination of the workflow for creating simulation input data from experimental, analytical, and literature data ■ Examination of the workflow for CO2 leakage risk analysis that reflects the uncertainty analysis of input data ■ Investigation of the workflow for CO2 leakage calculations in various reservoir simulators *For more details, please feel free to contact us.

  • Other contract services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

One-stop solution for the EU Cyber Resilience Act

We provide a support system that covers all aspects of technology, tools, and certification for companies that are unsure where to start with CRA compliance!

Introducing a one-stop solution provided by IT Access for companies struggling to comply with the EU Cyber Resilience Act (CRA). Engineers with 15 to 30 years of experience assist companies that lack understanding of the CRA or find it difficult to determine compliance standards, supporting them from organizing security requirements to modifications and obtaining certifications. We also support the provision and implementation of necessary tools such as wolfSSL's "wolfBoot" and "wolfCrypt," as well as Onward Security's "SecDevice" and "SecSAM." Furthermore, we provide comprehensive support from evaluation in our testing lab to application to the certification body DEKRA. We offer comprehensive assistance for CRA compliance.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security risk analysis service

The risk analysis results are clearer with our original four-level evaluation method!

Our risk analysis support flexibly assists clients who wish to conduct their own analyses. By performing an analysis, it becomes possible to make efficient security investments. Additionally, the standard analysis methods published by the Information-Technology Promotion Agency (IPA) come with a guidebook that is 380 pages long, making it suitable for those who want to get started quickly. 【Features】 ■ Fully compliant with IPA's "Security Risk Analysis Guide for Control Systems" ■ Utilizes our developed risk analysis tools to minimize costs to the extreme ■ Achieves highly effective security risk assessments *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

English version security risk analysis seminar video

It will serve as a powerful tool for the initial management of cybersecurity for overseas bases and business partners of the company.

This is an English version of the learning video content for asset-based risk analysis and business impact-based risk analysis, in accordance with the "Security Risk Analysis Guide for Control Systems, 2nd Edition" provided by the Information-technology Promotion Agency (IPA). Recently, there has been a significant increase in cyberattacks from overseas bases and branches. To enhance the security measures of such locations, please make use of this content. The online version of the guide is available, and the text in the image is explained in Japanese while adhering to the English (IPA Pocket Guide) standards.

  • Company:INJANET
  • Price:10,000 yen-100,000 yen
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Risk Analysis Tool Pro (English Version)

An English version of the tool based on IPA's "Security Risk Analysis of Control Systems" for strengthening cybersecurity at overseas bases and business partners.

For customers who believe that while strengthening the security of the headquarters, it is difficult to secure the security of overseas locations. This tool can automatically generate English versions of the two types of risk analysis sheets provided in the IPA's "Guidelines for Security Risk Analysis of Control Systems, 2nd Edition": the asset-based risk analysis sheet and the business impact-based risk analysis sheet. By using it alongside the English version and the security risk analysis seminar video, you can enhance cybersecurity overseas.

  • Company:INJANET
  • Price:10,000 yen-100,000 yen
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Risk Analysis Tool Pro

To customers who cannot avoid the labor of security risk analysis: We can significantly reduce the effort required for the tedious task of creating security risk analysis reports through automation.

The analysis method complies with the "Security Risk Analysis Guide for Control Systems" published by the IPA (Information-technology Promotion Agency) and can achieve up to 90% efficiency improvement. It automatically generates asset-based risk analysis sheets and business impact-based risk analysis sheets used in the above guide. By inputting the assets to be analyzed, their characteristics, connection information, and data flow, it automatically determines dangerous attack trees.

  • Company:INJANET
  • Price:10,000 yen-100,000 yen
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Genetec Product Catalog

Listing software applications, hardware, and appliances!

This catalog introduces products from Genetec, which specializes in the field of security solutions. It features a lineup including "Genetec Security Center," which allows for smarter responses with a unified security view, as well as "Security Center Omnicast," "Streamvault," and "Synergis hardware." Industry-specific solutions are also included, so please take a moment to read through it. 【Contents】 ■About Genetec ■Products and Services ■Industry-Specific Solutions *For more details, please refer to the PDF document or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

ScreenChaser

"ScreenChaser" - Preventing information leakage from PC display photography.

As a business owner or security officer implementing telework, can you manage unauthorized camera captures of displays showing confidential information? ScreenChaser can prevent unauthorized captures by projecting a watermark. ScreenChaser can control the display of watermarks on PCs used by employees working from home.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Smart Card Authentication "Ilton Basic"

No annual contract required! A must-have product for companies with a privacy mark!

The one-time purchase version of "Iltone Basic" automatically locks the screen when you step away from the computer and automatically logs you in when you approach. This product is essential for companies that have obtained the Privacy Mark. *There are no renewal procedures for contracts, unlike the conventional "Smart Card Authentication 'Iltone' License Version"; it is offered as a one-time purchase model. **Features** ■ Automatic lock ■ Focused on login ■ Easy setup, available for immediate use ■ No annual contract obligations ■ One-time purchase model *For more details, please refer to the PDF materials or feel free to contact us. *There are no renewal procedures for contracts, unlike the conventional "Smart Card Authentication 'Iltone' License Version"; it is offered as a one-time purchase model. However, there are differences in the features available. Please consult your representative for more details.

  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cloud "JCS Cyber Protect Cloud"

Add "advanced malware protection features" and "remote device management capabilities" to the backup!

"JCS Cyber Protect Cloud" detects and blocks ransomware/malware, including SNAKE (EKANS), which has affected many companies. With a proven track record of providing security features for three years, it robustly protects IT assets from the threats of cyber attacks. 【Benefits of Implementation】 ■ Affordable and easy to start with a subscription ■ Enables rapid recovery and business continuity ■ Endpoint protection through remote management ■ Always utilizes advanced services *For more details, please download the PDF or contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[BOARD Implementation Case] Estelle Holdings Co., Ltd.

Revamping "Business Intelligence that can't be used on-site"! A sense of security that anyone can achieve the intended analysis results.

We would like to introduce a case study of the implementation of "BOARD" at Estelle Holdings Co., Ltd. The company faced issues as the BI tool they were using reached its end of support, and in addition, the on-premise server that the BI tool operated on became outdated and could not support the latest OS. The deciding factor for adopting our product was the "peace of mind that comes from knowing that anyone can achieve the intended analytical results." [Case Overview (Partial)] ■Challenges - Inability to support the latest OS - Performance issues when processing is concentrated - Variability in results depending on the user *For more details, please refer to the PDF document or feel free to contact us.

  • Other information systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Managed Security Services

24/7 real-time monitoring! Rapid reporting in case of detected alerts with potential dangers.

"Managed Security Services" is a service that can be recommended even to customers who are already conducting security operations. Through an integrated security management and monitoring system, we centrally manage your security devices. Our security analysts will manage and monitor on your behalf 24 hours a day, 365 days a year. In addition to light, standard, and premium services, we also offer optional services such as reports other than monthly ones. 【Features】 ■ Integration of customer logs with the server ■ Isolation of alerts with potential risks ■ Remote blocking in case of confirmed effective attacks (optional) ■ Provision of various security threat information through collaboration with the Knowledge Center ■ Submission of monthly monitoring results in report format *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security
  • Integrated operation management

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software