We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security software Product List and Ranking from 42 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. 飛天ジャパン Tokyo//IT/Telecommunications
  2. アンカーテクノロジーズ Tokyo//IT/Telecommunications
  3. ハミングヘッズ 本社 Tokyo//software
  4. 4 日本シノプシス ソフトウェア・インテグリティ・グループ Tokyo//software
  5. 5 東計電算 製造システム営業部 (第一事業所) Kanagawa//IT/Telecommunications

Security software Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. One-Time Password Token "C200" *Free trial version available for loan. 飛天ジャパン
  2. [Information Leakage Countermeasures] Security Platform 'SeP' ハミングヘッズ 本社
  3. IAST『Seeker』 日本シノプシス ソフトウェア・インテグリティ・グループ
  4. Burp Suite アンカーテクノロジーズ
  5. 4 Security software [TSFS] 東計電算 製造システム営業部 (第一事業所)

Security software Product List

106~119 item / All 119 items

Displayed results

Introduction to SentinelOne products

Not only large corporations but also small businesses can implement it! It excels in automated operations using AI technology!

We would like to introduce "SentinelOne," an AI security solution from Israel that we handle. It enables rapid response through AI operations, allowing for operation even without security personnel, thus not adding to the operational burden. Additionally, since it can be operated automatically, there is no need to outsource operational services, significantly reducing costs. 【Features】 ■ Fast response with AI for safety ■ No hassle ■ Significant cost savings ■ Can be implemented from just one PC ■ Zero ransomware incidents since the service began ■ Lightweight agent ensures that computer performance remains smooth and comfortable for work *For more details, please refer to the PDF materials or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[SentinelOne Case Study] Andpad Inc.

The user evaluation regarding detection accuracy is high, and the easy-to-use UX is a major attraction!

At AndPad Inc., a signature-based EPP had been implemented for endpoints used in operations for some time. However, due to the multi-OS environment, the measures were primarily optimized individually for each system, such as Windows and MacOS. As the business expanded and the number of members increased, there was a demand for an environment that could be managed integratively even in a multi-OS setting. As a new endpoint protection mechanism, the company adopted 'SentinelOne,' which combines the functions of both EPP and EDR, as part of its security enhancement strategy. To quickly escape the risks of the existing environment, they began deployment just four months after starting the consideration phase, following a PoC. Currently, agents have been installed on hundreds of PCs used by all employees, including verification machines for development, and operations are centered around detection. **Challenges Before Implementation** - Operations could only be conducted in an individually optimized manner due to the multi-OS environment. - There was no integrated management, and the visualization of the situation was insufficient. - A signature-based EPP with a low detection rate could not mitigate management risks. *For more details, please refer to the PDF document or feel free to contact us.*

  • Software (middle, driver, security, etc.)
  • Other security
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Market Research Report] Security Software and Appliance Market

"Free samples" are currently being offered! Please check the application method from the [PDF download] button, or apply directly from the related links.

This survey presents the current state of the security software and appliance spending in the Asia-Pacific region (excluding Japan) and a five-year outlook for the security industry. It utilizes IDC's Semiannual Software Tracker (Forecast 2H22), IDC's Quarterly Security Appliance Tracker (Forecast 3Q23), as well as IDC's end-user surveys and insights from IDC market analysts.

  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cloud Security Configuration Assessment Service

Comprehensive security in the cloud through industry benchmarks and third-party perspective checks.

Our "Cloud Security Configuration Assessment Service" evaluates the settings of account management, logging, network, storage, and databases, which are essential components of all cloud services. Additionally, the assessment report will include results along with a world standard benchmark (translated by us) to help alleviate the stress of the responsible parties. Please feel free to contact us if you have any requests. 【Benefits】 ■ You can confirm compliance with security configuration standards specific to each cloud. ■ You can comprehensively understand the risks associated with using cloud services. ■ You will be able to make priority judgments based on sufficient information. *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security Risk Assessment Service

Visualize the current situation with a simple assessment considering the telework environment, and quickly think of the next step.

The "Information Security Risk Assessment Service" is an assessment aimed at customers who quickly established and began operating their environments for sudden telework, as well as those who had already implemented telework but are just starting to address information security measures. It focuses on understanding the current state of information leakage countermeasures specific to telework environments. Consultants who are experts in information security will compile an evaluation report based on the results of the risk assessment in a short period and present challenges and countermeasures. [Recommended for those who are facing the following issues] ■ Concerned whether the information security measures are adequate after quickly establishing and starting operations for telework ■ Want to understand the current state of information security risk response in a short time and with minimal effort ■ Unsure where to start with information security risk response ■ Have experienced near misses or close calls just before an information security incident and want to conduct an emergency inspection *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Started selling whitelist-type security software.

Specialized in embedded Linux! Supporting the enhancement of security measures related to the development, manufacturing, and operation of IoT devices.

Rineo Solutions Co., Ltd. began selling the embedded Linux-specific security software 'EMEliminator', developed and provided by Cybertrust, Inc., on June 30, 2022. This product is a safe-list type security software that only allows the execution of programs that have been pre-registered on a list, while rejecting the execution of all other programs. It supports a wide range of Linux kernels and is optimized for embedded devices. 【Features】 ■ Long-term support for 10 years, from technical assistance in Linux development to maintenance, supporting long-term operation. ■ Allows customers to customize using source files disclosed to them. ■ Low memory and disk space consumption, as well as low CPU load, making it highly applicable to embedded devices, and it can be introduced to existing embedded devices through software updates. *For more details, please refer to the related links or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Implementing multi-factor authentication at low cost with authentication tokens.

User operations are simple! Use a one-time password authentication token.

This blog introduces "MFA (Multi-Factor Authentication)" that can be implemented at a low cost. Multi-factor authentication, which requires two or more authentication factors, has become essential for web services provided by major companies. MFA using one-time password authentication tokens can be implemented at a low cost, and while user operations are simple, it enhances security, leading to an increase in its adoption. [Contents] ■ Multi-factor authentication (MFA) for services of major IT companies ■ Easy-to-use one-time password (OTP) tokens ■ Providing robust security even in online banking * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Risk Assessment Service

It is possible to understand situations deemed vulnerable and analyze the business impact of identified risks.

The "Risk Assessment Service" involves reviewing your environment and information assets to visualize, identify, and evaluate security risks, and propose countermeasures. We conduct confirmations through interviews and checklists, and create a confirmation result report for visualization. This allows us to understand situations deemed vulnerable and analyze the business impact of identified risks. 【Features】 ■ Confirmation methods: Interviews / Checklists / Review of documents such as regulations, procedures, and design documents / Business confirmations ■ Visualization: Creation of confirmation result reports ■ Identification: Understanding of situations deemed vulnerable ■ Evaluation: Analysis of the business impact of identified risks *For more details, please refer to the related link page or feel free to contact us.

  • Other security
  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Sophos Intercept X

Prevent security breaches, ransomware, and data leaks!

"Sophos Intercept X" provides unparalleled protection against advanced attacks. By adopting a wide range of advanced technologies, it prevents extensive threats before they impact the system. With powerful EDR and XDR tools, organizations can track, investigate, and respond to suspicious activities and signs of attacks. [Key Features] ■ Utilizes deep learning AI to block unknown threats ■ Blocks ransomware and safely rolls back affected files ■ Prevents exploit techniques and malicious activities used throughout the attack chain *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Useful Information: Self-Service BI

Introducing the features of self-service and the benefits of implementation!

A Thorough Explanation of the Differences from Traditional BI Tools! In recent years, data has become the core of business, and data-driven decision-making is essential for companies to succeed. Business Intelligence (BI) tools are important tools for collecting and analyzing data to provide insights, but among them, self-service BI has been gaining attention recently. This article will explain in detail the differences between self-service BI and traditional BI tools, and introduce the features of self-service BI along with the benefits of its implementation. *For more detailed content, please refer to the related links. Feel free to contact us for more information.*

  • Business Intelligence and Data Analysis

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Explanation of Invoices and Revised Electronic Bookkeeping Law] Accidents and Troubles That May Occur in the Manufacturing Industry

Have you been receiving suspicious emails lately? Fake invoices from impersonation emails created by tools like ChatGPT are being sent to your company.

The invoice system will begin on October 1, 2023. Additionally, the revised Electronic Bookkeeping Act will become mandatory starting January 1, 2024. As a result, the entire industry has started to send invoices electronically. This raises the issue of "spoofing emails (phishing emails)." With the advent of generative AI like ChatGPT, it has become possible to create emails in natural-sounding Japanese, leading to an increase in cases where cybercriminals send sophisticated "fake invoices." If a fake email impersonating your company reaches your business partners or customers, the following problems may arise: - Personal information of employees or customers may be leaked, leading to lawsuits. - Important corporate secrets may be stolen and resold, causing your company to lose competitive advantage. - Company funds may be siphoned off. - Business partners may become infected with viruses through your company, resulting in huge compensation costs. (According to Article 709 of the Civil Code, your company may be deemed to have "not taken necessary measures" against spoofing emails and could bear liability for damages.) We have prepared a document that explains this situation in more detail and outlines potential solutions. Please download it and use it to ensure safe operations!

  • Company:Spelldata
  • Price:100,000 yen-500,000 yen
  • Email/Fax transmission

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What phishing emails target

Reselling of trade secrets and personal information of customers. Various things are being targeted.

The targets of phishing emails are diverse. They include "reading credit card information for fraudulent use," "withdrawing large amounts of cash from bank accounts," and "stopping systems to demand money." Additionally, there are "terrorism aimed at disrupting factories and infrastructure." 【Targets (partial)】 ■ Reselling corporate secrets ■ Reselling customer personal information ■ Sending phishing emails impersonating business partners *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Workplace Risk Assessment Service

We provide risk assessments that contribute to the prevention of occupational diseases!

Our company provides appropriate risk assessments for the workplace using personal exposure and biological monitoring. To prevent occupational diseases, it is important to conduct comprehensive measurements that utilize the characteristics of three types of assessments: workplace environmental measurements, personal exposure monitoring, and biological monitoring (such as measuring urinary metabolites). This enables appropriate risk assessments in workplaces handling hazardous substances. 【Service Menu】 ■ Personal Exposure Monitoring: Measurement of external exposure levels ⇒ Non-routine work, irregular work, work inside equipment during troubles, outdoor work, etc. ■ Biological Monitoring: Measurement of internal exposure levels ⇒ Confirmation of the effectiveness of protective equipment, evaluation of skin absorption, substantiation of the effects of the substance in question ■ Workplace Environmental Measurements: Measurement of concentrations in the ambient air *For more details, please download the PDF or feel free to contact us.

  • Contract measurement
  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Securely share seminar videos and important documents! PDF security software.

Securely sharing important information, PDF security solutions [Held on April 23, 2025]

We would like to introduce the archived videos of seminars we have held in the past. *The video link for this seminar is included on the cover of the PDF materials. Please download the PDF materials and be sure to take a look. 【Seminar Overview】 As the advancement of digitalization increases file sharing, do you have concerns about "wanting to share information but feeling uneasy about file sharing"? In this seminar, we will demonstrate "PsafeVIEW," a solution that allows safe sharing of important information via a web system without allowing downloads, along with case studies of its implementation. This is a proven solution that has been widely adopted for sharing design documents by major manufacturing companies. If you are struggling with secure file viewing and sharing methods or are considering security proposals for your clients, please be sure to watch.

  • Document and Data Management
  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software