Security software Product List and Ranking from 36 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. アイマトリックス Kanagawa//Information and Communications
  2. サスライト Tokyo//others
  3. アイティアクセス 本社 Kanagawa//others
  4. KICOシステムズ Tokyo//Information and Communications
  5. あさかわシステムズ 大阪本社、東京支店、福岡支店、沖縄オフィス、仙台営業所、和歌山分室 Osaka//others

Security software Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. Is the security of the cloud email service okay? アイマトリックス
  2. SASTIK III Network Isolation サスライト
  3. One-stop solution for the EU Cyber Resilience Act アイティアクセス 本社
  4. ScreenChaser KICOシステムズ
  5. Gulliver NEXT あさかわシステムズ 大阪本社、東京支店、福岡支店、沖縄オフィス、仙台営業所、和歌山分室

Security software Product List

1~15 item / All 50 items

Displayed results

[Information] The three simplest measures to prevent security troubles.

Outstanding security professionals are on top of it! Introducing increasingly sophisticated cyber attacks and case studies of damage.

This document introduces three measures that companies should take to prevent security troubles. It discusses the expanding damage caused by malware and provides examples. It points out that 76% of the causes of security troubles are human errors and presents three measures to prevent them. It also introduces the OS-protecting security product 'AppGuard.' Please make use of this information when selecting products. 【Contents (Excerpt)】 ■ Chapter 1: The increasing priority of security enhancement year by year ■ Chapter 2: Over 70% of security troubles arise from employee errors ■ Chapter 3: Three measures to prevent security troubles ■ Chapter 4: No need to worry even if an intrusion occurs. What is the final defense, AppGuard? *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Is the security of the cloud email service okay?

Introduction to an integrated cloud security product that offers security features for email sending and receiving, as well as for web browsing.

"Matrix Cloud" is an integrated cloud security product that provides security features for email sending and receiving, as well as for web browsing. It is increasingly being used for countermeasures against impersonation (EMOTET), which traditional anti-malware measures can no longer fully prevent, as well as for information leakage prevention through attachment encryption and superior approval (third-party approval). Please consider it for minimizing security risks in cloud environments. ■ Basic Features - AI Anti-Spam (in-house developed engine) - AI Anti-Virus (in-house developed engine) - IP Reputation - Information Leakage Prevention - Attachment Encryption - Superior Approval - Temporary Hold Function for Sent Emails - Personal Information Protection Filter (planned for next version) - Simple Archive Function (requires HDD expansion contract) ■ Sanitization Features - Macro Removal - Attachment Image/Text Conversion - Attachment Deletion (specified file extensions) - HTML Email Body Text Conversion - URL Link Removal ■ Web Security Features - AI Anti-Malware (in-house developed engine) - URL Filtering

  • Other security systems
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AssetView GOLD

A security software that allows you to add only the necessary features as needed!

~ There is software that allows you to add only the necessary features as needed ~ Have you ever purchased packaged software that has unnecessary features or lacks necessary ones? With AssetView GOLD, you can solve those concerns all at once! □ Purchase at minimal cost You can select and purchase five features, avoiding unnecessary implementation. Purchasing all features is also a great deal. □ Easy installation It has a feature for automatic installation on each PC, and adding features can be done with simple operations. □ Easy operation Operation is achieved with simple operations. In particular, the strengths are the ability to save past logs and the automatic version upgrade feature. ◆◆ If you would like a catalog, please inquire through the document request ◆◆ ~ You can view some content from the download ~

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Gulliver NEXT

Security that supports global operations!

■ Security that supports global operations! Inherits the functions of the trusted and proven 'Gulliver/Win32'! It is possible to set access permissions at the subsystem level and for each function, and additionally, security features can be equipped for each responsible person. Security settings can also be configured at the processing unit level, such as whether updates are allowed or not, and whether references are allowed or not. Furthermore, access permission management is possible by user, by function, and by processing.

  • Construction and process management software
  • Cost management and cost estimation software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Sales Q Introduction Case] Eight Thousand Co., Ltd.

Contributing to work style reform! Introducing a case where shift adjustments could be made without worrying about job content.

We would like to introduce a case study of how Eight Thousand Corporation implemented "Hanbai Q" to enhance security and enable usage across multiple locations. The company was receiving a large number of malicious emails, including spam, and was considering the introduction of UTM due to the potential risks of virus infections. By implementing this solution, they were able to easily create an environment where work could be done from anywhere, significantly changing their work style. [Case Overview] ■ Issues - A large number of malicious emails, including spam, were being received. ■ Results - Thanks to our product's support for telecommuting, they were able to adjust shifts without worrying about their work content. *For more details, please refer to the related links or feel free to contact us.

  • Sales Management System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[June 10] Invitation to the Web Seminar hosted by Rihyo Electro

Introduction to Windows 10 IoT and Intel(R) AI Tools - Medical Devices and Hospital Equipment Edition

Rihyo Electro Co., Ltd. will hold a webinar on June 10, 2020 (Wednesday) titled "Optimal for the Embedded Industry! Introduction to Windows 10 IoT and Intel(R) AI Tools - Medical Devices and Hospital Equipment Edition." In this seminar, we will introduce the latest information on Windows 10 IoT Enterprise suitable for embedded devices, McAfee Embedded security software, and the latest updates on Intel AI tool OpenVINO, along with case studies related to medical devices and hospital equipment. We invite you to take this opportunity to register for the seminar. 【Event Overview】 ■ Date and Time: June 10, 2020 (Wednesday) 16:00 - 17:30 (Entry available 10 minutes before start) ■ Participation Fee: Free <Pre-registration required> ■ Venue: Webinar tool "Cocripo" (https://www.cocripo.co.jp/) ■ Registration Method: Registration can only be done through our company website. *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introduction of suitable security measures for industrial equipment and medical devices.

Whitelist type is effective for embedded devices! McAfee Embedded Control provides the solution!

"McAfee Embedded Control" is a whitelist-based security product widely used in the industrial, medical, retail, and office automation sectors as a security measure for IoT devices. By creating a whitelist of safe system states and controlling access to files and the execution of applications, it prevents various unauthorized executions. As a result, it protects systems from ransomware and unknown malware attacks. Since it is a perpetual license, there is no need for license renewal after device shipment, and it protects over 4 million embedded devices worldwide. [Reasons for Choosing Us] ■ Guarantees long-term operation ■ Provides ironclad security measures for IoT devices ■ Numerous successful implementations *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Taiho Pharmaceutical Co., Ltd.

Swan Store has achieved a satisfactory level of security when handling highly confidential information!

We would like to introduce a case where Taiho Pharmaceutical Co., Ltd., which creates highly valuable new drugs and contributes to health, has implemented "SWANStor" from Area B Japan. The company commissions clinical trials to CROs (Contract Research Organizations) located around the world and has been accumulating information on the side effects of drugs obtained through that process in an internal web system. Side effect information is highly confidential, and they were comparing products that could achieve a higher level of security, including stronger communication encryption and authentication. [Case Study] ■ Product Implemented: SWANStor ■ Purpose of Implementation: To safely input highly confidential side effect information After comparing multiple products, it was decided to implement this product due to its advantages in "no changes required to firewall settings" and "the ability to deliver specific applications precisely." *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security/Internal Data Sharing and Information Communication

We will also build a firewall as a measure to prevent information leakage!

We provide appropriate IT solutions for "security/internal data sharing and information communication." Regarding security, we implement antivirus measures and establish firewalls. We can also handle software updates collectively. Additionally, for internal data sharing and information communication, we set up file servers to enable data sharing within the company. It is also possible to set access rights for certain data to manage it. [For concerns like these] ■ I want to protect computers and servers from viruses. ■ I want to prevent information leakage from the internal network. ■ I want to enable data sharing within the company. ■ I want to deepen communication within the company. *For more details, please refer to the related links or feel free to contact us.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

BlackBerry Spark UEM Suite

A solution that balances security and productivity. It supports various devices.

The "BlackBerry Spark UEM Suite" is a product that enhances productivity while ensuring and managing the security of all endpoints. Users can access the applications they need when they need them. Additionally, the IT department can provide high-class security without compromising productivity. We offer a variety of products designed to meet your needs. 【Features】 ■ Supports various devices ■ Users can access the applications they need when they need them ■ IT departments can provide high-class security without compromising productivity ■ Supports enterprise-level content security with CCP ■ Advanced productivity apps and built-in features *For more details, please refer to the PDF materials or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

SASTIK III Network Isolation

Significant cost reduction! Achieving a simple and efficient network security system.

"SASTIK III Network Isolation" is a security solution that realizes the "α model" for municipal information security measures. It possesses only the necessary functions of "network separation" and "file sanitization," achieving a simple and efficient network security system. The file sanitization function can be performed with one click during data transfer to local storage, automatically processing the file sanitization. 【Features】 ■ Network separation ■ File sanitization ■ Developed in-house in 2016 ■ Adopted by 50 municipalities nationwide in Japan ■ Up to approximately 15,000 users can utilize a single system *For more details, please refer to the related link page or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Linux kernel live patch tool "KernelCare"

The Linux kernel operates in a constantly updated state! Automatically applies vulnerability patches without rebooting.

"KernelCare" is a Linux kernel live patching tool that can always maintain a new security state. It applies ultra-fast, automated, reboot-free patches for security vulnerabilities in the Linux kernel. It ensures that no critical patches are missed. You can apply patches to running (or staging) servers automatically or manually without performance degradation or downtime. 【Features】 ■ Never miss critical patches ■ Significantly reduce downtime ■ Easy patching without rebooting ■ Operates in diverse servers and environments ■ Keeps the kernel up-to-date, improving service levels *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

One-stop solution for the EU Cyber Resilience Act

We provide a support system that covers all aspects of technology, tools, and certification for companies that are unsure where to start with CRA compliance!

Introducing a one-stop solution provided by IT Access for companies struggling to comply with the EU Cyber Resilience Act (CRA). Engineers with 15 to 30 years of experience assist companies that lack understanding of the CRA or find it difficult to determine compliance standards, supporting everything from organizing security requirements to modifications and obtaining certification. We also support the provision and implementation of necessary tools such as wolfSSL's "wolfBoot" and "wolfCrypt," as well as Onward Security's "SecDevice" and "SecSAM." Furthermore, we provide comprehensive support from evaluation in the test lab to application to the certification body DEKRA, offering holistic assistance for CRA compliance.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introduction to wolfSSL's Services

We can establish a system that efficiently achieves compliance with standards and product protection even in environments with strict security requirements!

This is an overview of the services provided by the American company wolfSSL, which offers security features for embedded devices and IoT devices. The lightweight and fast TLS library "wolfSSL" supports RTOS and embedded Linux, while ensuring compatibility with OpenSSL. Additionally, "wolfCrypt" can function as a standalone cryptographic module with FIPS compliance and hardware integration capabilities. "wolfBoot" supports secure boot and OTA updates, and also includes tamper detection features. These products are offered with commercial licenses and technical support, making them effective for industrial applications that require compliance with FIPS and ISO standards.

  • Digital Certificate

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software