Security Solutions Product List and Ranking from 50 Manufacturers, Suppliers and Companies | IPROS

Last Updated: Aggregation Period:Feb 18, 2026~Mar 17, 2026
This ranking is based on the number of page views on our site.

Security Solutions Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Feb 18, 2026~Mar 17, 2026
This ranking is based on the number of page views on our site.

  1. DNPハイパーテック Kyoto//Information and Communications
  2. 旭電通 Tokyo//Trading company/Wholesale
  3. サブゲート Tokyo//Information and Communications
  4. 4 ヴィアスコープ Tokyo//Information and Communications
  5. 4 セカフィー Hyogo//Information and Communications

Security Solutions Product ranking

Last Updated: Aggregation Period:Feb 18, 2026~Mar 17, 2026
This ranking is based on the number of page views on our site.

  1. The app security solution 'CrackProof' DNPハイパーテック
  2. Security Switch "LG1000" 旭電通
  3. IPScan NAC ヴィアスコープ
  4. 4 Hardware Security Evaluation Service セカフィー
  5. 4 Egeria-Security PKUTECH

Security Solutions Product List

31~60 item / All 71 items

Displayed results

[Case Study] Nifty Corporation

A case where significant cost reduction was achieved while performing spam detection through the introduction of an add-on to the mail server!

We would like to introduce a case study of the implementation of "Cloudmark Authority" at Nifty Corporation. The company had been using products from other vendors for spam email countermeasures, but it became quite burdensome in terms of costs for both the products and infrastructure, as it was necessary to operate on a scale of dozens of servers. On the other hand, the company had previously implemented the MTA software "Cloudmark Security Platform," and since it was possible to add the email security solution "Cloudmark Authority" as an add-on, and the associated server operation costs and product costs matched their expectations, they decided to proceed with the implementation. After the implementation, not only did they achieve the expected spam detection, but they also eliminated the need for dozens of servers that were required for the operation of other products, resulting in significant infrastructure cost reductions. [Challenges Before Implementation] ■ They were operating a group of dozens of servers with products from other vendors for spam email countermeasures, which was a burden in terms of product and infrastructure costs. *For more details, please refer to the PDF document or feel free to contact us.

  • Data Backup
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Software "Cyberstanc"

Cyberstanc instantly detects cyber threats with advanced technology!

We would like to introduce 'Cyberstanc', handled by B7 Corporation. Cyberstanc provides a cybersecurity solution specialized in malware detection and response. The Cyberstanc platform is designed to enhance the effectiveness of existing security solutions by utilizing a self-learning engine that adapts and evolves to new threats. Cyberstanc instantly detects cyber threats with advanced technology. 【Key Features】 ■ Multi-tier Detection: Utilizes multiple layers of detection technology to capture and address threats. ■ Self-Learning Engine: Employs supervised and unsupervised learning algorithms to detect both known and unknown malware. ■ Extensive Simulation: Safely reproduces real attack scenarios using a sandbox to evaluate the effectiveness of security solutions. *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other Software
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IP reputation service "kr:ns (Chronos)"

Domestic Cybersecurity Solutions

"kr:ns (Chronos)" is an IP reputation service that matches a vast amount of observational data collected through an extensive observation network with your IP address as unique Threat Intelligence. We have entered into a joint research agreement with the National Institute of Information and Communications Technology (NICT) and the Cybersecurity Nexus (CYNEX) to evaluate the effectiveness of this Threat Intelligence. Additionally, this information can be integrated into and analyzed by SIEM systems. [Examples of analysis results obtained from dynamic analysis of IoT malware (partial)] ■ Target port numbers for scans conducted to spread infection ■ Information on communication destinations believed to be C2 servers ■ Port numbers that the malware listens on ■ DNS communications conducted by the malware *For more details, please download the PDF or feel free to contact us.

  • others
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Hardware Security Evaluation Service

It is possible to evaluate hardware attacks using a wide range of elemental technologies corresponding to each layer of hardware.

Our company conducts threat analysis related to hardware security. With services that assist in accurately understanding threats, we support the improvement of resistance to hardware attacks. Additionally, by understanding threats related to hardware security, we can implement countermeasures as needed and bring electronic devices with high hardware security performance to market. 【Service Details】 ■ Side-channel attack resistance assessment (analyzing electromagnetic noise during encryption operations) ■ Fault injection attack resistance assessment (injecting electromagnetic noise during encryption operations) *For more details, please download the PDF or feel free to contact us.

  • Security Assessment
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Switch TiFRONT

You can achieve "internal measures" that are possible because of the security switch.

The security switch TiFRONT can implement three internal measures: "threat prevention," "spread prevention," and "network visualization." It detects and prevents suspicious activities, such as a malware-infected PC being used as a stepping stone for unauthorized access to other PCs or file servers connected to the network, or being scanned by the network. Additionally, it identifies terminals infected with malware that have become zombie PCs, raises alerts for suspicious activities, and prevents the spread of infection by isolating them from the network. 【Features】 - Can be implemented without changing the layout - Detects, blocks, and releases attacks on the access network - Immediate blocking upon detection through integration with entrance and exit measures - Visualization of the internal network - Streamlining of operational management For more details, please contact us or download the catalog.

  • Internet System
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Case Study of Security Switch TiFRONT - Toei Densan Co., Ltd.

Replace the L2 switch with TiFRONT to enhance network security.

Tohkei Densan Co., Ltd. provides specialized solutions tailored to various industries and business types, as well as outsourcing services for information systems utilizing data centers. The company's challenge was how to ensure the security of Windows XP, which reached the end of support in 2014. We will introduce a case study on the implementation of the security switch "TiFRONT," which established a security system not reliant on definition files or the operating system. [Contents] - Windows XP terminals that cannot be migrated due to compatibility issues with business applications. - Features that detect behavior and prevent spread, as well as the ability to implement in a short period, were key selection points. - The construction method is adjusted according to the size of the department or location. - TiFRONT is also proposed to customers, creating new business opportunities. For more details, please contact us or download the catalog.

  • Internet System
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cyberware Inc. Business Introduction

We will pave the way for the next era of IT with our wealth of accumulated know-how and exceptional technological capabilities.

Cyberware Inc. is a company that provides services and products centered around IT technology. We believe that our value lies in anticipating major technological trends, taking risks, experimenting, and creating truly beneficial and human-centric solutions. 【Business Activities】 ■ System Consultation ■ Planning, development, and sales of proprietary software ■ Contract design and development of information systems *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software
  • Other security systems
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Control System Security Solution

Achieving continuous and stable operation of control systems! Security measures focused on availability.

The "Control System Security Solution" organizes the necessary security requirements for your control systems and provides measures that do not affect the currently operating control devices and terminals. Consultants familiar with the specific security requirements of control systems and industry guidelines analyze security risks and propose measures tailored to the challenges. We implement availability-focused security measures that minimize the impact on the operational systems. Additionally, we combine our own and Hitachi Group products to provide comprehensive support from planning to design, construction, operation, and monitoring. 【Features】 ■ Achieves continuous and stable operation ■ Proposes measures tailored to challenges by consultants ■ Implements availability-focused security measures ■ Provides comprehensive support from planning to design, construction, operation, and monitoring *For more details, please refer to the PDF materials or feel free to contact us.

  • Firewall
  • Entrance and exit control system
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email Security "Matrix Scan APEX III"

Top-class spam and malware protection in Japan! Concentrated capture of Japan-specific spam emails to achieve a secure email environment.

The "Matrix Scan APEX III" is an email security appliance designed to combat spam emails and malware. The domestically developed "msec technology" is a patented proprietary technology. The variable algorithm used for detecting and determining spam emails evolves effectively against the ever-changing nature of spam. It focuses on capturing spam emails unique to Japan, ensuring a secure email environment. ■ Basic Functions - AI Anti-Spam (in-house developed engine) - AI Anti-Virus (in-house developed engine) - IP Reputation ■ Offered (Appliance) Models - Entry Model (Low Range Model) - 1U Rack Mount Type - Transparent type specification can be supported as an option (Bypass NIC) - Standard Model (Mid Range Model) - 1U Rack Mount Type - RAID1 - Bypass NIC transparent type support - Enterprise Model (High Range Model) - 1U Rack Mount Type - RAID10 - Bypass NIC transparent type support * Multi-unit configurations are supported for any of the models.

  • Other security systems
  • Other Software
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Free rental of evaluation machine [SPAMSNIPER]

SpamSniper Evaluation Machine Free Rental Service

We are offering the SpamSniper evaluation unit for free. Here is an introduction to the SpamSniper free evaluation unit rental service. ■□■Features■□■ ~ One device, four roles: SpamSniper's multi-layered defense ~ ■ Information leakage prevention ■ SMTP attack defense ■ Virus email blocking ■ Spam email blocking ■ There are no functional restrictions on the evaluation unit, so you can evaluate it in a real environment and according to actual operations. For other features and details, please contact us.

  • Other Software
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Access Control for USB Devices: 'LB USB Lock Plus'

Unauthorized USB memory - Shut out hard drives.

This is software to control the use of USB-connected storage such as USB flash memory. ■ Settings for "Allow Access," "Deny Access," and "Read-Only" are available ■ Access control via a whitelist ■ Easy setup in wizard format ■ Measures against information leakage for PCs handling personal information! There is also a higher-end product called 'LB USB Lock Pro.' 【Function Comparison】 https://www.lifeboat.jp/products/ulp1/index.php?hn=hikaku&t_no=1&ht=-130

  • Other Software
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Solution EndianFirewall4iOffice

Worldwide connectivity with high-level security.

Endian 4i is an ideal solution for satellite offices and factories, and there are two versions available: Office and Industrial. Both versions are equipped with the necessary features to connect each location via a secure network.

  • others
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security product 'APPGUARD' that can counter Emotet.

"Prevent before being attacked" AppGuard is a security product that is not detection-based like traditional ones. It is OS protection-based and blocks threats at the stage of the attack.

The OS protection type does not perform detection or identification but protects the OS core, safeguarding the PC from any threats, whether known or unknown. AppGuard protects the OS itself and does not harm the system. Instead of checking each file individually, it immediately shuts out any abnormal processes that may indicate malware, focusing on protecting the system. AppGuard employs cybersecurity technology that has not been breached in over 20 years by U.S. government agencies. *AppGuard Marketing Co., Ltd. HP link: https://lp.appguard-m.com/security_measures 【Features】 ■ Prevention of unknown malware execution ■ Prevention of ransomware execution ■ Prevention of drive-by download execution ■ Prevention of fileless malware execution ■ Prevention of confidential information leakage due to malware ■ Prevention of OS tampering *For more details, please refer to the PDF materials or feel free to contact us.

  • Security Assessment
  • Other Software
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cybersecurity solution "SecureQUEST"

To all the members of the information systems department in the automotive industry who are facing security threats all alone!

"SecureQUEST" is a cybersecurity solution for individual information systems developed by the information systems department of an automotive industry supplier. While addressing short-term risks through alert monitoring and log analysis, it supports the long-term security enhancement of your IT environment from both system and operational perspectives. By providing IT technology, it ensures the safety necessary for the entire supply chain to focus on business, ultimately contributing to the stability and development of the entire industry. 【Features】 ■ "Support Partnership" leveraging in-house operational expertise ■ Gradual security enhancement even after implementation ■ Monitoring of unauthorized sign-ins ■ Easy-to-understand monthly reports ■ Comprehensive support for overseas locations *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Data security solution "SecureZIP"

Supports major platforms from mainframes to servers and desktops!

SecureZIP offers robust security features and ZIP functionality, providing secure file transfer and data backup solutions for all major platforms from mainframes to servers and desktops. It is very user-friendly and easy to operate based on ZIP, with file encryption/decryption as simple as zipping a file. IT department administrators can provide consistent centralized management for end users, including encryption features, digital certificate management, and password management. 【Product Lineup】 ■SecureZIP for Server (for server OS) ■SecureZIP for i5/OS (for midrange) ■SecureZIP for Windows Desktop (for client OS) ■SecureZIP CLI [Desktop Only] (for client OS) ■SecureZIP for Mac OS X, etc. *For more details, please download the PDF or feel free to contact us.

  • Other Software
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security solution "NISG 3,000 Series"

Provision of integrated management functions.

The "NISG 3,000 Series" is an integrated threat management appliance (UTM) that consolidates all security features into one. It protects servers and clients while providing integrated management capabilities. It is equipped with excellent security measures in a compact body, safeguarding corporate offices from internet threats. 【Features】 ■ Integration of all security functions into one ■ Protection for servers and clients ■ Provision of integrated management capabilities *For more details, please contact us or download the catalog.

  • others
  • Firewall
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

5G security solution

Providing security and scalability in the transition to 5G mobile networks!

Our company provides highly scalable security solutions, anticipating various scenarios of 5G networks. We offer mobile communication operators evolving their networks for 5G the highest levels of flexibility, scalability, and protection. Robust firewalls and DDoS mitigation and detection technologies can be deployed in various form factors (physical, virtual, bare metal, container) according to individual network topologies (4G, 5G-NSA, MEC, 5G SA). 【Main Solutions】 ■ Gi-LAN Security ■ Mobile Roaming Security ■ Network Slicing ■ DDoS Attack Defense Covering All Networks ■ Secure and Efficient MEC *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Endpoint Security Solution CROWDSTRIKE

Covering the lifecycle of security measures with a single agent!

We would like to introduce "CROWDSTRIKE," which we handle. It is designed with the premise of collaboration between the cloud and endpoints. It allows for the aggregation, analysis, and sharing of everyone's (Crowd) data. Additionally, through the threat hunting service "OVERWATCH," we can access logs from all users around the world, discover threats that machines could not find, and register alerts in the system. 【Features】 ■ Cloud-native ■ Lightweight single agent ■ Threat hunting service "OVERWATCH" *For more details, please refer to the related links or feel free to contact us.

  • Firewall
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[File Transfer Service Case Study] NEXCO Systems

Introducing a case study that achieved enhanced security and single sign-on with the internal information infrastructure! (Crypto Delivery)

We would like to introduce a case study of the implementation of "Crypto Delivery" at NEXCO Systems Co., Ltd., which is responsible for everything from the development to the operational management of core systems. The company received requests from customers to create a more secure file transmission system and proposed our cloud service product. By achieving ID/password integration with the existing internal authentication infrastructure, they significantly streamlined access management for approximately 5,300 accounts, leveraging the cost-effectiveness of the cloud while realizing robust and user-friendly email security. 【Benefits of Implementation】 ■ Enabled single sign-on with the internal authentication infrastructure, securely and efficiently managing ID/password operations for about 5,300 users. ■ Eliminated costs associated with the on-premises era, resulting in significant cost savings. ■ Achieved robust and user-friendly email security. *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall
  • others
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study on High-Permission ID Management] Idemitsu Kosan Co., Ltd.

Significant cost reduction! Introducing a case study of an access management tool implemented for internal control.

We would like to introduce the case of Idemitsu Kosan Co., Ltd., which has implemented "SecureCube Access Check" for centralized management of personal IDs and logs. One of the features of the "Financial Instruments and Exchange Act," which was applied starting in the fiscal year 2008 in accordance with the U.S. Sarbanes-Oxley Act (SOX), is the clear incorporation of internal controls related to information systems. As a major company in oil refining and sales, Idemitsu Kosan has adopted this product for access management to its information system infrastructure as one of its measures to comply with this regulation. This has enabled them to achieve efficient security management economically. 【Case Overview】 ■ Client: Idemitsu Kosan Co., Ltd. ■ Product Implemented: SecureCube Access Check ■ Implementation Effects - Strengthened security regarding access to numerous servers in the information system infrastructure - Significant cost reduction - Achieved efficient operations *For more details, please refer to the PDF document or feel free to contact us.

  • Other Management Services
  • Other security systems
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Endpoint security solution "Cybereason"

Dramatically improve your security environment! Targeted cyber attack countermeasure solution.

"Cybereason" is a cloud-based security solution that analyzes vast amounts of endpoint log data using proprietary analytical expertise powered by AI to detect signs of cyber attacks in real-time and address the challenges organizations face in their cyber attack prevention efforts. This enables immediate detection and response to the increasingly diverse targeted cyber attacks and ransomware that have been on the rise lately. [Features] - Easy implementation and lightweight operation - Instant identification of the overall picture of attacks - User-friendly management interface with visualized data - Real-time detection of malicious behavior *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The app security solution 'CrackProof'

Security software that protects applications from cracking (unauthorized analysis and tampering).

"CrackProof" is a security software that powerfully protects applications from various types of cracking. It prevents both file-level analysis (static analysis) and analysis during program execution using debuggers and other tools (dynamic analysis). High-level analysis countermeasures are achieved with simple operations. Processing is completed just by uploading the app to the cloud. You can start using it from the day it is implemented. Additionally, since the app is directly subjected to security processing, there is no need to incorporate it into the source code during the development stage. It can also be easily applied to already developed apps. *Some exceptions may apply depending on the OS. 【Features】 ■ Easy security processing ■ Prevents static and dynamic analysis ■ Almost no performance degradation ■ Flexible security level settings ■ Ongoing support after implementation to work together with customers on countermeasures *For more details, please download the PDF or feel free to contact us.

  • Other Software
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Smart Security Solution

Lead the event to success with perfect preparation! Achieve high safety and energy efficiency with solid-state batteries.

