We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Information leakage prevention software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Information leakage prevention software - List of Manufacturers, Suppliers, Companies and Products | IPROS GMS

Information leakage prevention software Product List

1~2 item / All 2 items

Displayed results

Information Leakage Prevention Software Port Security Series IV

It can be put into operation on the same day simply by installing it on the target client PC and performing the initial setup.

The information leakage prevention software, Port Security Series IV, instantly executes protective actions such as locking the machine when an unauthorized USB device is connected to the PC. By forcibly interrupting work, it prevents the leakage of important data through the use of unauthorized USB memory or internal devices (such as CD-Rs and DVD-Rs). It also protects the PC from threats posed by unnecessary software installations from external sources and viruses introduced by USB worms. It is widely used by many corporate users, especially those that have implemented or acquired certifications such as the "ISMS Compliance Assessment System (ISO 27001:2005)" and the "Privacy Mark." For more details, please contact us or refer to the catalog.

  • Other security
  • Firewall and intrusion prevention
  • Information leakage prevention software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

【For Government Agencies】Security | Solutions Department

We propose the latest security measures to protect your organization from information leaks.

In government agencies, information leaks can undermine public trust and have serious impacts on organizational operations. Protecting personal and confidential information is a top priority. Measures to safeguard information from various threats such as unauthorized access, ransomware, and insider data breaches are essential. Our security solutions address these challenges and establish a robust security framework. 【Use Cases】 - Information leak prevention - Unauthorized access prevention - Ransomware prevention - Strengthening security in remote work environments 【Benefits of Implementation】 - Reduction of information leak risks - Assurance of business continuity - Improvement of organizational reliability

  • Other security
  • Information leakage prevention software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration