We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for File Encryption Software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

File Encryption Software Product List and Ranking from 6 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 24, 2025~Oct 21, 2025
This ranking is based on the number of page views on our site.

File Encryption Software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 24, 2025~Oct 21, 2025
This ranking is based on the number of page views on our site.

  1. オーク情報システム 本社、大阪事業所 Tokyo//IT/Telecommunications
  2. ティエスエスリンク Tokyo//software
  3. DataClasys Tokyo//software
  4. 4 ピコテクノロジーズ Tokyo//software
  5. 4 フォーカスシステムズ Tokyo//IT/Telecommunications

File Encryption Software Product ranking

Last Updated: Aggregation Period:Sep 24, 2025~Oct 21, 2025
This ranking is based on the number of page views on our site.

  1. [Security Measures] Easy-to-use and inexpensive file encryption software オーク情報システム 本社、大阪事業所
  2. 【Robust Security Measures】Utilization of Automatic Encryption Features / Sendai City Hall オーク情報システム 本社、大阪事業所
  3. 簡単ファイル暗号化ソフト『セキュアプライムFE』 ティエスエスリンク
  4. 4 Prevent information leakage with file encryption software. 飛天ジャパン
  5. 4 Encryption regardless of the app! Operation remains unchanged for leak prevention! DataClasys

File Encryption Software Product List

1~11 item / All 11 items

Displayed results

[Security Measures] Easy-to-use and inexpensive file encryption software

The trump card of encryption that supports work styles in the new normal era! Encryption software with a master key.

"CyberCrypt Ver.5.1" is a file encryption software with a master key that prevents encryption forgetfulness and ensures thorough security measures. The number of scenarios handling important information outside the company or in the cloud is increasing. It is essential to encrypt and protect important files. Encrypting important files without the user's awareness. Achieving cost reduction and efficiency with simple operations. 【Features】 ■ Avoiding information leakage risks without burdening the user ■ A "master key" for peace of mind even if the encryption password is forgotten ■ Reducing operational costs without the need for a password management server ■ Ensuring safety and security in the new normal working style through encryption - For telework, remote work, or on cloud storage *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Prevent information leakage with file encryption software.

Enhance your security level! Introducing ways to prevent information leaks on the blog.

This blog discusses measures against information leakage using file encryption software. File encryption is the process of converting certain data into another form through special processing. To view encrypted data, it is necessary to decrypt the file using a "key," such as a password. By using file encryption software, even if data falls into the hands of a third party, its contents cannot be read. [Content] ■ Loss of customer trust if information leakage occurs ■ Software that automatically performs encryption is gaining attention ■ Choose based on the overall cost-performance ratio of information leakage countermeasures * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

【Robust Security Measures】Utilization of Automatic Encryption Features / Sendai City Hall

Introducing examples that have made significant contributions to strengthening information security! Achieving high security with minimal burden on users. *Trial version available.

In Sendai City, management personnel from each department serve as information managers, overseeing the proper operation and management of information security. However, prompted by a notification from the Ministry of Internal Affairs and Communications, a stricter policy regarding the handling of electronic data containing personal information has been established for the entire city of Sendai. As a result, we have implemented the file encryption software 'CyberCrypt' provided by our company. Consequently, encryption is automatically completed simply by placing files into a folder, just like operating a regular Windows PC, allowing users to maintain a high level of information security with minimal burden. 【Case Study】 ■Challenges - Responsibility as an administrative agency handling personal information - Moving away from security management that relies on the field - Strengthening security measures for all information containing personal data ■Effects - Establishing an environment that meets the increasing demands for information security - Utilizing the automatic encryption feature that staff can operate with minimal burden - Expanding encryption efforts to confidential data that does not contain personal information *If you would like a trial version, please indicate "trial version consideration" in the [Contact Us] section. *For more details, please refer to the PDF materials or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Personal Information Detection and Encryption Solution

"P-Pointer" × "DataClasys" collaboration! Personal information detection and encryption solution.

Our company has collaborated with Arara Inc. to achieve an ideal operation that detects personal and confidential information and encrypts files. Using "P-Pointer," which is utilized by many companies for its fast and advanced detection capabilities, we detect My Number and personal information, and encrypt files with "DataClasys." Even if files are leaked externally, information will not be compromised. 【Features】 ■ "P-Pointer" × "DataClasys" ■ Detection of My Number and personal information ■ Automatic encryption to prevent leakage *For more details, please refer to the PDF materials or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Presentation materials on file encryption technology for the manufacturing industry are available.

A must-read for those concerned about the leakage of technical information! How can file encryption prevent information leaks such as CAD and drawings? Measures in China are also included.

