We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software Product List and Ranking from 64 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Nov 05, 2025~Dec 02, 2025
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Nov 05, 2025~Dec 02, 2025
This ranking is based on the number of page views on our site.

  1. 飛天ジャパン Tokyo//IT/Telecommunications
  2. アンカーテクノロジーズ Tokyo//IT/Telecommunications
  3. 日本シノプシス ソフトウェア・インテグリティ・グループ Tokyo//software
  4. 4 ハミングヘッズ 本社 Tokyo//software
  5. 4 ケイティケイソリューションズ Aichi//IT/Telecommunications

Security software Product ranking

Last Updated: Aggregation Period:Nov 05, 2025~Dec 02, 2025
This ranking is based on the number of page views on our site.

  1. OTP token "c610" *Free trial version available for loan. 飛天ジャパン
  2. VirusTotal Enterprise アンカーテクノロジーズ
  3. One-Time Password Token "C200" *Free trial version available for loan. 飛天ジャパン
  4. Burp Suite アンカーテクノロジーズ
  5. 4 [Information Leakage Countermeasures] Security Platform 'SeP' ハミングヘッズ 本社

Security software Product List

106~120 item / All 123 items

Displayed results

There is no dedicated person in charge; unable to find security personnel.

Experts will take on the minimum necessary security! We are starting a shared security service.

Due to the company's situation, it can be difficult to establish a dedicated security officer and maintain skills, as this is a different field from our main business. Additionally, the reality is that there is still a shortage of security personnel in response to demand. On the other hand, due to work style reforms and the spread of COVID-19, many companies have adopted remote work, such as working from home. Furthermore, many companies have implemented systems that allow side jobs, enabling corporate security professionals to seek new opportunities for engagement. In light of the aforementioned situation, our company will start a service to provide security skill sharing to companies that do not have a dedicated security officer. *For more details, please refer to the related link page or feel free to contact us.

  • Other security
  • Other services
  • Temporary staffing business

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

"DX Diagnosis" that enables systems and tools that are not currently usable to become usable.

Are there any systems or tools that you are not currently using? A must-see for those who have implemented them but are not having success!

A scene from the production management department about a year after implementing the system. Production Management Department Head A: "We implemented the production scheduler, but we're not using it effectively. We haven't managed to organize the master data well, and we're still managing many parts with Excel." Production Management Department B: "That's right. We chose the current scheduler after considering various options, but we haven't been able to properly organize the master data or obtain the data needed to manage the scheduler." Production Management Department Head A: "The management is asking whether we are seeing a cost-benefit effect and to report on our results, but the reality is that we aren't seeing visible outcomes... What should we do?" Despite implementing systems and tools, we are not able to use them effectively. Are you facing similar concerns as you advance your digital transformation (DX)? In such cases, why not seek a second opinion with Astec Consulting's "DX Diagnosis"?

  • Process Control System
  • Production Management System
  • Other production management systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Mobile App Diagnostic Service

Diagnostic service compatible with mobile application packages for iOS and Android!

The "Mobile App Diagnosis Service" is a diagnostic service that performs rapid diagnosis and analysis on frequently updated mobile applications without affecting the server side, using a uniquely developed AI tool. By utilizing this service, you can conduct a security diagnosis of the mobile application itself in as little as one day. 【Features】 ■ Supports mobile application packages for iOS and Android ■ Comprehensive diagnosis including the server side through local diagnosis of the mobile app alone or API diagnosis options ■ Complies with OWASP Mobile Security Testing Guide, OSSTMM, and NIST SP800-115/163 - Covers the entire range of OWASP Top 10 Mobile Risks along with the API diagnosis option ■ Achieves rapid and short-term diagnosis in as little as one day using RayAegis's uniquely developed AI tool, among other features *For more details, please download the PDF or contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Measures against phishing emails are recommended.

Introducing the recommended measures announced by the Cabinet Office and the National Police Agency!

Measures against spoofing emails are recommended. The Cabinet Office promotes the introduction of "Sender Domain Authentication Technologies (SPF, DKIM, and DMARC)" and the National Police Agency recommends "Current Status of Phishing and Measures to Prevent Damage, and Measures Against Spoofing Emails (DMARC) for Businesses." For more details, please read the catalog. 【Recommended Content (Partial)】 ■ Cabinet Office: Promotion of the introduction of Sender Domain Authentication Technologies (SPF, DKIM, and DMARC) ■ National Police Agency ・Current status of phishing and measures to prevent damage ・Recommendation of measures against spoofing emails (DMARC) for businesses ■ Ministry of Health, Labour and Welfare: Recommendation of DMARC by ISACs (Information Sharing Organizations) in various industries *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introduction to SentinelOne products

Not only large corporations but also small businesses can implement it! It excels in automated operations using AI technology!

We would like to introduce "SentinelOne," an AI security solution from Israel that we handle. It enables rapid response through AI operations, allowing for operation even without security personnel, thus not adding to the operational burden. Additionally, since it can be operated automatically, there is no need to outsource operational services, significantly reducing costs. 【Features】 ■ Fast response with AI for safety ■ No hassle ■ Significant cost savings ■ Can be implemented from just one PC ■ Zero ransomware incidents since the service began ■ Lightweight agent ensures that computer performance remains smooth and comfortable for work *For more details, please refer to the PDF materials or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[SentinelOne Case Study] Andpad Inc.

The user evaluation regarding detection accuracy is high, and the easy-to-use UX is a major attraction!

At AndPad Inc., a signature-based EPP had been implemented for endpoints used in operations for some time. However, due to the multi-OS environment, the measures were primarily optimized individually for each system, such as Windows and MacOS. As the business expanded and the number of members increased, there was a demand for an environment that could be managed integratively even in a multi-OS setting. As a new endpoint protection mechanism, the company adopted 'SentinelOne,' which combines the functions of both EPP and EDR, as part of its security enhancement strategy. To quickly escape the risks of the existing environment, they began deployment just four months after starting the consideration phase, following a PoC. Currently, agents have been installed on hundreds of PCs used by all employees, including verification machines for development, and operations are centered around detection. **Challenges Before Implementation** - Operations could only be conducted in an individually optimized manner due to the multi-OS environment. - There was no integrated management, and the visualization of the situation was insufficient. - A signature-based EPP with a low detection rate could not mitigate management risks. *For more details, please refer to the PDF document or feel free to contact us.*

  • Software (middle, driver, security, etc.)
  • Other security
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Market Research Report] Security Software and Appliance Market

"Free samples" are currently being offered! Please check the application method from the [PDF download] button, or apply directly from the related links.

This survey presents the current state of the security software and appliance spending in the Asia-Pacific region (excluding Japan) and a five-year outlook for the security industry. It utilizes IDC's Semiannual Software Tracker (Forecast 2H22), IDC's Quarterly Security Appliance Tracker (Forecast 3Q23), as well as IDC's end-user surveys and insights from IDC market analysts.

  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cloud Security Configuration Assessment Service

Comprehensive security in the cloud through industry benchmarks and third-party perspective checks.

Our "Cloud Security Configuration Assessment Service" evaluates the settings of account management, logging, network, storage, and databases, which are essential components of all cloud services. Additionally, the assessment report will include results along with a world standard benchmark (translated by us) to help alleviate the stress of the responsible parties. Please feel free to contact us if you have any requests. 【Benefits】 ■ You can confirm compliance with security configuration standards specific to each cloud. ■ You can comprehensively understand the risks associated with using cloud services. ■ You will be able to make priority judgments based on sufficient information. *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security Risk Assessment Service

Visualize the current situation with a simple assessment considering the telework environment, and quickly think of the next step.

The "Information Security Risk Assessment Service" is an assessment aimed at customers who quickly established and began operating their environments for sudden telework, as well as those who had already implemented telework but are just starting to address information security measures. It focuses on understanding the current state of information leakage countermeasures specific to telework environments. Consultants who are experts in information security will compile an evaluation report based on the results of the risk assessment in a short period and present challenges and countermeasures. [Recommended for those who are facing the following issues] ■ Concerned whether the information security measures are adequate after quickly establishing and starting operations for telework ■ Want to understand the current state of information security risk response in a short time and with minimal effort ■ Unsure where to start with information security risk response ■ Have experienced near misses or close calls just before an information security incident and want to conduct an emergency inspection *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Started selling whitelist-type security software.

Specialized in embedded Linux! Supporting the enhancement of security measures related to the development, manufacturing, and operation of IoT devices.

Rineo Solutions Co., Ltd. began selling the embedded Linux-specific security software 'EMEliminator', developed and provided by Cybertrust, Inc., on June 30, 2022. This product is a safe-list type security software that only allows the execution of programs that have been pre-registered on a list, while rejecting the execution of all other programs. It supports a wide range of Linux kernels and is optimized for embedded devices. 【Features】 ■ Long-term support for 10 years, from technical assistance in Linux development to maintenance, supporting long-term operation. ■ Allows customers to customize using source files disclosed to them. ■ Low memory and disk space consumption, as well as low CPU load, making it highly applicable to embedded devices, and it can be introduced to existing embedded devices through software updates. *For more details, please refer to the related links or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Implementing multi-factor authentication at low cost with authentication tokens.

User operations are simple! Use a one-time password authentication token.

This blog introduces "MFA (Multi-Factor Authentication)" that can be implemented at a low cost. Multi-factor authentication, which requires two or more authentication factors, has become essential for web services provided by major companies. MFA using one-time password authentication tokens can be implemented at a low cost, and while user operations are simple, it enhances security, leading to an increase in its adoption. [Contents] ■ Multi-factor authentication (MFA) for services of major IT companies ■ Easy-to-use one-time password (OTP) tokens ■ Providing robust security even in online banking * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Risk Assessment Service

It is possible to understand situations deemed vulnerable and analyze the business impact of identified risks.

The "Risk Assessment Service" involves reviewing your environment and information assets to visualize, identify, and evaluate security risks, and propose countermeasures. We conduct confirmations through interviews and checklists, and create a confirmation result report for visualization. This allows us to understand situations deemed vulnerable and analyze the business impact of identified risks. 【Features】 ■ Confirmation methods: Interviews / Checklists / Review of documents such as regulations, procedures, and design documents / Business confirmations ■ Visualization: Creation of confirmation result reports ■ Identification: Understanding of situations deemed vulnerable ■ Evaluation: Analysis of the business impact of identified risks *For more details, please refer to the related link page or feel free to contact us.

  • Other security
  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Sophos Intercept X

Prevent security breaches, ransomware, and data leaks!

"Sophos Intercept X" provides unparalleled protection against advanced attacks. By adopting a wide range of advanced technologies, it prevents extensive threats before they impact the system. With powerful EDR and XDR tools, organizations can track, investigate, and respond to suspicious activities and signs of attacks. [Key Features] ■ Utilizes deep learning AI to block unknown threats ■ Blocks ransomware and safely rolls back affected files ■ Prevents exploit techniques and malicious activities used throughout the attack chain *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Useful Information: Self-Service BI

Introducing the features of self-service and the benefits of implementation!

A Thorough Explanation of the Differences from Traditional BI Tools! In recent years, data has become the core of business, and data-driven decision-making is essential for companies to succeed. Business Intelligence (BI) tools are important tools for collecting and analyzing data to provide insights, but among them, self-service BI has been gaining attention recently. This article will explain in detail the differences between self-service BI and traditional BI tools, and introduce the features of self-service BI along with the benefits of its implementation. *For more detailed content, please refer to the related links. Feel free to contact us for more information.*

  • Business Intelligence and Data Analysis

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Explanation of Invoices and Revised Electronic Bookkeeping Law] Accidents and Troubles That May Occur in the Manufacturing Industry

Have you been receiving suspicious emails lately? Fake invoices from impersonation emails created by tools like ChatGPT are being sent to your company.

The invoice system will begin on October 1, 2023. Additionally, the revised Electronic Bookkeeping Act will become mandatory starting January 1, 2024. As a result, the entire industry has started to send invoices electronically. This raises the issue of "spoofing emails (phishing emails)." With the advent of generative AI like ChatGPT, it has become possible to create emails in natural-sounding Japanese, leading to an increase in cases where cybercriminals send sophisticated "fake invoices." If a fake email impersonating your company reaches your business partners or customers, the following problems may arise: - Personal information of employees or customers may be leaked, leading to lawsuits. - Important corporate secrets may be stolen and resold, causing your company to lose competitive advantage. - Company funds may be siphoned off. - Business partners may become infected with viruses through your company, resulting in huge compensation costs. (According to Article 709 of the Civil Code, your company may be deemed to have "not taken necessary measures" against spoofing emails and could bear liability for damages.) We have prepared a document that explains this situation in more detail and outlines potential solutions. Please download it and use it to ensure safe operations!

  • Company:Spelldata
  • Price:100,000 yen-500,000 yen
  • Email/Fax transmission

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software