We offer a rental service called "Smart Security Solution," which sets a new standard for event management. We provide rentals such as "Evolv Express," which dramatically changes entrance security for large-scale events, and the portable power supply "B3300SST." Please feel free to contact us when you need our services. 【Features of this rental service】 ■ Rental of security equipment necessary for event hosting as a set ■ Reduces stress for both attendees and organizers, providing a top-level customer experience ■ Excellent portability allows for quick setup *For more details, please download the PDF or feel free to contact us.

  • Measurement and analysis equipment leasing and rental
  • Measurement and Inspection
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introduction to Control Security Solutions for Factories and Power Generation Facilities

Support for the formulation of action plans and the introduction of security equipment. Courses and exercises to experience cyber attacks through board games are also available.

We provide "Control Security Solutions" targeting factories and power generation facilities based on our experience and know-how gained from obtaining CSMS certification. We conduct assessments and consulting for our customers' factories and power generation facilities, supporting the formulation and execution of action plans and the introduction of security measures. Additionally, we offer courses and exercises on control system security using board game-style content provided by Kaspersky. 【We solve the following concerns】 ■ Not being able to grasp the current situation of their own plant's systems ■ While measures are being taken, unsure if risks are being reduced across the entire plant ■ Feeling the need for measures but not knowing where to start *For more details, please refer to the materials available for download in PDF format. Feel free to contact us as well.

  • Security Assessment
  • Other security systems
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

ZENMU for IOT

Using secret dispersal technology to make data meaningless! Safe storage and management on the cloud is possible.

"ZENMU for IOT" allows for safe storage and management in the cloud. It enables reductions in communication costs and storage costs. In the future, it will contribute to measures against information leakage and data tampering on the internet. 【Features】 ■ Reduction of communication costs ■ Reduction of storage costs ■ Safe storage and management in the cloud ■ In the future - Measures against information leakage and data tampering on the internet *For more details, please refer to the PDF document or feel free to contact us.

  • Other security systems
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Endpoint protection product "AppGuard"

Patent obtained! Endpoint security that does not seek threats.

"AppGuard" is an innovative patented endpoint protection product that blocks threats at the stage of attack, rather than relying on traditional "detection technology" types (such as definition files, machine learning, reputation, whitelists, etc.). It limits the operational scope of processes, allowing normal operations while completely blocking and preventing unauthorized processes, access to memory, writing, and actions that violate policies related to critical components of the OS. [Features] - Prevention of unknown malware execution - Prevention of ransomware execution - Prevention of drive-by download execution - Prevention of fileless malware execution - Prevention of confidential information leakage due to malware, etc. *For more details, please download the PDF or feel free to contact us.

  • Firewall
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security solution "AppGuard"

New concept OS-protect type endpoint security!

"AppGuard" is an OS-protecting endpoint security that protects PCs from any threats, whether known or unknown, without performing detection or identification. As the name suggests, being OS-protecting means it safeguards the OS itself and does not harm the system. Furthermore, users can use programs they have installed without the need for listing (policy settings), and it is also possible to apply updates to those software without changing settings. [Features] ■ Does not harm the system regardless of unknown, zero-day, or known threats (prevents unauthorized actions in advance) ■ Ensures system safety *For more details, please download the PDF or contact us.

  • Firewall
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security solution "ZENMU for PC"

A security solution for PCs that enables operations that do not lead to information leaks!

"ZENMU for PC" is a security solution based on the premise that "information can be stolen," which renders data on the PC meaningless by splitting it into two parts: one part is stored on the PC's internal HDD, and the other part is stored on external storage media such as USB drives, smartphones, or the cloud. It is widely applicable for taking PCs outside the company, promoting telework, and ensuring PC security within the organization. 【Features】 ■ Splits and stores data on the PC between the internal HDD and external storage ■ The second split can be backed up to other external storage ■ Can roll back to the previous generation (the last time it was unmounted) *For more details, please download the PDF or feel free to contact us.

  • Security Assessment
  • WAF
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email Security "Vade for M365"

We will strengthen the email security of Microsoft 365, which is prone to attacks.

"Vade for M365" is a cutting-edge email security solution that has been adopted by the filtering services of the three major carriers in Japan. Utilizing over 1 billion mailbox data, which is among the largest in the world, our AI-driven threat detection capabilities and architecture that resolves the challenges of traditional email security all come together with simple operations through API integration with Microsoft 365. We invite you to experience it. [Features] ■ Overcoming challenges of existing email security ■ High detection rate ■ Simple verification, implementation, and operational management *For more details, please download the PDF or feel free to contact us.

  • Other security systems
  • Security Assessment
  • Security Solutions

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration