We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Information Security Software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Information Security Software - List of Manufacturers, Suppliers, Companies and Products

Information Security Software Product List

1~4 item / All 4 items

Displayed results

『C4U Enterprise』

Leave the file security of in-house servers and PCs to this one solution!

"C4U Enterprise" allows you to manage encrypted files on the server using a group key. It addresses concerns such as "I want my files to be private, but I want everyone to be able to use the files on the server" and "I'm worried that USB is managed personally." 【Features】 ■ Windows login with USB key ■ Differentiation between user key and group key (manual encryption/decryption) ■ Folder settings (automatic encryption/decryption) *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security Product: CFKeeper

Safe and low-cost! Strengthening cloud storage security from the endpoint.

"CFKeeper" enhances the security of endpoints that utilize cloud storage. Files in the sync folder are automatically encrypted. Files synchronized/uploaded to cloud storage are not encrypted, allowing for viewing on the go and sharing with external parties as usual. It safely and cost-effectively addresses issues such as "leakage of sync folder/cache data during targeted attacks or malware infections" and "removal of hard disks when a PC is lost." 【Features】 ■ Prohibits copying/uploading files outside the cloud storage sync folder ■ Automatically encrypts files in the sync folder ■ Limits file storage to cloud storage ■ Files synchronized/uploaded to cloud storage are not encrypted, allowing for viewing on the go and sharing with external parties as usual *For more details, please refer to the related link page or feel free to contact us.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Corresponds to each requirement of the My Number Act's safety measures! IP-guard V3

Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leak prevention through powerful violation control and logging at the kernel level.

IP-guard V3 is a product for "PC log management," "information security," and "IT asset management" that is adopted by over 20,000 major companies and government agencies in 27 countries worldwide. In Japan, it particularly contributes to solving various industry challenges with its powerful controls and detailed recording features that were not achievable with other products. Additionally, each function, composed of 14 different modules, allows users to select only what they need, minimizing the burden on users and reducing the workload for administrators. Furthermore, it is a product that can meet almost all the requirements outlined in the safety measures of the My Number Act (government-issued security guidelines).

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study Collection] Information Leakage Prevention System Total Security Fort

Control, recording, monitoring, approval. Introducing all-in-one internal information security measures.

This document summarizes case studies of the implementation of the information leakage prevention system "Total Security Fort." It details the background and circumstances of the implementation, as well as the effects after implementation and future prospects, covering the cases of a total of eight companies. Please use this information for your consideration of product implementation. [Featured Case Studies (Partial)] ■ NTT Data Corporation ■ Yokote City Hall, Akita Prefecture ■ Meiden System Technology Co., Ltd. ■ Veriserv Inc. ■ SII Data Service Co., Ltd. and others *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration