We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Information Security Software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Information Security Software Product List and Ranking from 5 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Jul 23, 2025~Aug 19, 2025
This ranking is based on the number of page views on our site.

Information Security Software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Jul 23, 2025~Aug 19, 2025
This ranking is based on the number of page views on our site.

  1. ケーエスピー Osaka//Information and Communications
  2. サイエンスパーク Kanagawa//software
  3. ピコテクノロジーズ Tokyo//software
  4. フォーカスシステムズ Tokyo//IT/Telecommunications
  5. 日本ファインアート Tokyo//IT/Telecommunications

Information Security Software Product ranking

Last Updated: Aggregation Period:Jul 23, 2025~Aug 19, 2025
This ranking is based on the number of page views on our site.

  1. IT Asset Management and Information Security Software SS1 ケーエスピー
  2. 『C4U Enterprise』 フォーカスシステムズ
  3. Information Security Product: CFKeeper サイエンスパーク
  4. Corresponds to each requirement of the My Number Act's safety measures! IP-guard V3 ピコテクノロジーズ
  5. 4 [Case Study Collection] Information Leakage Prevention System Total Security Fort 日本ファインアート

Information Security Software Product List

1~5 item / All 5 items

Displayed results

『C4U Enterprise』

Leave the file security of in-house servers and PCs to this one solution!

"C4U Enterprise" allows you to manage encrypted files on the server using a group key. It addresses concerns such as "I want my files to be private, but I want everyone to be able to use the files on the server" and "I'm worried that USB is managed personally." 【Features】 ■ Windows login with USB key ■ Differentiation between user key and group key (manual encryption/decryption) ■ Folder settings (automatic encryption/decryption) *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IT Asset Management and Information Security Software SS1

If you're unsure about IT asset management tools, choose SS1.

<Standard Features> ●Asset Management - Device Management: Automatically collects and centrally manages hardware and software information of IT assets such as PCs. - System Management: Thoroughly manages the status of networks including WAN, LAN, and hubs. - Software Management: Clearly displays the software and license usage status of managed PCs. - Contract Management: Manages contract information for equipment leasing/rental, with the ability to output reports. ●Operational Support - PC Operation Functions: Supports operational tasks such as file distribution, message delivery, and alerts for changes in IT assets. - Update Program Management: Enables management of major updates for Windows 10 and update programs for Office 365. - Working Hours Management: Restricts PC usage outside of working hours to reduce long working hours. - SS1 Operation Functions: Provides comprehensive operational support by allowing users to check changes in the management environment and violation alerts in one place.

  • Integrated operation management
  • Server monitoring and network management tools
  • Other PCs and OA equipment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security Product: CFKeeper

Safe and low-cost! Strengthening cloud storage security from the endpoint.

"CFKeeper" enhances the security of endpoints that utilize cloud storage. Files in the sync folder are automatically encrypted. Files synchronized/uploaded to cloud storage are not encrypted, allowing for viewing on the go and sharing with external parties as usual. It safely and cost-effectively addresses issues such as "leakage of sync folder/cache data during targeted attacks or malware infections" and "removal of hard disks when a PC is lost." 【Features】 ■ Prohibits copying/uploading files outside the cloud storage sync folder ■ Automatically encrypts files in the sync folder ■ Limits file storage to cloud storage ■ Files synchronized/uploaded to cloud storage are not encrypted, allowing for viewing on the go and sharing with external parties as usual *For more details, please refer to the related link page or feel free to contact us.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Corresponds to each requirement of the My Number Act's safety measures! IP-guard V3

Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leak prevention through powerful violation control and logging at the kernel level.

IP-guard V3 is a product for "PC log management," "information security," and "IT asset management" that is adopted by over 20,000 major companies and government agencies in 27 countries worldwide. In Japan, it particularly contributes to solving various industry challenges with its powerful controls and detailed recording features that were not achievable with other products. Additionally, each function, composed of 14 different modules, allows users to select only what they need, minimizing the burden on users and reducing the workload for administrators. Furthermore, it is a product that can meet almost all the requirements outlined in the safety measures of the My Number Act (government-issued security guidelines).

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study Collection] Information Leakage Prevention System Total Security Fort

Control, recording, monitoring, approval. Introducing all-in-one internal information security measures.

This document summarizes case studies of the implementation of the information leakage prevention system "Total Security Fort." It details the background and circumstances of the implementation, as well as the effects after implementation and future prospects, covering the cases of a total of eight companies. Please use this information for your consideration of product implementation. [Featured Case Studies (Partial)] ■ NTT Data Corporation ■ Yokote City Hall, Akita Prefecture ■ Meiden System Technology Co., Ltd. ■ Veriserv Inc. ■ SII Data Service Co., Ltd. and others *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration