iPROS Manufacturing
  • Search for products by classification category

    • Electronic Components and Modules
      Electronic Components and Modules
      56004items
    • Machinery Parts
      Machinery Parts
      70793items
    • Manufacturing and processing machinery
      Manufacturing and processing machinery
      95484items
    • Scientific and Physics Equipment
      Scientific and Physics Equipment
      33030items
    • Materials
      Materials
      34865items
    • Measurement and Analysis
      Measurement and Analysis
      52750items
    • Image Processing
      Image Processing
      14560items
    • Control and Electrical Equipment
      Control and Electrical Equipment
      50390items
    • Tools, consumables, and supplies
      Tools, consumables, and supplies
      62857items
    • Design and production support
      Design and production support
      11710items
    • IT/Network
      IT/Network
      41036items
    • Office
      Office
      13136items
    • Business support services
      Business support services
      40006items
    • Seminars and Skill Development
      Seminars and Skill Development
      5804items
    • Pharmaceutical and food related
      Pharmaceutical and food related
      23354items
    • others
      59286items
  • Search for companies by industry

    • Manufacturing and processing contract
      7358
    • others
      5050
    • Industrial Machinery
      4433
    • Machine elements and parts
      3289
    • Other manufacturing
      2872
    • IT/Telecommunications
      2521
    • Trading company/Wholesale
      2456
    • Industrial Electrical Equipment
      2314
    • Building materials, supplies and fixtures
      1819
    • software
      1647
    • Electronic Components and Semiconductors
      1576
    • Resin/Plastic
      1493
    • Service Industry
      1408
    • Testing, Analysis and Measurement
      1132
    • Ferrous/Non-ferrous metals
      979
    • environment
      701
    • Chemical
      631
    • Automobiles and Transportation Equipment
      560
    • Printing Industry
      506
    • Information and Communications
      432
    • Consumer Electronics
      421
    • Energy
      321
    • Rubber products
      311
    • Food Machinery
      304
    • Optical Instruments
      284
    • robot
      273
    • fiber
      250
    • Paper and pulp
      232
    • Electricity, Gas and Water Industry
      172
    • Pharmaceuticals and Biotechnology
      165
    • Warehousing and transport related industries
      145
    • Glass and clay products
      142
    • Food and Beverage
      134
    • CAD/CAM
      121
    • Educational and Research Institutions
      108
    • retail
      107
    • Medical Devices
      100
    • Ceramics
      95
    • wood
      87
    • Transportation
      83
    • Medical and Welfare
      61
    • Petroleum and coal products
      60
    • Shipbuilding and heavy machinery
      52
    • Aviation & Aerospace
      47
    • Fisheries, Agriculture and Forestry
      39
    • self-employed
      23
    • Public interest/special/independent administrative agency
      21
    • equipment
      19
    • Mining
      17
    • Materials
      16
    • Research and development equipment and devices
      15
    • Government
      14
    • Finance, securities and insurance
      13
    • Individual
      10
    • Restaurants and accommodations
      8
    • cosmetics
      8
    • Police, Fire Department, Self-Defense Forces
      7
    • Laboratory Equipment and Consumables
      3
    • Contracted research
      3
    • Raw materials for reagents and chemicals
      2
  • Special Features
  • Ranking

    • Overall Products Ranking
    • Overall Company Ranking
Search for Products
  • Search for products by classification category

  • Electronic Components and Modules
  • Machinery Parts
  • Manufacturing and processing machinery
  • Scientific and Physics Equipment
  • Materials
  • Measurement and Analysis
  • Image Processing
  • Control and Electrical Equipment
  • Tools, consumables, and supplies
  • Design and production support
  • IT/Network
  • Office
  • Business support services
  • Seminars and Skill Development
  • Pharmaceutical and food related
  • others
Search for Companies
  • Search for companies by industry

  • Manufacturing and processing contract
  • others
  • Industrial Machinery
  • Machine elements and parts
  • Other manufacturing
  • IT/Telecommunications
  • Trading company/Wholesale
  • Industrial Electrical Equipment
  • Building materials, supplies and fixtures
  • software
  • Electronic Components and Semiconductors
  • Resin/Plastic
  • Service Industry
  • Testing, Analysis and Measurement
  • Ferrous/Non-ferrous metals
  • environment
  • Chemical
  • Automobiles and Transportation Equipment
  • Printing Industry
  • Information and Communications
  • Consumer Electronics
  • Energy
  • Rubber products
  • Food Machinery
  • Optical Instruments
  • robot
  • fiber
  • Paper and pulp
  • Electricity, Gas and Water Industry
  • Pharmaceuticals and Biotechnology
  • Warehousing and transport related industries
  • Glass and clay products
  • Food and Beverage
  • CAD/CAM
  • Educational and Research Institutions
  • retail
  • Medical Devices
  • Ceramics
  • wood
  • Transportation
  • Medical and Welfare
  • Petroleum and coal products
  • Shipbuilding and heavy machinery
  • Aviation & Aerospace
  • Fisheries, Agriculture and Forestry
  • self-employed
  • Public interest/special/independent administrative agency
  • equipment
  • Mining
  • Materials
  • Research and development equipment and devices
  • Government
  • Finance, securities and insurance
  • Individual
  • Restaurants and accommodations
  • cosmetics
  • Police, Fire Department, Self-Defense Forces
  • Laboratory Equipment and Consumables
  • Contracted research
  • Raw materials for reagents and chemicals
Special Features
Ranking
  • Overall Products Ranking
  • Overall Company Ranking
  • privacy policy
  • terms of service
  • About Us
  • Careers
  • Advertising
  1. Home
  2. IT/Telecommunications
  3. プログレス・ソフトウェア・ジャパン
  4. Product/Service List
IT/Telecommunications
  • Added to bookmarks

    Bookmarks list

    Bookmark has been removed

    Bookmarks list

    You can't add any more bookmarks

    By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

    Free membership registration

プログレス・ソフトウェア・ジャパン

addressTokyo/Minato-ku/4-11-22 Minamiazabu, Minamiazabu T&F Building 8F
phone03-6826-5720
  • Official site
last updated:Feb 27, 2024
プログレス・ソフトウェア・ジャパンlogo
  • Contact this company

    Contact Us Online
  • Company information
  • Products/Services(56)
  • catalog(56)
  • news(8)

プログレス・ソフトウェア・ジャパン List of Products and Services

  • category

1~45 item / All 56 items

Displayed results

class="retina-image"

Examples and Countermeasures of Supply Chain Attacks in the Manufacturing Industry [Guidebook Provided]

Explaining examples of "supply chain attacks" lurking in the manufacturing industry and the necessity of security measures. Including the case of Volkswagen! A guidebook is being offered!

In recent years, cyberattacks in the manufacturing industry have been on the rise. In particular, "supply chain attacks" targeting the supply chain have become a significant threat. In 2022, a parts supplier for Toyota Motor Corporation was hit by a cyberattack, resulting in a halt of production lines. Such attacks can cause damage not only to individual companies but also to the entire supply chain. Moreover, the damage from supply chain attacks is not limited to mere factory shutdowns. There is also the risk of confidential corporate information and personal data being leaked due to unauthorized access. Therefore, it is urgent to implement security measures for the entire supply chain. In response, our company, which provides tools for countering cyberattacks and supply chain attacks, is offering explanatory materials on cybersecurity and ransomware as measures against supply chain attacks! ■ Supply Chain Attack Countermeasure Guidebook - Ransomware Explanation - Zero Trust Explanation - Cybersecurity through Detection and Response to Network Threats and more *For more details, please download the PDF or contact us.

  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] The State of Network Operations in the Era of Cloud Computing and Telecommuting

Responding through "flow analysis" is becoming important! It reduces both time and costs.

This document explains the use of "flow analysis" tools as a way to manage network operations in the era of cloud computing and telecommuting. It also includes an explanation of the complexities and increased burdens on networks that are troubling IT departments due to cloud adoption and remote work. Additionally, we introduce the product overview of "Flowmon," which simultaneously achieves network analysis and security enhancement, so please feel free to read it. 【Contents】 ■ Chapter 1: The complexities and increased burdens on networks troubling IT departments due to cloud adoption and telecommuting ■ Chapter 2: Reducing both time and costs. The way of network operations in the era of cloud computing and telecommuting ■ Chapter 3: Simultaneously achieving network analysis and security enhancement with "Flowmon" *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Cyber Attack Countermeasure Case Study] Fukuoka University

We have published a case study on measures against cyber attacks that achieved full traffic visualization and advanced analysis!

As a countermeasure against cyber attacks, we would like to introduce the case of implementing 'Flowmon' at Fukuoka University. When exploring methods to safely stop the public NTP service, understanding and analyzing the entire traffic became a significant challenge. We achieved the visualization of all the traffic we needed, and the analysis, search, and report generation of the collected information became dramatically more efficient. We were able to reach the true starting line towards service cessation. [Case Overview (Partial)] ■Challenges - Exploring methods to safely stop the public NTP service - Understanding and analyzing the entire traffic *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Cyber Attack Countermeasure Case Study] RIKEN, National Research and Development Agency

We have published a case study on measures against cyber attacks, where we built a network visualization system and established a rapid incident response framework!

As a measure against cyber attacks, we would like to introduce a case where 'Flowmon' was implemented at the National Research and Development Agency, RIKEN. Until now, IT systems were built and operated at each location, making it a challenge to centrally visualize the communication status of all sites and ensure traceability of device and server communications. We have established a system that utilizes traffic information logs from all locations for incident response, allowing us to quickly identify problematic events and optimize the entire network. [Case Overview (Partial)] ■Challenges - Centralized visualization of communication status across all locations - Ensuring traceability of device and server communications *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Cyber Attack Countermeasure Case Study] Sega Holdings Co., Ltd.

We have released a case study on measures against cyber attacks that instantly visualized the traffic of the group company network through flow analysis!

As a countermeasure against cyber attacks, we would like to introduce a case where 'Flowmon' was implemented at Sega Holdings Co., Ltd. The number of servers and network devices has significantly increased, necessitating the establishment of a system to accurately grasp the entire network. We have become capable of instantly identifying overflow traffic, and we expect this to be effective in future network enhancement plans. [Case Overview] ■ Challenges - There was a need to establish a system to accurately grasp the entire network. - It took a considerable amount of time to investigate when any issues occurred in communication. ■ Results - Instant identification of overflow traffic. - Anticipated effectiveness in precise network enhancement plans. *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Cyber Attack Countermeasure Case] Okasan Information Systems Co., Ltd.

A case study of cyber attack countermeasures that easily visualizes the communication status of multiple securities systems has been released!

As a countermeasure against cyber attacks, we would like to introduce a case where 'Flowmon' was implemented at Okasan Information System Co., Ltd. In the operations and maintenance tasks, understanding the communication status of each system had become a challenge. A project to renew the WAN lines connecting the Okasan Securities Group companies and the data center began, making it urgent to grasp the communication status and organize the requirements. We were able to quickly collect the fundamental data necessary for the WAN renewal project, which greatly assisted in understanding the situation and organizing the requirements. The burden of daily system operations was reduced, and responses during failures became faster and more accurate. [Case Overview (Partial)] ■ Challenges - Understanding the communication status of each system was a challenge. - With the renewal project of the WAN lines for the intranet starting, it became urgent to grasp the communication status and organize the requirements. *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Cyber Attack Countermeasure Case] Sakura Information Systems Co., Ltd.

A case study on countermeasures against cyber attacks that enables behavior detection even on shared servers has been released!

As a measure against cyber attacks, we would like to introduce a case where 'Flowmon' was implemented at Sakura Information Systems Co., Ltd. When issues arise in the shared network portion, there was a challenge in grasping the overall situation from the service provider's side. We felt that at the very least, we should visualize the events occurring on our own center's network. With the renewal of our IaaS virtualization hosting service, we were able to enable behavior detection even on shared servers by implementing Flowmon + ADS. [Case Overview (Partial)] ■Challenges - Identifying the cause during high load occurrences is extremely difficult - At a minimum, visualization of internal events is essential *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Cyber Attack Countermeasure Case] Orange Slovakia

Published case studies of measures against cyber attacks that solved issues in the security operations department and the network operations department.

As a measure against cyber attacks, we would like to introduce a case where our security solution "Flowmon" was implemented for Orange Slovakia. The company's security operations and network operations departments wanted to significantly improve the overall availability and security of their network. After the implementation, information that could not previously be seen by the security operations department became visualized, and they gained better technology for discovering issues. [Case Overview (Partial)] ■Implemented Product: Progress Flowmon ■Industry: Telecommunications ■Challenge: To significantly improve the overall availability and security of the network *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Cyber Attack Countermeasure Case] Sunrex Technology

We are releasing case studies on measures against cyber attacks that have resolved bottlenecks in network security!

As a measure against cyber attacks, we would like to introduce a case where our security solution "Flowmon" was implemented at Sunrex Technology. The company believed it needed to address the increasing cyber attacks while maintaining growth, and sought a single solution that could visualize a large-scale network and resolve frequent security issues. By implementing our product, which visualizes large-scale networks and allows for comprehensive monitoring of network traffic, they were able to enhance security at each location. [Case Overview (Partial)] ■ Product Implemented: Progress Flowmon ■ Industry: Technology and Software ■ Challenge: Addressing increasing cyber attacks while maintaining growth *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Cyber Attack Countermeasure Case Study] Masaryk University

Publication of case studies on reliable network monitoring and countermeasures against cyber attacks detected in a university environment.

As a countermeasure against cyber attacks, we would like to introduce the case of our security solution "Flowmon" being implemented at Masaryk University. The security assurance at the university is conducted by CSIRT-MU, which operates 25 "Flowmon Probes" to ensure comprehensive monitoring of all critical points within the university network. By implementing this product, they have been able to receive specialized support, which has allowed them to focus on their core essential operations. 【Case Overview (Partial)】 ■Implemented Products - Progress Flowmon Collector - Progress Flowmon Probe - Progress Flowmon ADS ■Industry: Higher Education *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Network traffic monitoring tool 【Flowmon】

Strengthening tools for NetOps and SecOps! The collected data is processed using advanced algorithms.

"Flowmon" contributes to achieving the shared goal of the network operations department and the security department: a stable and robust digital environment. It can seamlessly integrate with many existing tools and platforms. It fully supports heterogeneous environments and extracts and collects telemetry data from routers, switches, firewalls, and the cloud. Additionally, it monitors network traffic and proactively alerts in case of potential breaches. 【Features】 ■ Seamless integration with many existing tools and platforms ■ Incidents are detected in real-time and displayed with rich context ■ Relevant information is extracted and clearly displayed on the dashboard ■ Operations are intuitive and easy to understand ■ Network traffic is checked from multiple perspectives *For more details, please refer to the PDF materials or feel free to contact us.

  • Other operation management software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Network Traffic Monitoring: Cyber Attack Countermeasure Case Studies

Utilizing action analysis algorithms to detect anomalies hidden within network traffic and identify signs of malicious behavior or breaches!

"Flowmon ADS" is a "network security tool" that uses artificial intelligence and machine learning to detect hard-to-find anomalies in network traffic. It complements traditional security tools and creates a multi-layered protection system that can detect threats at various stages of a breach. Additionally, it integrates with Suricata IDS running on Flowmon Probe to expand and enhance detection capabilities, providing additional context for behavior-based anomalies and incident detection. It also allows for the acquisition and storage of flow information such as NetFlow. We are also offering case studies and helpful materials (white papers) related to network security. 【Features】 ■ Multi-layered protection system that can detect threats at various stages of a breach ■ Expanded and enhanced detection capabilities ■ Provides additional context for behavior-based anomalies and incident detection *For more details, please refer to the PDF materials or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Network Traffic Monitoring: Flowmon APM

No limit on the number of applications! HTTPS traffic can be monitored under specific conditions.

"Flowmon APM" is a "network security tool" that can be deployed on hardware probes and is compatible with all virtual probe models. There is no limit to the number of licensed probes, and as long as you obtain the appropriate license and can receive technical support services, you can use as many 1G or 10G Flowmon Probes as APM probe functions. Additionally, it includes the Flowmon APM TG component, which provides automated testing and availability monitoring for critical applications. It is also capable of acquiring and storing flow information such as NetFlow. 【Features】 ■ No limit on the number of applications ■ HTTPS traffic can be monitored under specific conditions ■ No limit on the number of licensed probes *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is the load balancer "Kemp LoadMaster"?

Advanced features backed by LoadMaster technology, supported by customers around the world.

This document features advanced functions backed by the technology of the L4/L7 load balancer, "Kemp LoadMaster." It introduces a "flexible licensing model that can meet customer needs" and "a wealth of features applicable to various needs." It serves as a useful reference when considering implementation. [Contents] ■ Reason 1: Simple and easy to use ■ Reason 2: Flexible licensing model that can meet customer needs ■ Reason 3: A wealth of features applicable to various needs ■ Reason 4: Overwhelming price advantage ■ Reasons why LoadMaster is supported *For more details, please refer to the PDF document or feel free to contact us. *GSLB is available with the Enterprise Plus support subscription for all LoadMaster load balancers. GEO can also be used as a standalone virtual appliance.

  • Other operation management software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Load Balancer: Kemp LoadMaster Specifications

Introducing performance, CPU, memory, storage, Ethernet ports, and more!

This document is a datasheet that outlines the specifications of the load balancing hardware "Kemp LoadMaster," which supports L4/L7 load balancers. It introduces models such as the "LoadMaster X1," which has a maximum operating altitude of 5,000 meters, and the "LoadMaster X15," which features 2×500GB HDD (RAID1) storage. With images included, this document serves as a useful reference when considering implementation. We encourage you to take a look. 【Featured Products (Partial)】 ■ LoadMaster X1 ■ LoadMaster X3 ■ LoadMaster X15 ■ LoadMaster X25-NG ■ LoadMaster X40-NG *For more details, please refer to the PDF document or feel free to contact us. *GSLB is available with the Enterprise Plus support subscription for all LoadMaster load balancers. GEO can also be used as a standalone virtual appliance.

  • Other PCs and OA equipment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Load Balancer: Kemp LoadMaster

You can implement a wealth of features that meet customer needs at a cost that is free of waste!

The L4/L7 compatible load balancer "Kemp LoadMaster" is a simple and easy-to-use product. Depending on the application, high-performance load balancers (ADCs) can be deployed quickly and easily. Designed to optimize a wide range of applications, it significantly reduces the risk of unstable operation or downtime by allocating dedicated load balancers for applications and microservices in cloud and container environments. [Reasons to Choose Us] - Simple and easy to use - Flexible licensing model that meets customer needs - A wealth of features applicable to various needs - Overwhelming price advantage *For more details, please refer to the PDF document or feel free to contact us. *GSLB is available with the Enterprise Plus support subscription for all LoadMaster load balancers. GEO can also be used as a standalone virtual appliance.

  • Other operation management software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Network monitoring solution 'WhatsUp(R) Gold'

An IT infrastructure and network integrated monitoring solution supported by over 800 companies in various industries in Japan.

"WhatsUp(R) Gold" is an integrated monitoring solution for IT infrastructure and networks that monitors the increasingly complex IT infrastructure as a whole. It can monitor all devices assigned an IP address, whether on-premises or in the cloud. In addition to the basic functions of device monitoring, alerts, and actions, it includes necessary features such as wireless monitoring, virtual environment monitoring, public cloud monitoring, network flow monitoring and analysis, network device configuration management, and application management, all implemented in a single package module. [Features] ■ Outstanding cost performance ■ Dynamic map auto-display of infrastructure status ■ One-click display of necessary information ■ Easy to configure and ready for immediate operation ■ Monitoring of virtual environments, etc. *For more details, please download the PDF or feel free to contact us.

  • Server monitoring and network management tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

WhatsUp Gold Log Management

Simple and integrated log collection, alerts, and archiving! Also reduces licensing costs.

"WhatsUp Gold Log Management" allows you to easily visualize device log data and control important log information effortlessly. While monitoring meta-trends such as changes in log volume, it enables you to monitor, filter, search, and receive alerts for logs from all devices within the network. To meet compliance requirements, you can filter logs and archive historical data for a specified retention period in any designated storage location. 【Benefits】 ■Convenience ■Focus ■Alerts ■Archiving *For more details, please refer to the PDF document or feel free to contact us. *Customization of the network map is available.

  • Other operation management software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

WhatsUp Gold MSP Edition

Flexible network management for managed service providers!

"WhatsUp Gold MSP Edition" is a cost-effective, vendor-independent, proven easy-to-use solution. It is a reliable system for MSPs (Managed Service Providers) and SIers to provide end-users with exceptional network, system, and application management. It allows for centralized management in situations where distributed and different environments coexist. 【Features】 ■ Proactively monitor the entire network infrastructure ■ Quickly troubleshoot using intuitive maps and dashboards ■ Flexible and easy-to-understand pricing structure ■ Solutions that can flexibly adapt to customer needs *For more details, please refer to the PDF document or feel free to contact us. *Customization of the network map is possible.

  • Other operation management software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] IT Infrastructure Monitoring Buyer's Guide

Aiming to reduce the burden on the IT department! Posting about "the benefits of an integrated monitoring approach" and more.

This guide is structured to serve as a guideline for each organization to select the appropriate IT monitoring software according to their unique circumstances. First, it mentions five key challenges that the IT department must address. It then explains the advantages of using integrated monitoring software when tackling these challenges. Choosing suitable software that benefits the IT department is extremely important for efficient business operations. We encourage you to read on. [Contents] ■ Aiming to reduce the burden on the IT department ■ Key challenges affecting productivity in business operations ■ Advantages of an integrated monitoring approach ■ Criteria for selecting IT infrastructure monitoring solutions ■ Progress's IT infrastructure and application monitoring systems *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Network Traffic Monitoring: Flowmon Probe

The generated flow statistics are analyzed in detail! Introducing products that can also be used in virtual environments.

The "Flowmon Probe" is a high-performance appliance that monitors network traffic and generates IP flow statistics, serving as a "network security tool." The generated flow statistics are exported to storage and can be analyzed in more detail by Flowmon Collector or other NetFlow/IPFIX compatible applications. It provides the necessary NetFlow/IPFIX data for network operations, troubleshooting, performance monitoring, and security monitoring. It is also capable of acquiring and storing flow information such as NetFlow. 【Features】 ■ Available as a virtual appliance for deployment in virtual environments ■ Supports Flowmon IPFIX extensions ■ Supports various L2 protocols and encapsulation ■ Expandable with add-on modules (separate licensing required) *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cyber Attack Countermeasure Case: Kemp LoadMaster

Published case studies on measures against cyber attacks that have gained significant peace of mind through built-in cybersecurity features.

This is a case study introducing the implementation of the load balancer "Kemp LoadMaster" as a countermeasure against cyber attacks for Lamprell, a major player in the renewable energy and oil and gas energy markets. The company was looking for an effective application delivery solution that meets the necessary compliance requirements. After implementation, they achieved cost reductions and increased efficiency, providing significant peace of mind to both customers and employees. By utilizing this solution with built-in cybersecurity features, they were also able to meet client compliance requirements. [Case Overview] ■Challenges - Searching for an effective application delivery solution that meets necessary compliance. ■Results - Achieved cost reductions and increased efficiency, providing significant peace of mind to customers and employees. *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Network Traffic Monitoring: Flowmon FPI

Introducing products that allow for cause analysis when specific troubleshooting is needed!

"Flowmon FPI" is a "network security tool" designed to perform root cause analysis on selectively captured packet traces when specific troubleshooting is needed, such as client-server compatibility issues, protocol mismatches, or network failures. It is equipped with full packet capture capabilities that record network traffic from all Flowmon Probes deployed on the infrastructure in real-time. Additionally, the rolling buffer saves the first N packets of each flow in a memory buffer for a specified period, allowing for the capture of already initiated communications. It is also possible to obtain and store flow information such as NetFlow. 【Features】 ■ Equipped with full packet capture capabilities ■ Able to capture already initiated communications *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Network Traffic Monitoring: Flowmon Collector

Standalone appliance! Available as hardware or virtual.

The "Flowmon Collector" is a "network security tool" for collecting, long-term storing, and analyzing flow data from flow-enabled devices, Flowmon Probes, or other flow sources. It is equipped with the Flowmon Monitoring Center, which is a tool for flow collection, display and analysis, and automated reporting. Additionally, it can be utilized as a hardware appliance in EIA standard 1U or 2U rack sizes, or as a virtual appliance for deployment in virtual environments such as VMware, Hyper-V, KVM, AWS, Azure, or Google Cloud. It is also capable of acquiring and storing flow information such as NetFlow. 【Features】 ■ Equipped with two 10/100/1000Mbps Ethernet management ports ■ Remote control function for remotely monitoring the device's status ■ The virtual appliance is designed for deployment in virtual and cloud environments *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] Best Practices for Network Monitoring

Accurately grasp what is happening on the network! It is necessary to monitor and manage it rigorously.

To maintain high network performance and availability for business continuity, robust network monitoring is essential. This document covers topics such as "what to monitor," the "top 10 reasons for network monitoring," and network monitoring software "WhatsUp Gold." Various threats such as hackers, DoS attacks, and viruses can lead to downtime and data loss, potentially resulting in decreased overall reliability and profitability. We encourage you to read it. [Contents (excerpt)] ■ Introduction ■ Network management and network monitoring ■ Accurately understanding what is happening on the network ■ What to monitor ■ Top 10 reasons for network monitoring *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

LoadMaster hardware appliance

Ensure high resilience! Manage high-performance and scalable application delivery.

The "LoadMaster Hardware Appliance" is a load balancer that supports L4/L7 load balancing with high scalability, a wide range of features, and security. Through a web user interface, API, and Kemp 360 Central, it allows for easy management of application delivery. Supported by a robust support system, it can be operated at a reasonable total cost of ownership. 【Features】 ■ Resilient ■ Secure ■ Low ownership cost ■ Easy management *For more details, please refer to the PDF document or feel free to contact us. *GSLB is available with the Enterprise Plus support subscription for all LoadMaster load balancers. GEO can also be used as a standalone virtual appliance.

  • Other embedded systems (software and hardware)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

MOVEit(R) Automation

Easily automate workflows! Software that detects compliance risks.

MOVEit® Automation is managed file transfer (MFT) automation software that ensures increased reliability and security, making compliance adherence easier. By providing a safe and user-friendly workflow, it reduces the risk of human error and data loss, allowing you to avoid manual transfers that do not meet compliance requirements. [Features] - Minimizes the risk of data loss - Easily automates workflows - Detects compliance risks - Integrates with applications and services *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

MFT software "MOVEit(R) Transfer"

Industry-leading Managed File Transfer (MFT) software

MOVEit® Transfer is managed file transfer software that fully visualizes and controls various activities related to file transfers between partner companies, customers, users, and systems. It keeps files secure during transmission and while at rest, ensuring compliance with internal policies and regulations that must be adhered to. [Features] - Enhances security and ensures regulatory compliance - Flexible deployment and access options *For more details, please download the PDF or feel free to contact us.

  • Other operation management software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

MOVEit(R) Transfer

Industry-leading Managed File Transfer (MFT) software

MOVEit® Transfer is managed file transfer (MFT) software that provides management tools and visibility. It meets compliance standards, ensures the management and control of core business processes, and protects the transfer of confidential data between partners, customers, users, and systems. 【Features】 ■ Enhances security and ensures regulatory compliance ■ Flexible deployment and access options ■ Can be deployed as a service or implemented on-premises *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] American Savings Bank

Satisfied with the warning notification feature! Introducing cases where rapid problem-solving has become possible.

In 2020, SolarWinds was hit by a large-scale cyberattack, resulting in data breaches for many customers. American Savings Bank, which was looking for an alternative IT infrastructure monitoring solution, implemented 'Progress WhatsUp Gold.' After the implementation, they were able to gain detailed insights into the performance of their IT infrastructure and applications, enabling rapid problem resolution. Additionally, pre-configured alert notifications and automatically generated reports are being used effectively. [Challenges] ■ After SolarWinds' customers were affected by the cyberattack, they were looking for a scalable and user-friendly alternative IT infrastructure monitoring solution. ■ They had been consistently checking the status screens of their computers. *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

ECS Connection Manager

Maintain high performance for important applications with QoS control.

The "Progress Kemp LoadMaster ECS Connection Manager" is a product that enhances the availability, performance, and operation of Dell ECS object storage environments. It specifically addresses the challenges faced by Dell ECS customers, such as pharmaceutical companies, where data storage supports the core of their business. It improves the availability and performance of Dell ECS software-defined storage, maximizing the value of customers' infrastructure investments. 【Features】 ■ Highly scalable with zero downtime ■ S3 optimized scheduling ■ Automatic detection of S3 addressing methods ■ Dynamic global host resolution *For more details, please refer to the PDF document or feel free to contact us.

  • Server monitoring and network management tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Document] PPAP Elimination Solution Guide

Introducing the challenges of encrypted ZIP files and how to choose the right alternative products.

This document presents the challenges of encrypted ZIP files for information system (IT) personnel and how to choose the right alternative products. It introduces topics such as "What constitutes a reliable file sharing solution" and "Security features that alternative solutions should have," categorized by function name and overview. It includes a case study on the implementation of "MOVEit," which meets new needs for file transfer, making it a useful reference when considering implementation. 【Contents (partial)】 ■ Companies struggling to choose alternative solutions after "moving away from PPAP" ■ What constitutes a reliable file sharing solution ■ Online storage-integrated solutions are promising in terms of flexibility ■ Security features that alternative solutions should have ■ Certification by third-party auditing organizations and specialized institutions as a reference for evaluation *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Data] Comparison between competitor products and Progress Flowmon

There are six recommended selection points to consider! We will introduce the differences between our NDR system and those of other companies.

This document compares and introduces our network traffic monitoring tool "Flowmon" with products from other companies. It provides an overview of NDR (Network Detection and Response), introduces products from other companies, and highlights six points regarding the differences and considerations when choosing our product. The explanations are made clear with plenty of diagrams, so please make use of this when considering implementation. 【Contents】 ■ NDR - Network Detection and Response ■ Products from other companies ■ Comparison between other products and Flowmon ■ Features of Flowmon ADS ■ Signature-based detection ■ Integration of SIEM and Security Analytics *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] Multi-vector Defense Solutions Against Cyber Attacks

Evolving Cyber Attacks! An Introduction to Challenges and Attempts in Business

This document explains the challenges businesses face regarding cyber attacks and the solutions available. It recommends the integration of network detection and storage layers, and introduces the advantages of the solutions as well as how multi-vector defense solutions work. Please make use of this information for countermeasures against cyber attacks and ransomware attacks. 【Contents】 ■ Business Challenges ■ Integration of Network Defense and Storage Defense ■ Advantages of the Solutions ■ How Multi-Vector Defense Solutions Work ■ About Superna *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] Explanation of Zero Trust

Optimal Solution Selection! Best Practices and Guidelines for Strengthening Security

This document explains the strategic concept of "Zero Trust," which aims to protect organizations by assuming that adversaries may be lurking both externally and internally. It outlines the principles of Zero Trust, describes best practices for successfully implementing Zero Trust, mentions potential pitfalls and common mistakes, and provides guidance for selecting appropriate solutions. Please make use of this information when considering implementation. 【Contents】 ■ Introduction ■ Principles of Zero Trust ■ Best Practices for Implementation ■ Common Mistakes to Avoid ■ Network Detection and Response (NDR) Tools in Zero Trust Strategy ■ Conclusion *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Data] Cybersecurity through Detection and Response to Network Threats

The core of multi-layered defense against cyber attacks! Introducing the role of NDR.

This document explains the challenges that the cybersecurity department needs to address and analyzes the role of NDR in cybersecurity defense. It also provides a detailed description of the anomaly detection system, which is Progress's NDR product, and includes insights from market analysts such as Gartner regarding the NDR market, as well as evaluations of Flowmon ADS. Please make use of this information when considering implementation. 【Contents】 ■ Overview ■ Challenges faced by the cybersecurity department ■ Strengthening cybersecurity defense with NDR ■ Outstanding features of Flowmon ADS ■ Positioning of NDR in overall cybersecurity defense *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] Explanation of Ransomware

Prepare for attacks! Solutions to help build robust cybersecurity.

This document focuses on the threat of ransomware and outlines ways to mitigate risks. It introduces the ransomware threats of 2023, methods to minimize risks, and solutions to help build stronger cybersecurity. Please use this as a reference for ransomware countermeasures. 【Contents】 ■ Current threat landscape ■ What is ransomware? ■ Impact of ransomware attacks ■ Ransomware as a Service (RaaS) ■ Ransomware attackers *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Data] Transforming Network Operations with Enhanced Flow Data

Reconsider the old approach and break free from it! Provide scalability in preparation for the future.

This document is written in line with our belief that technology that helps expand to meet future performance and capacity needs integrates flow and packet-level visibility into a single versatile solution. We also introduce the fact that enhanced flow data is equally powerful for full packet capture and packet analysis. Please make use of this when considering implementation. 【Contents】 ■ Introduction ■ Traditional Approach: Packet Analysis ■ A New Approach to Network Monitoring: Enhanced Flow Data ■ Enhanced Flow Data vs. Packet Analysis ■ Specific Examples *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cyber Attack Countermeasure Case: Haga Hospital

Prioritize important network traffic! Introducing case studies of the network traffic monitoring tool "Flowmon."

In 2004, Haga Hospital in The Hague, Netherlands, implemented the network traffic monitoring tool "Flowmon" as a countermeasure against cyber attacks. The hospital undertook a large-scale infrastructure renovation project but was unable to properly visualize and analyze its extensive network infrastructure. In search of a new method to monitor data traffic and prioritize important traffic, the hospital adopted our product, which allowed for detailed traffic monitoring and improved overall security. [Case Overview] ■Challenges - Identify and stop unnecessary traffic - Understand actual network usage ■Results - The network was clearly visualized, enabling immediate response - Important network traffic for hospital operations was prioritized *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cyber Attack Countermeasure Case: Vanquish Tech

Providing clients with robust security solutions! Publicizing case studies on countermeasures against cyber attacks.

We would like to introduce a case where Vanquish Tech, a provider based in the UK that offers specialized IT services worldwide, has been able to collaborate with more customers through the deployment of our products. The company, which supports many businesses with enhancements to IT security systems and the creation of always-on VPNs, needed to understand the load balancing usage of its customers. By deploying the product, the company has been able to collaborate with more customers who require its expertise. [Case Overview] ■Challenges - Need to understand the load balancing usage of customers - Customers require advanced security infrastructure - Many companies encounter various difficulties during cloud migration ■Results - Able to collaborate with more customers who require expertise - The contract rate with end-user customers improved by 30% *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Volkswagen Slovakia

Gain visibility into complex infrastructure! Introducing the case study of the network traffic monitoring tool "Flowmon."

We would like to introduce the case study of Volkswagen Slovakia, one of the major companies in Slovakia, which employs approximately 11,000 people across two manufacturing plants, and has implemented the network traffic monitoring tool "Flowmon." As the company's infrastructure became increasingly complex, there was a need for a more efficient network security monitoring tool, leading to the adoption of this product. After implementation, they were able to detect and address security anomalies across their large-scale infrastructure. 【Case Overview】 ■ Challenges - A flexible security tool with comprehensive security monitoring capabilities for the entire company ■ Results - Detection of security anomalies across the large-scale infrastructure *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cyber Attack Countermeasure Case: Sakura Information Systems

IaaS provisioning through network traffic monitoring! Case studies on countermeasures against cyber attacks are now available.

We would like to introduce a case study where our products were implemented as a countermeasure against cyber attacks for Sakura Information Systems, which provides total support for solving a wide range of customer challenges. The company has been developing IaaS virtualization holding services, but it became clear that a robust traffic monitoring and behavior detection tool was needed to address the complex nature of shared services. As a result, they implemented the Flowmon Collector equipped with the ADS module, which enabled continuous monitoring of network traffic and anomaly detection, resolving the issues. [Case Overview] ■Challenges - Need for robust traffic monitoring and behavior detection tools - Network visualization ■Results - Enabled continuous monitoring of network traffic and anomaly detection *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Sega

Enhancing incident response for large-scale networks with the introduction of the network traffic monitoring tool "Flowmon"! Case study of our product implementation.

We would like to introduce a case study of Flowmon being implemented at Sega, one of the world's leading interactive entertainment companies, which has multiple offices around the globe. The company required visibility into their network and the ability to analyze the root cause when network troubles occurred. By implementing our product, they were able to gain the network visibility that was previously lacking, allowing them to quickly identify the causes of network issues. [Case Overview] ■ Challenges - Strengthening a large-scale network infrastructure and accurately understanding the whole - Need to ensure visibility across the entire network ■ Results - Achieved network visibility that was previously lacking - Became able to quickly identify the causes of network issues *For more details, please refer to the PDF document or feel free to contact us.

  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Load balancer: Replacement by LoadMaster

Optimization of Citrix Virtual Apps and Desktops! A better load balancer.

This document discusses the replacement of Citrix Virtual Apps and Desktops (StoreFront) with LoadMaster. LoadMaster significantly reduces TCO compared to Citrix ADC and is supported by a team that regularly achieves a customer satisfaction rate of 99%. It includes diagrams and is easy to reference, making it a worthwhile read. We encourage you to take a look. 【Contents】 ■ Optimization of Citrix Virtual Apps and Desktops ■ Superior Load Balancer ■ Features of LoadMaster ■ How it Works ■ Progress *For more details, please refer to the PDF document or feel free to contact us. *GSLB is available with the Enterprise Plus support subscription for all LoadMaster load balancers. GEO can also be used as a standalone virtual appliance.

  • Other operation management software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

LoadMaster Edge Security Pack (ESP)

Streamlining secure application delivery! Support for a wide range of authentication methods.

The "LoadMaster Edge Security Pack (ESP)" is an ideal product for integration with load balancing for secure application delivery. It offers a comprehensive set of features to meet your needs. It enhances the capabilities of the "LoadMaster Load Balancer" to protect applications exposed on the internet and improve user experience. 【Features (partial)】 ■ Microsoft TMG replacement ■ Pre-authentication ■ Single sign-on access across virtual services ■ Host and directory security ■ Customizable form-based authentication * For more details, please refer to the PDF document or feel free to contact us. * GSLB is available with the Enterprise Plus support subscription for all LoadMaster load balancers. GEO can also be used as a standalone virtual appliance.

  • Other operation management software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
Prev 12 Next
  • 義務化された熱中症対策に取り組む製造現場、工場、物流倉庫へ 排気熱風なく※室温-4.1℃の冷風を 工事不要で暑さ対策 気化式スポットクーラー Pure Drive ピュアドライブ ※環境条件…室温35℃/湿度50%/風量「中」
  • ASEANエリア タイ マレーシア シンガポール ベトナム フィリピン 電子部品保管に適した倉庫 保税・非保税の両方に対応した倉庫スペック 日本同様の高精度な在庫管理とピース単位の入出庫対応 拠点間を繋げるASEANのネットワーク
    • Contact this company

      Contact Us Online

    Products

    • Search for Products

    Company

    • Search for Companies

    Special Features

    • Special Features

    Ranking

    • Overall Products Ranking
    • Overall Company Ranking

    support

    • site map
    IPROS
    • privacy policy Regarding external transmission of information
    • terms of service
    • About Us
    • Careers
    • Advertising
    COPYRIGHT © 2001-2025 IPROS CORPORATION ALL RIGHTS RESERVED.
    Please note that the English text on this page is automatically translated and may contain inaccuracies.