Security software Product List and Ranking from 38 Manufacturers, Suppliers and Companies | IPROS

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

  1. あさかわシステムズ 大阪本社、東京支店、福岡支店、沖縄オフィス、仙台営業所、和歌山分室 Osaka//others
  2. ケーエスピー Osaka//Information and Communications
  3. ハミングヘッズ 本社 Tokyo//Information and Communications
  4. 4 KICOシステムズ Tokyo//Information and Communications
  5. 5 テクノブレイブ Tokyo//Information and Communications

Security software Product ranking

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

  1. Gulliver NEXT あさかわシステムズ 大阪本社、東京支店、福岡支店、沖縄オフィス、仙台営業所、和歌山分室
  2. IT Asset Management and Information Security Software SS1 ケーエスピー
  3. [Information Leakage Countermeasures] Security Platform 'SeP' ハミングヘッズ 本社
  4. 4 ScreenChaser KICOシステムズ
  5. 4 NeuShield Data Sentinel テクノブレイブ

Security software Product List

1~30 item / All 48 items

Displayed results

[Information] The three simplest measures to prevent security troubles.

Outstanding security professionals are on top of it! Introducing increasingly sophisticated cyber attacks and case studies of damage.

This document introduces three measures that companies should take to prevent security troubles. It discusses the expanding damage caused by malware and provides examples. It points out that 76% of the causes of security troubles are human errors and presents three measures to prevent them. It also introduces the OS-protecting security product 'AppGuard.' Please make use of this information when selecting products. 【Contents (Excerpt)】 ■ Chapter 1: The increasing priority of security enhancement year by year ■ Chapter 2: Over 70% of security troubles arise from employee errors ■ Chapter 3: Three measures to prevent security troubles ■ Chapter 4: No need to worry even if an intrusion occurs. What is the final defense, AppGuard? *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Is the security of the cloud email service okay?

Introduction to an integrated cloud security product that offers security features for email sending and receiving, as well as for web browsing.

"Matrix Cloud" is an integrated cloud security product that provides security features for email sending and receiving, as well as for web browsing. It is increasingly being used for countermeasures against impersonation (EMOTET), which traditional anti-malware measures can no longer fully prevent, as well as for information leakage prevention through attachment encryption and superior approval (third-party approval). Please consider it for minimizing security risks in cloud environments. ■ Basic Features - AI Anti-Spam (in-house developed engine) - AI Anti-Virus (in-house developed engine) - IP Reputation - Information Leakage Prevention - Attachment Encryption - Superior Approval - Temporary Hold Function for Sent Emails - Personal Information Protection Filter (planned for next version) - Simple Archive Function (requires HDD expansion contract) ■ Sanitization Features - Macro Removal - Attachment Image/Text Conversion - Attachment Deletion (specified file extensions) - HTML Email Body Text Conversion - URL Link Removal ■ Web Security Features - AI Anti-Malware (in-house developed engine) - URL Filtering

  • Other security systems
  • Other Software
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AssetView GOLD

A security software that allows you to add only the necessary features as needed!

~ There is software that allows you to add only the necessary features as needed ~ Have you ever purchased packaged software that has unnecessary features or lacks necessary ones? With AssetView GOLD, you can solve those concerns all at once! □ Purchase at minimal cost You can select and purchase five features, avoiding unnecessary implementation. Purchasing all features is also a great deal. □ Easy installation It has a feature for automatic installation on each PC, and adding features can be done with simple operations. □ Easy operation Operation is achieved with simple operations. In particular, the strengths are the ability to save past logs and the automatic version upgrade feature. ◆◆ If you would like a catalog, please inquire through the document request ◆◆ ~ You can view some content from the download ~

  • others
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Gulliver NEXT

Security that supports global operations!

■ Security that supports global operations! Inherits the functions of the trusted and proven 'Gulliver/Win32'! It is possible to set access permissions at the subsystem level and for each function, and additionally, security features can be equipped for each responsible person. Security settings can also be configured at the processing unit level, such as whether updates are allowed or not, and whether references are allowed or not. Furthermore, access permission management is possible by user, by function, and by processing.

  • Construction and process management software
  • Cost management and cost estimation software
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Sales Q Introduction Case] Eight Thousand Co., Ltd.

Contributing to work style reform! Introducing a case where shift adjustments could be made without worrying about job content.

We would like to introduce a case study of how Eight Thousand Corporation implemented "Hanbai Q" to enhance security and enable usage across multiple locations. The company was receiving a large number of malicious emails, including spam, and was considering the introduction of UTM due to the potential risks of virus infections. By implementing this solution, they were able to easily create an environment where work could be done from anywhere, significantly changing their work style. [Case Overview] ■ Issues - A large number of malicious emails, including spam, were being received. ■ Results - Thanks to our product's support for telecommuting, they were able to adjust shifts without worrying about their work content. *For more details, please refer to the related links or feel free to contact us.

  • Sales Management System
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[June 10] Invitation to the Web Seminar hosted by Rihyo Electro

Introduction to Windows 10 IoT and Intel(R) AI Tools - Medical Devices and Hospital Equipment Edition

Rihyo Electro Co., Ltd. will hold a webinar on June 10, 2020 (Wednesday) titled "Optimal for the Embedded Industry! Introduction to Windows 10 IoT and Intel(R) AI Tools - Medical Devices and Hospital Equipment Edition." In this seminar, we will introduce the latest information on Windows 10 IoT Enterprise suitable for embedded devices, McAfee Embedded security software, and the latest updates on Intel AI tool OpenVINO, along with case studies related to medical devices and hospital equipment. We invite you to take this opportunity to register for the seminar. 【Event Overview】 ■ Date and Time: June 10, 2020 (Wednesday) 16:00 - 17:30 (Entry available 10 minutes before start) ■ Participation Fee: Free <Pre-registration required> ■ Venue: Webinar tool "Cocripo" (https://www.cocripo.co.jp/) ■ Registration Method: Registration can only be done through our company website. *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Taiho Pharmaceutical Co., Ltd.

Swan Store has achieved a satisfactory level of security when handling highly confidential information!

We would like to introduce a case where Taiho Pharmaceutical Co., Ltd., which creates highly valuable new drugs and contributes to health, has implemented "SWANStor" from Area B Japan. The company commissions clinical trials to CROs (Contract Research Organizations) located around the world and has been accumulating information on the side effects of drugs obtained through that process in an internal web system. Side effect information is highly confidential, and they were comparing products that could achieve a higher level of security, including stronger communication encryption and authentication. [Case Study] ■ Product Implemented: SWANStor ■ Purpose of Implementation: To safely input highly confidential side effect information After comparing multiple products, it was decided to implement this product due to its advantages in "no changes required to firewall settings" and "the ability to deliver specific applications precisely." *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security/Internal Data Sharing and Information Communication

We will also build a firewall as a measure to prevent information leakage!

We provide appropriate IT solutions for "security/internal data sharing and information communication." Regarding security, we implement antivirus measures and establish firewalls. We can also handle software updates collectively. Additionally, for internal data sharing and information communication, we set up file servers to enable data sharing within the company. It is also possible to set access rights for certain data to manage it. [For concerns like these] ■ I want to protect computers and servers from viruses. ■ I want to prevent information leakage from the internal network. ■ I want to enable data sharing within the company. ■ I want to deepen communication within the company. *For more details, please refer to the related links or feel free to contact us.

  • Entrance and exit control system
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Data De-identification Solution "ZENMU"

Security measures that do not protect by converting and splitting data into meaningless data.

"ZENMU" is an open security infrastructure that "de-meaning" data, which differs conceptually from traditional encryption technologies. By converting and splitting data into meaningless data, it makes it unreadable with just one fragment, and it can only be restored when all distributed fragments are gathered. 【Features】 ■ Achieves robust security by storing fragments in multiple locations ■ Establishes information safety without user awareness ■ Liberation from new security costs *For more details, please download the PDF or contact us.

  • Company:ZenmuTech
  • Price:Less than 10,000 yen
  • Other Software
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

BlackBerry Spark UEM Suite

A solution that balances security and productivity. It supports various devices.

The "BlackBerry Spark UEM Suite" is a product that enhances productivity while ensuring and managing the security of all endpoints. Users can access the applications they need when they need them. Additionally, the IT department can provide high-class security without compromising productivity. We offer a variety of products designed to meet your needs. 【Features】 ■ Supports various devices ■ Users can access the applications they need when they need them ■ IT departments can provide high-class security without compromising productivity ■ Supports enterprise-level content security with CCP ■ Advanced productivity apps and built-in features *For more details, please refer to the PDF materials or feel free to contact us.

  • others
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

SASTIK III Network Isolation

Significant cost reduction! Achieving a simple and efficient network security system.

"SASTIK III Network Isolation" is a security solution that realizes the "α model" for municipal information security measures. It possesses only the necessary functions of "network separation" and "file sanitization," achieving a simple and efficient network security system. The file sanitization function can be performed with one click during data transfer to local storage, automatically processing the file sanitization. 【Features】 ■ Network separation ■ File sanitization ■ Developed in-house in 2016 ■ Adopted by 50 municipalities nationwide in Japan ■ Up to approximately 15,000 users can utilize a single system *For more details, please refer to the related link page or feel free to contact us.

  • others
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Linux kernel live patch tool "KernelCare"

The Linux kernel operates in a constantly updated state! Automatically applies vulnerability patches without rebooting.

"KernelCare" is a Linux kernel live patching tool that can always maintain a new security state. It applies ultra-fast, automated, reboot-free patches for security vulnerabilities in the Linux kernel. It ensures that no critical patches are missed. You can apply patches to running (or staging) servers automatically or manually without performance degradation or downtime. 【Features】 ■ Never miss critical patches ■ Significantly reduce downtime ■ Easy patching without rebooting ■ Operates in diverse servers and environments ■ Keeps the kernel up-to-date, improving service levels *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

One-stop solution for the EU Cyber Resilience Act

We provide a support system that covers all aspects of technology, tools, and certification for companies that are unsure where to start with CRA compliance!

Introducing a one-stop solution provided by IT Access for companies struggling to comply with the EU Cyber Resilience Act (CRA). Engineers with 15 to 30 years of experience assist companies that lack understanding of the CRA or find it difficult to determine compliance standards, supporting everything from organizing security requirements to modifications and obtaining certification. We also support the provision and implementation of necessary tools such as wolfSSL's "wolfBoot" and "wolfCrypt," as well as Onward Security's "SecDevice" and "SecSAM." Furthermore, we provide comprehensive support from evaluation in the test lab to application to the certification body DEKRA, offering holistic assistance for CRA compliance.

  • Security Assessment
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introduction to wolfSSL's Services

We can establish a system that efficiently achieves compliance with standards and product protection even in environments with strict security requirements!

This is an overview of the services provided by the American company wolfSSL, which offers security features for embedded devices and IoT devices. The lightweight and fast TLS library "wolfSSL" supports RTOS and embedded Linux, while ensuring compatibility with OpenSSL. Additionally, "wolfCrypt" can function as a standalone cryptographic module with FIPS compliance and hardware integration capabilities. "wolfBoot" supports secure boot and OTA updates, and also includes tamper detection features. These products are offered with commercial licenses and technical support, making them effective for industrial applications that require compliance with FIPS and ISO standards.

  • Digital Certificate
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Calico Cloud/Enterprise

Calico Open Source (Kubernetes CNI Plugin) Security Upgrade

The information is updated regularly, so please refer to the above URL for details.

  • Other Software
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Things to Address in 2022 [Security Measures]

We will introduce key points and security switches for matters that require strengthened measures!

In preparation for the day when measures to prevent the spread of viruses become even more essential, we would like to introduce the actions to be taken in 2022. Key points for strengthening measures include the "amendment of the Personal Information Protection Law," the "amendment of the Electronic Book Preservation Law," and "measures for telework PCs." Our security switch, 'SubGate,' allows for easy internal measures. It is suitable for preventing the spread of computer viruses, detecting and blocking harmful traffic, and preventing eavesdropping on internal IP phones and confidential data. [Key Points for Strengthening Measures] ■ Amendment of the Personal Information Protection Law Stricter reporting (mandatory), two types of reports (preliminary and final) ■ Amendment of the Electronic Book Preservation Law Changes in preservation methods, security of storage locations ■ Measures for Telework PCs Home cluster, censorship during internal connections *For more details, please refer to the PDF document or feel free to contact us.

  • Other security systems
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] BANDAI SPIRITS Co., Ltd.

Quickly grasp the status of email sending and any configuration issues! Introducing case studies of "DMARC/25 Analyze."

We would like to introduce a case study on the implementation of "DMARC/25 Analyze" at BANDAI SPIRITS Co., Ltd. In recent times, as security incidents have been increasing, the company had been relying solely on manual checks based on reports to confirm the existence of phishing emails impersonating their e-commerce site "Premium Bandai." With the introduction of "DMARC/25 Analyze," the company was able to easily quantify the status of phishing email countermeasures and actively detect such threats. This also significantly reduced the effort previously required. [Challenges Before Implementation] ■ The company was looking for a clearer and more robust way to confirm the existence of phishing emails, which had been unclear. *For more details, please refer to the PDF document or feel free to contact us.*

  • Data Backup
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Ricoh Company, Ltd.

Introducing a case study that achieved visualization of email system status and enhanced security!

We would like to introduce a case study of the implementation of the "Cloudmark Security Platform for Email" at Ricoh Company, Ltd. The company was in a black box state, completely unaware of what emails were flowing, in what quantities, and from where to where. To achieve security measures, promote digital transformation (DX), and improve operational efficiency, it was urgent to visualize and restructure the email system. To break this situation, the "Cloudmark Security Platform for Email" was introduced as an email gateway while standardizing the email software specifications. This enabled real-time visualization and control of traffic, resulting in significant improvements in security through finely tunable policies. [Challenges Before Implementation] - The email system was in a black box state, posing significant security risks. - Different organizations operated email systems and standards, leading to issues such as garbled text and undelivered emails. *For more details, please refer to the PDF document or feel free to contact us.*

  • Data Backup
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IT Asset Management and Information Security Software SS1

If you're unsure about IT asset management tools, choose SS1.

<Standard Features> ●Asset Management - Equipment Management: Automatically collects and centrally manages hardware and software information of IT assets such as PCs. - System Management: Thoroughly manages the status of networks including WAN, LAN, and hubs. - Software Management: Clearly displays the software and license usage status of managed PCs. - Contract Management: Manages contract information for equipment leasing/rental, with the ability to output reports. ●Operational Support - PC Operation Functions: Supports operational tasks such as file distribution, message delivery, and alerts for changes in IT assets. - Update Program Management: Enables management of major updates for Windows 10 and update programs for Office 365. - Working Hours Management: Restricts PC usage outside of working hours to reduce long working hours. - SS1 Operation Functions: Provides comprehensive support for operations, allowing for a consolidated view of changes in the management environment and violation alerts.

  • Traceability
  • Entrance and exit control system
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A new form of security that does not manifest even if breached.

A new concept in cybersecurity products called "AppGuard" that prevents malicious software such as ransomware from "activating even if it intrudes."

"AppGuard" is an endpoint security product that controls and disables malicious actions that can harm the system, regardless of the execution entity, unlike traditional antivirus software. [Features] - Prevents computer viruses from causing outbreaks even if they infiltrate - Controls and disables malicious actions that harm Windows OS, regardless of the execution entity - Ensures that malicious actions cannot be triggered through two layers of control - Provides reliable protection even in case of user "oversights" - Lightweight operation as it does not perform virus scans - Prevents the execution of ransomware *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Site "AV-TEST"

Detects spam and phishing emails! Equipped with a security certification program.

"AV-TEST" is an independent research organization based in Germany that conducts comparisons and individual tests of IT security products. It publishes test results for antivirus software compatible with operating systems such as Windows and Android. Additionally, it features security software that addresses ransomware technologies. [Services Provided] ■E-Mail Security Test ■AV-TEST seal of approval ■Monitored Malware Protection for Windows and Android ■The AV-TEST certificate for smart home and IoT *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Site Search
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

SmartPOP2Exchange

Reliable spam and virus protection! Can be installed independently of the incoming SMTP server.

"SmartPOP2Exchange" is a product developed by JAM Software. It provides POP3 and IMAP accounts to ensure all emails are reliably connected and filtered. It includes spam and virus protection. Additionally, it features automatic parallel processing of multiple email accounts and a comprehensive rule system. [Main Features (Partial)] ■ Flexibility between systems ■ Integrated modules ■ Configuration control features ■ Compatibility and integration ■ Reliable spam and virus protection *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other Software
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

senda

Practice of "Threat Hunting" to identify assets exposed to threats!

"Senda" is world-class internet intelligence. It can discover publicly exposed assets through shadow IT. It can automatically identify assets with configuration errors, as well as determine which assets have a high level of risk. Please feel free to contact us if you have any inquiries. 【Features】 ■ Discover publicly exposed assets through shadow IT ■ Automatically identify assets with configuration errors ■ Discover management consoles that remain exposed ■ Determine which assets have a high level of risk *For more details, please download the PDF or feel free to contact us.

  • others
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

LiveLiNQ Evidence

Evolving security that monitors both cyberspace and real space: "LiveLiNQ Evidence"

LiveLiNQ Evidence is software that achieves unprecedented security by being installed on critical system terminals. By converting the PC screen into a format that can be recorded by recording devices (NVR) and video management software (VMS), it provides a new form of security that merges video monitoring with information security. 【Visualizing Peace of Mind through Video Recording】 By recording every action on the PC as video, it leaves a clear record that anyone can visually verify, providing peace of mind in a "visible form." This achieves high transparency and reliability. 【Integrating Physical and Digital Security】 By simultaneously monitoring physical movements and digital operations, it allows for a multifaceted understanding of risks that traditional security systems often overlook, resulting in a stronger and more reliable security framework. 【Streamlining Audits and Quality Assurance】 The mechanism of synchronously recording camera footage and PC screens proves highly effective in investigating the causes of malfunctions and visualizing testing processes. It significantly reduces the effort involved in audits and quality assurance, enhancing safety while alleviating burdens.

  • Security cameras and surveillance systems
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

MatrixQuestWLAN/wpa 【WPA2 Supplicant】

MatrixQuestWLAN/wpa 【WPA2 Supplicant】

【Overview】 1. High Portability Designed to facilitate easy combinations with various wireless LAN drivers. 2. Supports WPA/WPA2 - WPA-PSK/WPA2-PSK - WPA-1X/WPA2-1X 3. Supports numerous authentication protocols - EAP-TLS - EAP-PEAP - EAP-TTLS - EAP-FAST (planned support)

  • Other Software
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AppGuard Small Business Edition

Launch of a new edition for 4.2 million small and medium-sized enterprises nationwide!

"AppGuard Small Business Edition" is a product designed for small to medium-sized enterprises with 1 to 300 employees, combining the simplicity of AppGuard Solo with the integrated management features of AppGuard Enterprise. 【Features】 ■ License for Small Businesses For small businesses that cannot make significant investments in security, we offer licenses at an affordable price for companies with up to 300 employees, maintaining the core technology of AppGuard. ■ Pre-installed Standard Settings By presetting policies at the same level as AppGuard Solo as default values, we can reduce the costs and time required for implementation. ■ Diversification of Implementation Services By diversifying the implementation service menu from simple options to traditional full services, we can provide proposals that match our customers' budget considerations. *For more details, please refer to the PDF document or feel free to contact us.

  • others
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Is your email threat protection foolproof? "Cloud Security Service"

Security measures during the migration to Microsoft 365, G Suite, etc. Can be evaluated with minimal impact on the existing environment by using in conjunction with current products.

"Aimatrix Security" addresses various threats to email. For those who want to consider it but are afraid that touching the current environment might disrupt business, or who want to try it discreetly because the introduction and installation of equipment are noticeable within the company, this is recommended. You can try out our cloud service security, which can be completed via email or phone, and by using it alongside your current products, you can evaluate our products without impacting your existing environment, depending on the settings. For operations and various settings that differ from the products you are currently using, our engineers are available to provide explanations and design support, regardless of whether you adopt or evaluate our products. Please feel free to consult us. 【Features】 ■ Unique functions of Aimatrix ■ Response to "spoofing emails" that impersonate your company ■ A stable email environment even with increased email traffic ■ Measures for transitioning to cloud services (such as Microsoft 365, G Suite, etc.) *For more details, please refer to the PDF document or feel free to contact us. *We also accept evaluation use (short-term lending). Please feel free to reach out.

  • Other security systems
  • Other Software
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Blocking unauthorized operations, malicious software, and access on PCs - IP-guard V3

Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leakage prevention through powerful violation control and logging at the kernel level.

IP-guard V3 is a product for "PC log management," "information security," and "IT asset management" that is adopted by over 20,000 major companies and government agencies in 27 countries worldwide. In Japan, it particularly contributes to solving various industry challenges with powerful controls and detailed recording functions that could not be achieved with other products. Additionally, the various functions composed of 14 types of modules allow users to select only what they need, minimizing the burden on users and reducing the workload for administrators. It is also a product that can meet almost all the requirements outlined in the safety measures of the My Number Act (government-issued security guidelines).

  • Other Software
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Corresponds to each requirement of the My Number Act's safety measures! IP-guard V3

Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leakage prevention through powerful violation control and logging at the kernel level.

IP-guard V3 is a product for "PC log management," "information security," and "IT asset management" that has been adopted by over 20,000 major companies and government agencies in 27 countries worldwide. In Japan, it particularly contributes to solving various industry challenges with powerful controls and detailed recording functions that were not achievable with other products. Additionally, the features, composed of 14 different modules, allow users to select only what they need, reducing the burden on users and alleviating the workload for administrators. Furthermore, it is a product that can meet almost all the requirements outlined in the safety measures of the My Number Act (government-issued security guidelines).

  • Other Software
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

GDATA Total Protection Multi-License Version

World-class detection rates protecting against all types of threats. Equipped with everything needed for the best protection and the highest peace of mind in PC security.

Protected from all types of threats with the world's highest virus detection rate. This all-in-one product is packed with security features of G DATA's personal products, including firewall, vulnerability protection, online banking protection, and backup, ensuring peace of mind.

  • Civil Engineering Company
  • Architectural CAD
  • Civil Engineering CAD
  • Security software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software