We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software Product List and Ranking from 64 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Nov 05, 2025~Dec 02, 2025
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Nov 05, 2025~Dec 02, 2025
This ranking is based on the number of page views on our site.

  1. 飛天ジャパン Tokyo//IT/Telecommunications
  2. アンカーテクノロジーズ Tokyo//IT/Telecommunications
  3. 日本シノプシス ソフトウェア・インテグリティ・グループ Tokyo//software
  4. 4 ハミングヘッズ 本社 Tokyo//software
  5. 4 ケイティケイソリューションズ Aichi//IT/Telecommunications

Security software Product ranking

Last Updated: Aggregation Period:Nov 05, 2025~Dec 02, 2025
This ranking is based on the number of page views on our site.

  1. OTP token "c610" *Free trial version available for loan. 飛天ジャパン
  2. VirusTotal Enterprise アンカーテクノロジーズ
  3. One-Time Password Token "C200" *Free trial version available for loan. 飛天ジャパン
  4. Burp Suite アンカーテクノロジーズ
  5. 4 [Information Leakage Countermeasures] Security Platform 'SeP' ハミングヘッズ 本社

Security software Product List

76~90 item / All 123 items

Displayed results

[Case Study Collection] Information Leakage Prevention System Total Security Fort

Control, recording, monitoring, approval. Introducing all-in-one internal information security measures.

This document summarizes case studies of the implementation of the information leakage prevention system "Total Security Fort." It details the background and circumstances of the implementation, as well as the effects after implementation and future prospects, covering the cases of a total of eight companies. Please use this information for your consideration of product implementation. [Featured Case Studies (Partial)] ■ NTT Data Corporation ■ Yokote City Hall, Akita Prefecture ■ Meiden System Technology Co., Ltd. ■ Veriserv Inc. ■ SII Data Service Co., Ltd. and others *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

BlackBerry Desktop

Enables secure remote connections from Windows 10 or macOS devices.

"BlackBerry Desktop" is a product that enables users to securely access email, company websites, servers, content, and files on Windows 10 and macOS devices that are not managed by the user personally or by the company. It can simplify the organization's BYOC program and improve productivity not only for traditional employees but also for non-traditional employees. Additionally, it helps your company save costs related to hardware, software, provisioning, and help desk services. 【Features】 ■ Maximizes productivity ■ Reduces costs ■ Securely operate from any device at any time ■ Use the same functionalities as computers owned or managed by the company ■ Users can freely collaborate using business-specific features *For more details, please refer to the PDF materials or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

BlackBerry Protect for Mobile Devices

Mobile threat defense utilizing AI. It identifies security vulnerabilities and the potential for malicious activities.

The product is an MTD solution that extends the AI-based security of "BlackBerry Protect" to mobile devices. It monitors attacks from mobile malware at the device and application level, expanding protection without the need for additional manpower. Additionally, it identifies security vulnerabilities and the potential for malicious activity by monitoring OS updates, system parameters, device configurations, and system libraries at the application level. 【Features】 ■ Monitors attacks from mobile malware ■ Expands protection without the need for additional manpower ■ Simple end-user registration and activation via QR code ■ Intuitive device health status ■ Simple device security assessment *For more details, please refer to the PDF document or feel free to contact us.

  • Other embedded systems (software and hardware)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Plus Managed Security Services

Specialized analysts monitor the configuration, operation, and status of security devices such as UTM and IPS 24 hours a day, 365 days a year.

■ 24 hours a day, 365 days a year, monitoring customer systems ■ Real-time analysis and reporting of high-risk security events ■ Maintaining the network security level in optimal condition while significantly reducing operational costs

  • Firewall and intrusion prevention
  • Integrated operation management

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

SecureLayer Browser Extension

Enhance security simply by adding it as an extension to your familiar browser!

You can easily enhance your security measures by simply adding it as an extension to your Chrome or Edge browser. 〇 Prevent malware infections from accessing malicious sites It analyzes sites and disconnects unauthorized sessions. Additionally, it keeps the browser secure by disabling risky browser extensions and performing version checks. 〇 Understanding rogue SaaS (visualization of SaaS) It monitors the SaaS being used by employees and identifies the use of unauthorized SaaS within the company. It can also prohibit access to SaaS applications and cloud storage that pose security concerns. 〇 Prevent user actions that violate policies (leakage of confidential information) It blocks actions such as attaching files to cloud storage or free email services, and pasting confidential or personal information into ChatGPT or translation sites, thereby preventing the leakage of confidential data to external sources. 〇 Provide a safe browsing environment It offers a safe browsing environment without compromising user experience. Moreover, it can be implemented easily and cost-effectively compared to technologies like VDI, which require changes to the overall network design.

  • Other information systems
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Measures Advisory Service

We will help you implement the necessary security measures as a matter of course.

Our company offers an "Advisory Service" where our experienced staff provides advice from your perspective on concerns and consultations related to information security. We will establish an operational framework for measures that do not hinder your core business, and through the implementation of these measures, we will identify further areas for improvement. We will propose plans for the next stage. 【Features】 <Advice on Security Measures and Operations> ■ Questions or issues that arise when planning, implementing, checking, and reviewing information security measures ■ Response to security incidents and incidents ■ Security education and methods for internal dissemination of effectiveness ■ Neutral advice rather than support tied to the introduction of specific products ■ Provision of information regarding cybersecurity measures, etc. *For more details, please download the PDF or feel free to contact us.

  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Decarbonization: Risk Analysis of CO2 Leakage

Important for evaluating safety! Analysis of the risk of CO2 leakage to the ground.

The risk analysis of CO2 leakage to the surface after CO2 injection and upon completion of injection is important for evaluating safety. It is necessary to examine the presence of faults and abandoned wells, as well as the appropriate injection pressure, and to conduct simulations that consider the impact not only on the reservoir but also on the cap rock. By coupling rock mechanics models with reservoir simulators, it is possible to perform calculations that take into account the effects of pressure changes on the geomechanical properties of the reservoir. For example, in GEM, a modified Barton-Bandis model is applied to simulate the opening and closing of fractures and to calculate CO2 leakage from the cap rock. Our company primarily focuses on calculations using the reservoir simulator GEM and literature research to investigate and examine the following items: [Investigation and Examination Items] ■ Examination of the workflow for creating simulation input data from experimental, analytical, and literature data ■ Examination of the workflow for CO2 leakage risk analysis that reflects the uncertainty analysis of input data ■ Investigation of the workflow for CO2 leakage calculations in various reservoir simulators *For more details, please feel free to contact us.

  • Other contract services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

One-stop solution for the EU Cyber Resilience Act

We provide a support system that covers all aspects of technology, tools, and certification for companies that are unsure where to start with CRA compliance!

Introducing a one-stop solution provided by IT Access for companies struggling to comply with the EU Cyber Resilience Act (CRA). Engineers with 15 to 30 years of experience assist companies that lack understanding of the CRA or find it difficult to determine compliance standards, supporting them from organizing security requirements to modifications and obtaining certifications. We also support the provision and implementation of necessary tools such as wolfSSL's "wolfBoot" and "wolfCrypt," as well as Onward Security's "SecDevice" and "SecSAM." Furthermore, we provide comprehensive support from evaluation in our testing lab to application to the certification body DEKRA. We offer comprehensive assistance for CRA compliance.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security risk analysis service

The risk analysis results are clearer with our original four-level evaluation method!

Our risk analysis support flexibly assists clients who wish to conduct their own analyses. By performing an analysis, it becomes possible to make efficient security investments. Additionally, the standard analysis methods published by the Information-Technology Promotion Agency (IPA) come with a guidebook that is 380 pages long, making it suitable for those who want to get started quickly. 【Features】 ■ Fully compliant with IPA's "Security Risk Analysis Guide for Control Systems" ■ Utilizes our developed risk analysis tools to minimize costs to the extreme ■ Achieves highly effective security risk assessments *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

English version security risk analysis seminar video

It will serve as a powerful tool for the initial management of cybersecurity for overseas bases and business partners of the company.

This is an English version of the learning video content for asset-based risk analysis and business impact-based risk analysis, in accordance with the "Security Risk Analysis Guide for Control Systems, 2nd Edition" provided by the Information-technology Promotion Agency (IPA). Recently, there has been a significant increase in cyberattacks from overseas bases and branches. To enhance the security measures of such locations, please make use of this content. The online version of the guide is available, and the text in the image is explained in Japanese while adhering to the English (IPA Pocket Guide) standards.

  • Company:INJANET
  • Price:10,000 yen-100,000 yen
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Risk Analysis Tool Pro (English Version)

An English version of the tool based on IPA's "Security Risk Analysis of Control Systems" for strengthening cybersecurity at overseas bases and business partners.

For customers who believe that while strengthening the security of the headquarters, it is difficult to secure the security of overseas locations. This tool can automatically generate English versions of the two types of risk analysis sheets provided in the IPA's "Guidelines for Security Risk Analysis of Control Systems, 2nd Edition": the asset-based risk analysis sheet and the business impact-based risk analysis sheet. By using it alongside the English version and the security risk analysis seminar video, you can enhance cybersecurity overseas.

  • Company:INJANET
  • Price:10,000 yen-100,000 yen
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Risk Analysis Tool Pro

To customers who cannot avoid the labor of security risk analysis: We can significantly reduce the effort required for the tedious task of creating security risk analysis reports through automation.

The analysis method complies with the "Security Risk Analysis Guide for Control Systems" published by the IPA (Information-technology Promotion Agency) and can achieve up to 90% efficiency improvement. It automatically generates asset-based risk analysis sheets and business impact-based risk analysis sheets used in the above guide. By inputting the assets to be analyzed, their characteristics, connection information, and data flow, it automatically determines dangerous attack trees.

  • Company:INJANET
  • Price:10,000 yen-100,000 yen
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Genetec Product Catalog

Listing software applications, hardware, and appliances!

This catalog introduces products from Genetec, which specializes in the field of security solutions. It features a lineup including "Genetec Security Center," which allows for smarter responses with a unified security view, as well as "Security Center Omnicast," "Streamvault," and "Synergis hardware." Industry-specific solutions are also included, so please take a moment to read through it. 【Contents】 ■About Genetec ■Products and Services ■Industry-Specific Solutions *For more details, please refer to the PDF document or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

ScreenChaser

"ScreenChaser" - Preventing information leakage from PC display photography.

As a business owner or security officer implementing telework, can you manage unauthorized camera captures of displays showing confidential information? ScreenChaser can prevent unauthorized captures by projecting a watermark. ScreenChaser can control the display of watermarks on PCs used by employees working from home.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Smart Card Authentication "Ilton Basic"

No annual contract required! A must-have product for companies with a privacy mark!

The one-time purchase version of "Iltone Basic" automatically locks the screen when you step away from the computer and automatically logs you in when you approach. This product is essential for companies that have obtained the Privacy Mark. *There are no renewal procedures for contracts, unlike the conventional "Smart Card Authentication 'Iltone' License Version"; it is offered as a one-time purchase model. **Features** ■ Automatic lock ■ Focused on login ■ Easy setup, available for immediate use ■ No annual contract obligations ■ One-time purchase model *For more details, please refer to the PDF materials or feel free to contact us. *There are no renewal procedures for contracts, unlike the conventional "Smart Card Authentication 'Iltone' License Version"; it is offered as a one-time purchase model. However, there are differences in the features available. Please consult your representative for more details.

  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software