Our company, which handles file encryption software and security systems, is currently offering materials that explain file encryption technology for the manufacturing industry. We discuss security measures in environments that handle design drawings, such as CAD, concerns when using encrypted files in China, and the necessity of controlling printing and screen capturing. 【Contents】 ■ Advantages of file encryption technology ■ Functions and features of products necessary for encryption operations ■ Strengthening security and improving operational efficiency *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security and surveillance systems
  • Other security
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

CAD/CAM compatible transparent file encryption software, usable in China!

[Presenting Materials!] Detailed explanation of necessary information leakage countermeasures and basic security measures for manufacturing sites!

IP-guardV+ is a next-generation file encryption product that is location and application agnostic. It allows files to be used in an encrypted state without awareness from the time they are created until they are deleted, across various scenarios such as internal/external, offline/online, thin client/fat client, and domestic/international. Additionally, it supports various Windows applications, including CAD/CAM systems, enabling the protection of not only general document files but also files that are critical to businesses from leakage. 【Summary of Features】 - Capable of preventing information leakage both internally and externally - Usable globally (including China) - Employs a unique encryption engine that minimizes operational delays ★ Currently, you can also download the detailed explanation of basic security measures in the document titled 【Information Leakage Countermeasures Necessary for Manufacturing Sites: Manufacturing Industry Edition】. For more details, please download the catalog or contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『CRYPTO RELAY』

Encryption measures for data exchange between general-purpose machines, UNIX, and WinglayS!

"CRYPTO RELAY" is a file encryption tool equipped with the domestically developed high-speed encryption technology C4S, boasting high security. Due to its simple commands, it is easy to integrate into routine operations. It is effective in addressing issues such as the protection of customer information during outsourcing of tasks like invoicing and direct mail, as well as data protection for various outsourced computing tasks in accounting and finance. 【Features】 ■ Safe and easy file encryption security ■ Supports encryption keys up to 65,536 bits ■ Fast encryption and decryption with minimal impact on business operations ■ Easy integration into Shel/JCL/CL through batch processing, allowing for use with minimal changes *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

簡単ファイル暗号化ソフト『セキュアプライムFE』

簡単操作でファイルのセキュリティを強化!今あるセキュリティ課題を解決します

『セキュアプライムFE』は、簡単操作で使えるファイル暗号化ソフトです。 ファイルをドラッグ&ドロップするだけで簡単に暗号化。 ファイル利用後は自動で再暗号化して安全性を継続します。 さらに、自動再暗号化や一時ファイルの削除により、情報漏洩を防止。 Windows/Macに対応し、同じファイルを相互のOSで利用することができます。 【特長】 ■簡単操作でファイルを暗号化 ■Windowsでは自己復号型で暗号化、アプリをインストールしなくても復号可能 ■Windows/Macでは、再暗号化機能で、平文を残さず、暗号化し忘れも防止 ■日本語OS以外にも対応しているので海外へのファイル送付にも利用可能 ※詳しくはPDF資料をご覧いただくか、お気軽にお問い合わせ下さい。

  • Encryption and authentication
  • Personal authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

USB file encryption software "Secure Prime UFE"

Enhance security without managing USB devices! Use them in an always-encrypted state to ensure safety.

"Secure Prime UFE" is an easy encryption software for files that you carry on USB devices. No special encryption operations are required. You can easily encrypt files just as you have been using them until now. Additionally, you can use as many USB memory devices as you have on one PC, which helps reduce implementation costs. Furthermore, there are no cumbersome registration processes, which alleviates operational burdens. 【Features】 ■ Safely use USB devices at your destination ■ No device management is required, allowing for enhanced security without operational burdens ■ No special encryption operations are necessary ■ Easy encryption using the same methods as before ■ No tedious registration processes, reducing operational burdens *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Encryption regardless of the app! Operation remains unchanged for leak prevention!

Distributing confidential files encrypted to domestic and international locations!

We would like to introduce "Data Crisis," developed to balance the protection and management of confidential information such as personal and customer data with information sharing. By encrypting and distributing confidential files to domestic and international locations, it is possible to prevent leaks even if the files are taken out. 【Features】 ■ Achieves robust security and high convenience ■ Protects all types of CAD files ■ Allows for detailed operational rules to be set ■ Can be safely used outside the company and by contractors ■ Multilingual support (Japanese, Korean, Chinese, English) *For more details, please refer to the PDF document or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Encrypt almost all files regardless of file format.

Prevent information leakage even when taken out! Safe to use outside the company and with contractors.

We would like to introduce "Data Crisis," developed to balance the protection and management of confidential information such as personal and customer data with information sharing. It can encrypt and utilize almost all files regardless of file format, preventing information leakage even if taken outside. 【Features】 ■ Encrypts all types of Windows files ■ Allows for detailed operational rules to be set ■ Easy integration and collaboration with existing systems ■ Can be used safely outside the company and with contractors ■ Flexible response unique to in-house development *For more details, please refer to the PDF document or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration