soft(File Server) - メーカー・企業と製品の一覧 | イプロス

更新日: 集計期間:Mar 18, 2026~Apr 14, 2026
※当サイトの各ページの閲覧回数を元に算出したランキングです。

softの製品一覧

1~6 件を表示 / 全 6 件

表示件数

Software "SECUDRIVE File Server"

High-security, low-cost, and highly convenient file server security software!

"SECUDRIVE File Server" is a security software that protects Windows file servers with powerful DLP (Data Loss Prevention) features and can isolate confidential data within the file server from ransomware. It only requires installing the software on the file server or client PCs currently in use, eliminating the need for new capital investment. You can utilize standard Windows features such as user permissions, folder sharing, file management, and Active Directory as they are. 【Features】 ■ Data leakage prevention ■ Ransomware blocking ■ Integration with standard Windows features ■ File operation log management ■ Support for cloud server environments (EC2, Azure) ■ Easy to implement and operate without additional servers *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment
  • Other Software
  • soft

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Supports major CAD software! Confidentiality leakage prevention 'SECUDRIVE'

Security software that addresses measures against the leakage of confidential information such as blueprints! It is possible to control copying, printing, email attachments, and screen captures!

"SECUDRIVE File Server" is a security software that protects Windows file servers with powerful DLP (Data Loss Prevention) features and can isolate confidential data within the file server from ransomware. By simply installing it, you can control saving to local PCs or USB drives, printing, and screen captures. 【Features】 ■ DLP (Data Loss Prevention) functionality ■ Ransomware blocking ■ Integration with Windows standard features ■ File operation log management ■ Support for cloud server environments (EC2, Azure) ■ Easy to implement and operate ● In addition to data loss prevention, please consult our infrastructure team regarding server implementation or virtualization/cloud migration of existing systems. *For more details, please request documentation or view the PDF data from the download.

  • Other Software
  • soft

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

NeuShield Data Sentinel

With one click, free the system from ransomware encryption!

"NeuShield Data Sentinel" is a newly conceived security software developed under a unique concept. By simply installing this product on a PC and performing a few easy settings, a protective layer (shield) of very small software size is created. If an attack by malicious programs is detected, the surface of the shield created for protection can be separated and eliminated with a click operation, without any downtime. 【Main Features】 ■Mirror Shielding ■One-Click Restore ■Boot Protection ■Data Engrams ■Disk Protection ■Cloud Drive Protection ■File Lockdown *For more details, please download the PDF or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Software "Atozed Software"

Offering three types of licenses: CrossTalk, IntraWeb, and Indy in Depth!

Atozed Software is software for developers. It offers "CrossTalk," which allows the use of .NET code and libraries in Delphi programs, and "IntraWeb," which is fully integrated into the Delphi platform. Additionally, we provide a book about the Indy library titled "Indy in Depth." 【Product Overview】 ■Type: Shareware ■Language: English *For more details, please refer to the related links or feel free to contact us.

  • 企業:B7
  • 価格:Other
  • Other Software
  • soft

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Log compare for AccessMatrix UCM

Are you spending a lot of man-hours on log reconciliation work? Introduction to privileged ID management solutions.

If you introduce the privileged ID management product "AccessMatrix UCM" (hereinafter referred to as UCM), you can implement the application/approval of privileged ID passwords through a web-based workflow, and all of those records will be saved as logs. However, there is no function to reconcile those logs with the logs of operations performed using privileged IDs. "Log compare for AccessMatrix UCM" is a privileged ID operation management solution that allows you to understand the usage status of privileged IDs and identify privileged IDs not managed by UCM by reconciling the logs of UCM with the logs of the systems managed by UCM. 【Main Features】 ■ Detection of unauthorized logins - Use of privileged IDs not managed by UCM ■ Detection of logins outside the designated period - Usage history of privileged IDs that deviated from the application period of UCM ■ Confirmation of logins within the designated period - Usage history during the application period by privileged IDs managed by UCM *For more details, please refer to the PDF document or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録