We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Cybersecurity Solutions.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Cybersecurity Solutions Product List and Ranking from 6 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Aug 27, 2025~Sep 23, 2025
This ranking is based on the number of page views on our site.

Cybersecurity Solutions Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Aug 27, 2025~Sep 23, 2025
This ranking is based on the number of page views on our site.

  1. 兼松エレクトロニクス デジタル・サービス本部 Tokyo//Trading company/Wholesale
  2. フーバーブレイン Tokyo//IT/Telecommunications
  3. プログレス・ソフトウェア・ジャパン Tokyo//IT/Telecommunications
  4. B7 Tokyo//software
  5. KOTRA名古屋 韓国貿易センター(名古屋) Aichi//Service Industry

Cybersecurity Solutions Product ranking

Last Updated: Aggregation Period:Aug 27, 2025~Sep 23, 2025
This ranking is based on the number of page views on our site.

  1. Cybersecurity solution "SecureQUEST" 兼松エレクトロニクス デジタル・サービス本部
  2. Network Blackbox フーバーブレイン
  3. 『Gatewatcher』 B7
  4. [AutoCrypt] IVS、SeC Analyzer  KOTRA名古屋 韓国貿易センター(名古屋)
  5. 4 [Information] Explanation of Ransomware プログレス・ソフトウェア・ジャパン

Cybersecurity Solutions Product List

1~6 item / All 6 items

Displayed results

Cybersecurity solution "SecureQUEST"

To all the members of the information systems department in the automotive industry who are facing security threats all alone!

"SecureQUEST" is a cybersecurity solution for individual information systems developed by the information systems department of an automotive industry supplier. While responding to short-term risks through alert monitoring and log analysis, we accompany our customers in strengthening the long-term security of their IT environment from both system and operational perspectives. By providing IT technology, we ensure the safety of the entire supply chain so that it can focus on business, ultimately contributing to the stability and development of the entire industry. 【Features】 ■ "Accompaniment support" leveraging our in-house operational expertise ■ Gradual security enhancement even after implementation ■ Monitoring of unauthorized sign-ins ■ Easy-to-understand monthly reports ■ Comprehensive support for overseas locations *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall and intrusion prevention
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] Explanation of Ransomware

Prepare for attacks! Solutions to help build robust cybersecurity.

This document focuses on the threat of ransomware and outlines ways to mitigate risks. It introduces the ransomware threats of 2023, methods to minimize risks, and solutions to help build stronger cybersecurity. Please use this as a reference for ransomware countermeasures. 【Contents】 ■ Current threat landscape ■ What is ransomware? ■ Impact of ransomware attacks ■ Ransomware as a Service (RaaS) ■ Ransomware attackers *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Network Blackbox

Detect and respond to various cybersecurity risks!

"Network Blackbox" is a product that adopts the MITRE ATT&CK framework to maximize the efficiency of operations for Japanese operators. With an advanced network solution using full packet capturing, it saves all packets and analyzes them with 100% coverage. The progression of attacks and TTPs (Tactics, Techniques, and Procedures) are visualized, making it easy to see where to respond at a glance. We are the domestic distributor for this product. 【Features】 ■ NDR Core Technology ■ Adoption of the MITRE ATT&CK Matrix ■ Utilization of AI for detection and analysis based on full packets *For more details, please download the PDF or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『Gatewatcher』

Cybersecurity Solutions - NDR, CTI, and SOC Automation for Advanced Threat Detection 'Gatewatcher'

Gatewatcher is a cybersecurity platform that integrates CTI, automated response, and AI support, centered around ANSSI-certified passive NDR sensors, to monitor the entire network in 360° and accelerate the detection and containment of threats. 【Key Features】 ■ Multi-layer Detection Engine - Utilizes signatures, heuristics, and machine learning to capture unknown attacks and anomalies in encrypted communications in real time. ■ Live CTI Feed - Ingests over 5,500 IoCs daily from more than 3,000 information sources, providing immediate context to alerts. ■ Cockpit Integrated Console - Manages incidents mapped to MITRE ATT&CK on a single screen, visualizing MTTD/MTTR. ■ Reflex Automated Response - Implements immediate actions such as isolation, FW blocking, and account deactivation with a single click or fully automated playbooks. ■ Deep Visibility DPI - Analyzes hundreds of protocols and retains flow and packet data for long-term storage, useful for forensics and performance analysis. *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[AutoCrypt] IVS、SeC Analyzer 

Automotive Cybersecurity Solutions

AutoCrypt IVS: Cybersecurity measures optimized for automotive communication protocols - Incorporates TEE to ensure confidentiality and reliability - Achieves cost reduction in ECU development without the need for security program development - Addresses stringent technical requirements demanded by OEMs and suppliers AutoCrypt Security Analyzer: A 'vehicle OSS vulnerability diagnosis and automatic analysis solution' that manages security risks such as open-source vulnerabilities and license violations included in in-vehicle software AutoCrypt Security Fuzzer: A vehicle-specific fuzz testing tool specialized for vehicle software, enabling automation of testing through smart fuzzing utilizing AI, and improving resource management efficiency.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Offshore Development Achievements: Cyber Security Solutions

The solution is technology against A-DDOS, such as the establishment of identity access management!

We would like to introduce our achievements in the development of "Cyber Security Solutions" aimed at strengthening cyber security and preventing data leaks. We established a Security Operation Center (SOC) for the Bangladesh Army, addressing the challenges of detection, monitoring, prevention, forensics, encryption, decryption, and data protection for security disaster recovery at the military's data center. As a result, we built a data leak prevention system for systems, networks, databases, endpoints, and applications. By establishing a full cycle of security and implementing forensic policies regarding encryption and decryption (such as response methods during data incidents), we made it possible to ensure data safety. 【Project Overview】 ■ Established a Security Operation Center for the Bangladesh Army ■ Implemented detection, monitoring, prevention, forensics, encryption, decryption, and data protection for security disaster recovery at the military's data center *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration