Security Solutions - メーカー・企業29社の製品一覧とランキング | イプロス

更新日: 集計期間:Feb 18, 2026~Mar 17, 2026
※当サイトの各ページの閲覧回数を元に算出したランキングです。

Security Solutionsのメーカー・企業ランキング

更新日: 集計期間:Feb 18, 2026~Mar 17, 2026
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. 旭電通 Tokyo//Trading company/Wholesale
  2. サブゲート Tokyo//Information and Communications
  3. ヴィアスコープ Tokyo//Information and Communications
  4. セカフィー Hyogo//Information and Communications
  5. 5 ジュピターテクノロジー Tokyo//Trading company/Wholesale

Security Solutionsの製品ランキング

更新日: 集計期間:Feb 18, 2026~Mar 17, 2026
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. Security Switch "LG1000" 旭電通
  2. IPScan NAC ヴィアスコープ
  3. Hardware Security Evaluation Service セカフィー
  4. 4 Security solution 'SubGate' サブゲート
  5. 4 The savior of supply chain attack countermeasures! Highly effective security measures! サブゲート

Security Solutionsの製品一覧

1~30 件を表示 / 全 41 件

表示件数

Security Switch "TiFRONT (Cloud Management Model)"

Just connect it safely without complicated settings, and it will start working immediately! Even in places without dedicated engineers, such as local bases and retail stores, we provide a secure network!

The security switch "TiFRONT" is a cloud-managed model security switch. This product can be easily connected by simply taking it out of the box, plugging in the power cable, and connecting the Ethernet. It can provide a secure network even in locations without dedicated engineers, such as regional offices and retail stores. No management server is required, and it can be used immediately after the decision to implement it. Additionally, it features automatic security report generation, real-time creation, and the ability to manage schedules (daily, weekly, monthly, hourly), allowing for efficient reporting tasks. 【Features】 ■ Easy and safe to use, no dedicated engineers required ■ Automatic port blocking to prevent loops ■ Cloud management with no need for management or labor ■ L2 switch-based network security ■ Automatically blocks only unauthorized communications *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment
  • Firewall
  • IoT
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Heimdal Endpoint DNS Security

Achieve advanced security protection against malware such as ransomware that cannot be defended against by firewalls and UTM, etc.!

Heimdal Endpoint DNS Security is a feature within the Heimdal Security Suite, providing a DNS security solution that combines threat intelligence, machine learning, and AI-based advanced technologies. There are two products: "Endpoint" and "Network." Are you facing any of these issues? ■ Want to prevent malware infections and data leaks via email and websites? ■ Looking for an easy and cost-effective way to start DNS filtering? ■ Want to enhance your cyber attack defenses without changing your existing security environment? We can solve these concerns. 【Features】 ■ Addresses advanced threats and infected users along with the infection process ■ Predicts threats using AI-driven neural network predictive DNS ■ Comes with a network log agent for infection tracing

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Information] Telework Security Enhancement Checklist

With the shift to remote work, we want to review! Introducing key points of employee training with explanations.

This document introduces six security challenges and countermeasures to consider when implementing remote work. It includes a checklist of security measures that security personnel should be aware of, along with explanations for each item. Additionally, it covers key points for employee security training and security measures utilizing OS protection. This book serves as a useful reference when considering the introduction of remote work, so please make use of it. [Contents (Excerpt)] ■ Chapter 1: Six Telework Security Measures to Prevent Information Leakage (Checklist) ■ Chapter 2: Improving Employee Security Literacy: Key Points for "Training" ■ Chapter 3: Preparing for the Unexpected: Border Measures Utilizing OS Protection *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Company Information [JSecurity Co., Ltd.]

Providing peace of mind for all businesses with security solutions recognized by the world!

JSecurity Co., Ltd. provides solutions that contribute to Japan's IT security under the slogan "All for Japan Security." We offer a lineup of email security products that address spam prevention, virus email protection, email sanitization, and measures against email misdelivery, as well as information security products for small and medium-sized enterprises that are affordable and easy to implement and operate. Our main business is the development and sales of information security products that cover a wide range from networks to endpoints. [Business Description] ■ Development and sales of information security products and services *For more details, please refer to the PDF document or feel free to contact us.*

  • Security Assessment
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solution

From design to post-implementation operation! We provide a comprehensive physical security system.

We would like to introduce the security solutions we offer. Focusing on systems that have succeeded in the large markets of Europe and the United States, where the history of physical security is long, we are implementing integration development to meet domestic needs. We provide camera solutions, access control/integrated management systems, anti-shoplifting tags, IoT solutions, and maintenance support. Please feel free to contact us when you need assistance. 【Security Solutions (Partial)】 <Camera Solutions> ■HIKVISION ■GFDesign ■EZVIZ ■i-PRO *For more details, please refer to the related links or feel free to contact us.

  • Security cameras and surveillance systems
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security Solutions Catalog 2020 Winter

Featuring cloud-based automated vulnerability assessment services and annual diagnostic services for monitored web applications!

This catalog introduces the security solutions handled by our company. It features a rich lineup, including the cloud-based automatic vulnerability assessment service "SCT SECURE Cloud Scan" and "netsparker," which diagnoses web applications from cloud environments. Please use this for selecting products. [Contents (partial)] ■ SCT SECURE Cloud Scan ■ SCT SECURE Manual Web Application Assessment ■ netsparker ■ Gred Security Services ■ McAfee SECURE *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment
  • Other Software
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security Switch "LG1000"

Prevent the spread of malware infections and provide a safe and secure internal network environment!

The "LG1000" detects and blocks unauthorized communication within the internal network, and in conjunction with the Saksa UTM "SS Series," it also detects unauthorized access from external sources and blocks the devices. When you log into the LG Portal, a dashboard is displayed as the start screen, providing a comprehensive view of real-time analysis information. Since the logs of this product are collected in the cloud, you can gain "peace of mind during implementation" and "speed during troubleshooting." Additionally, it notifies administrators of detected information in real-time and displays warnings on the browser screens of dangerous devices. 【Features】 ■ Blocking unauthorized communication ■ LG Portal (remote maintenance, security report generation) ■ Alert function ■ Blocking virus-infected PCs (integration with Saksa UTM) ■ Scheduling function *For more details, please refer to the PDF document or feel free to contact us.

  • image_12.png
  • image_13.png
  • image_14.png
  • Other security systems
  • Security Assessment
  • Other Software
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Email Security "m-FILTER"

We provide a secure business environment with "m-FILTER," which only receives safe emails.

**"White Operation of m-FILTER"** The database of "m-FILTER" stores "IP addresses" and "email domains" of safe senders with over 99.90% reliability. Emails from safe senders registered in the database are received with minimal false positives, while emails from senders not registered in the database are assessed based on factors such as "macro presence" and "file extensions," allowing for accurate detection without oversight. **"Robust External Attack Countermeasures"** In addition to sender spoofing detection in white operations, it supports "SPF/DKIM/DAMRC" authentication, addressing email attacks with sophisticated sender spoofing. For attachment spoofing detection, it can assess files with macros and identify dangerous file extensions. It can also inspect the contents of password-protected ZIP files, which are frequently used in attacks. In category and content spoofing detection, it evaluates the URLs listed within the emails. **"Diverse Measures Against Misdelivery"** For outgoing emails, it is possible to flexibly set filtering rules tailored to the organization's operations based on criteria such as "what," "under what conditions," and "how."

  • Other Software
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[File Transfer Service Case Study] Sumitomo Life Insurance Company

Achieve minimization of information risk due to misdelivery by utilizing a closed transmission function for the transfer of personal information of insurance subscribers (Crypto Mail).

We would like to introduce a case study of the implementation of "Crypto Delivery" at Sumitomo Life Insurance Mutual Company. Until now, the company has exchanged various business information with client companies using FD and MO, but the exchange of information via electronic media has been cumbersome and improvements are desired from the perspective of information security. Therefore, the company introduced our product starting in January 2015. In addition to reducing the costs and efforts associated with data transfer, the company has utilized features such as the "Closed Group" function, which allows file exchanges only among designated users, to establish a more efficient and robustly secured data transfer system. [Key Points] - Utilized the "Closed Transmission Function" for the transfer of personal information - Minimized the risk of information leakage due to misdelivery - Confirmed advantages in both security and cost aspects *For more details, please refer to the PDF document or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[File Transfer Service Case] Aozora Bank

Send all documents encrypted with TLS! A case study of achieving secure file transfer (Crypto Delivery)

We would like to introduce a case study of the implementation of "Crypto Delivery" at Aozora Bank, Inc., which provides unique and highly specialized financial services to its customers. To ensure more secure file transmission to clients and others, the bank adopted this product in 2018. Not only does it encrypt and send important data such as customer information, but it also implements advanced security management systems required by financial institutions, including audit functions in case of emergencies. 【Key Points】 ■ Sends all documents, including large files, encrypted with TLS ■ Achieves secure file transfer suitable for financial institutions ■ In addition to enhancing security, strengthens and revamps the "file transfer system" from a business control perspective ■ Received feedback exceeding expectations after implementation, already deployed in 22 internal departments and 3 group companies *For more details, please refer to the PDF document or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Case Study on High-Permission ID Management] Tokyu Card Co., Ltd.

An example of improving internal security awareness through the construction of a workflow for work approval.

We would like to introduce the case of Tokyu Card Co., Ltd., which implemented the high-privilege (privileged ID) management solution "SecureCube Access Check." In 2015, the company began efforts to comply with the PCI DSS security standards for credit card information protection in order to establish a more secure card usage environment. They introduced our product as their ID management tool, further strengthening their security management system and enhancing security awareness. 【Case Overview】 ■ Client: Tokyu Card Co., Ltd. ■ Product Implemented: SecureCube Access Check ■ Implementation Effects: - Achieved strong access control as required by PCI DSS - Significantly improved security awareness across the organization *For more details, please refer to the PDF document or feel free to contact us.

  • Other Management Services
  • Other security systems
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Wi-Fi security solution "WiSAS"

Providing a secure Wi-Fi environment to protect businesses from invisible threats.

"WiSAS" is Japan's first cloud-based fully managed Wi-Fi security solution developed to realize a safe and comfortable Wi-Fi usage society. By installing WiSAS within the network you want to monitor, it becomes possible to detect and respond to unauthorized Wi-Fi communications in real-time. ■Threats and Vulnerabilities Hidden in Wi-Fi Environments Although information leaks exploiting the dangers and vulnerabilities of Wi-Fi environments have rapidly increased in recent years, there are almost no effective security measures for wireless network environments. WiSAS is a fully managed security solution that enables everything from full remote investigation/analysis to continuous monitoring without human intervention, all in one stop.

  • Wi-Fi router
  • Security Assessment
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solution 'SASTIK(R) III'

Reduced the introduction hurdle of thin clients to 1/10, achieving implementation for all employees!

The 『SASTIK(R) III』 Thin-Client Layer allows companies wishing to implement it to inherit their existing PC and software assets while achieving the high security of thin clients through cost reduction via PC virtualization. The high security features of thin clients remain intact, reducing costs, implementation barriers, and difficulty to one-tenth. 【Features】 ■ Cost Revolution: Reduces total costs by one digit ■ Implementation Revolution: No need to replace infrastructure, OS, or software ■ Convenience Revolution: Instant thin client by simply plugging it in *For more details, please download the PDF or feel free to contact us.

  • others
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Drone School Special Pack

Limited to departures from Haneda! The curriculum that usually takes 4 days will be completed in 2 days!

At our Drone Business College, we offer a special package limited to departures from Haneda. The curriculum, which usually takes 4 days, can be completed in a concentrated 2-day format. If you add an extra day, you can also take the specialized technical curriculum. 【Features】 ■ Obtain your certification faster than in Tokyo, even while attending in a rural area ■ Support for aircraft purchase and assistance after the course ■ Accommodation and meals are available at the venue, so no travel is necessary ■ Enjoy a variety of sightseeing spots unique to Nanki Shirahama ■ Conveniently located just 10 minutes by car from the airport *For more details, please download the PDF or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Drone Python Programming

A curriculum that allows you to learn Python thoroughly from the basics.

We offer "Drone Python Programming" using a drone programming language learning kit, allowing students to engage in programming classes with interest and initiative. By aiming to make the drone fly as expected through trial and error, students can expect to improve their logical thinking and problem-solving skills. 【Features of the Teaching Materials】 ■ Enjoyable learning of Python ■ Clear understanding of the connection between drone flight and programming content ■ Increased motivation to learn due to the excitement of using drones ■ Learning methods for analyzing images obtained from the drone camera *For more details, please download the PDF or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solution

We provide security enhancement solutions utilizing key unlocking and locking reinforcement, as well as user management.

"Security Solutions" provides enhanced security solutions through video surveillance for indoor and outdoor environments, including evidence preservation, management of customer information, secure storage of confidential information, and user management utilizing strengthened unlocking and locking mechanisms. We monitor and alert for unauthorized access by individuals not registered in the facial recognition system in offices, warehouses, and server rooms. We conduct security surveillance and video recording both indoors and outdoors. Additionally, it can be used for managing the removal of customer and personal information documents, as well as for temperature measurement and health management for facility entrants. 【Features】 ■ Enhanced security ■ Customized proposals based on customer network environments and requirements ■ Integration of facial recognition cameras with door security systems is possible ■ Options to select size and color for security cabinets *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security systems
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

<Security Measures> Introducing measures to prevent the spread of viruses.

What should we do against increasingly sophisticated cyber attacks? Introducing measures to prevent the spread of viruses!

We are offering a document summarizing the security measures implemented by SubGate Inc. It introduces various topics such as "Things to Address in 2022," "Security Measures for 2022," and "Necessary Measures for Supply Chain Attack Prevention," including virus spread prevention measures. Our security switch, 'SubGate,' protects your network. Please feel free to download and take a look. [Offered Documents] ■ Things to Address in 2022 ■ Security Measures for 2022 ■ Necessary Measures for Supply Chain Attack Prevention ■ [Horror Newspaper] True Scary Stories, Episode 1 ■ [Horror Newspaper] True Scary Stories, Episode 2 *For more details, please refer to the PDF document or feel free to contact us.

  • Other security systems
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solution 'SubGate'

A security solution that enables intuitive network operations.

"SubGate" is a network internal security solution that automatically detects and blocks security threats occurring within the network, enhancing the stability of network services and the convenience of operations. It protects the network with patented technology from Special Patent 2011-523822, "Access Level Security Device and Security System." The MDS engine performs traffic analysis based on behavior, automatically detecting and blocking harmful traffic without degrading switch performance. 【Features】 ■ Patented technology for access level network security ■ Dedicated engine for harmful traffic analysis (MDS Engine) ■ Selection and blocking of harmful traffic to prevent spread ■ Simple security settings ■ Perfect compatibility with other switches, etc. *For more details, please download the PDF or contact us.

  • Other security systems
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

The savior of supply chain attack countermeasures! Highly effective security measures!

In recent times, it has become impossible to completely prevent infections from Emotet ransomware. Stopping the spread and minimizing secondary damage with 【SubGate】 is an effective measure!

The high-performance security switch SubGate series and SubGateX series are equipped with the internationally patented proprietary security ASIC known as the MDS engine across all models. At the same time, it reports to the administrator via email from the management software VNM, allowing for awareness of infections and enabling proactive measures upstream. In today's world, where infections from Emotet and ransomware cannot be completely prevented, it has become difficult to protect the internal network from clusters of infections solely through individual management efforts. Simple actions like connecting an infected PC from a telework location to the internal LAN without realizing it can pose significant risks. By merely replacing the currently used HUB with a SubGate, you can prevent the spread of viruses, block harmful traffic such as internal DoS attacks, and protect against eavesdropping on IP phone conversations and theft of confidential data. For wireless LAN environments, there are security access points SubGate AP and WiFi6 compatible security access points SubGateAPX available. Additionally, SubGateX supports multi-gigabit connections. With the highly effective SubGate series, you can strengthen internal measures based on the premise of potential infections.

  • Other security systems
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

[Basic Knowledge] Security Measures for 2022

We are introducing how to prevent sophisticated cyber attacks and what should be done!

We are introducing security measures for 2022 on how to deal with increasingly sophisticated cyber attacks such as EMOTET, ransomware, and supply chain attacks. We cover topics including "What is EMOTET?", "Attack methods", and "Examples of attacks on the supply chains of major manufacturing companies". Additionally, we introduce 'SubGate', which helps prevent the spread of viruses. Please make use of this information for your countermeasures. 【Content (partial)】 ■What is EMOTET ■Attack methods ■Scary features ■Symptoms after infection ■Damage after infection *For more details, please refer to the PDF document or feel free to contact us.

  • Other security systems
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Hardware Security Evaluation Service

It is possible to evaluate hardware attacks using a wide range of elemental technologies corresponding to each layer of hardware.

Our company conducts threat analysis related to hardware security. With services that assist in accurately understanding threats, we support the improvement of resistance to hardware attacks. Additionally, by understanding threats related to hardware security, we can implement countermeasures as needed and bring electronic devices with high hardware security performance to market. 【Service Details】 ■ Side-channel attack resistance assessment (analyzing electromagnetic noise during encryption operations) ■ Fault injection attack resistance assessment (injecting electromagnetic noise during encryption operations) *For more details, please download the PDF or feel free to contact us.

  • Security Assessment
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security Switch TiFRONT

You can achieve "internal measures" that are possible because of the security switch.

The security switch TiFRONT can implement three internal measures: "threat prevention," "spread prevention," and "network visualization." It detects and prevents suspicious activities, such as a malware-infected PC being used as a stepping stone for unauthorized access to other PCs or file servers connected to the network, or being scanned by the network. Additionally, it identifies terminals infected with malware that have become zombie PCs, raises alerts for suspicious activities, and prevents the spread of infection by isolating them from the network. 【Features】 - Can be implemented without changing the layout - Detects, blocks, and releases attacks on the access network - Immediate blocking upon detection through integration with entrance and exit measures - Visualization of the internal network - Streamlining of operational management For more details, please contact us or download the catalog.

  • Internet System
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Case Study of Security Switch TiFRONT - Toei Densan Co., Ltd.

Replace the L2 switch with TiFRONT to enhance network security.

Tohkei Densan Co., Ltd. provides specialized solutions tailored to various industries and business types, as well as outsourcing services for information systems utilizing data centers. The company's challenge was how to ensure the security of Windows XP, which reached the end of support in 2014. We will introduce a case study on the implementation of the security switch "TiFRONT," which established a security system not reliant on definition files or the operating system. [Contents] - Windows XP terminals that cannot be migrated due to compatibility issues with business applications. - Features that detect behavior and prevent spread, as well as the ability to implement in a short period, were key selection points. - The construction method is adjusted according to the size of the department or location. - TiFRONT is also proposed to customers, creating new business opportunities. For more details, please contact us or download the catalog.

  • Internet System
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Cyberware Inc. Business Introduction

We will pave the way for the next era of IT with our wealth of accumulated know-how and exceptional technological capabilities.

Cyberware Inc. is a company that provides services and products centered around IT technology. We believe that our value lies in anticipating major technological trends, taking risks, experimenting, and creating truly beneficial and human-centric solutions. 【Business Activities】 ■ System Consultation ■ Planning, development, and sales of proprietary software ■ Contract design and development of information systems *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software
  • Other security systems
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Email Security "Matrix Scan APEX III"

Top-class spam and malware protection in Japan! Concentrated capture of Japan-specific spam emails to achieve a secure email environment.

The "Matrix Scan APEX III" is an email security appliance designed to combat spam emails and malware. The domestically developed "msec technology" is a patented proprietary technology. The variable algorithm used for detecting and determining spam emails evolves effectively against the ever-changing nature of spam. It focuses on capturing spam emails unique to Japan, ensuring a secure email environment. ■ Basic Functions - AI Anti-Spam (in-house developed engine) - AI Anti-Virus (in-house developed engine) - IP Reputation ■ Offered (Appliance) Models - Entry Model (Low Range Model) - 1U Rack Mount Type - Transparent type specification can be supported as an option (Bypass NIC) - Standard Model (Mid Range Model) - 1U Rack Mount Type - RAID1 - Bypass NIC transparent type support - Enterprise Model (High Range Model) - 1U Rack Mount Type - RAID10 - Bypass NIC transparent type support * Multi-unit configurations are supported for any of the models.

  • Other security systems
  • Other Software
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Free rental of evaluation machine [SPAMSNIPER]

SpamSniper Evaluation Machine Free Rental Service

We are offering the SpamSniper evaluation unit for free. Here is an introduction to the SpamSniper free evaluation unit rental service. ■□■Features■□■ ~ One device, four roles: SpamSniper's multi-layered defense ~ ■ Information leakage prevention ■ SMTP attack defense ■ Virus email blocking ■ Spam email blocking ■ There are no functional restrictions on the evaluation unit, so you can evaluate it in a real environment and according to actual operations. For other features and details, please contact us.

  • Other Software
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Access Control for USB Devices: 'LB USB Lock Plus'

Unauthorized USB memory - Shut out hard drives.

This is software to control the use of USB-connected storage such as USB flash memory. ■ Settings for "Allow Access," "Deny Access," and "Read-Only" are available ■ Access control via a whitelist ■ Easy setup in wizard format ■ Measures against information leakage for PCs handling personal information! There is also a higher-end product called 'LB USB Lock Pro.' 【Function Comparison】 https://www.lifeboat.jp/products/ulp1/index.php?hn=hikaku&t_no=1&ht=-130

  • Other Software
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security product 'APPGUARD' that can counter Emotet.

"Prevent before being attacked" AppGuard is a security product that is not detection-based like traditional ones. It is OS protection-based and blocks threats at the stage of the attack.

The OS protection type does not perform detection or identification but protects the OS core, safeguarding the PC from any threats, whether known or unknown. AppGuard protects the OS itself and does not harm the system. Instead of checking each file individually, it immediately shuts out any abnormal processes that may indicate malware, focusing on protecting the system. AppGuard employs cybersecurity technology that has not been breached in over 20 years by U.S. government agencies. *AppGuard Marketing Co., Ltd. HP link: https://lp.appguard-m.com/security_measures 【Features】 ■ Prevention of unknown malware execution ■ Prevention of ransomware execution ■ Prevention of drive-by download execution ■ Prevention of fileless malware execution ■ Prevention of confidential information leakage due to malware ■ Prevention of OS tampering *For more details, please refer to the PDF materials or feel free to contact us.

  • Security Assessment
  • Other Software
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security solution "NISG 3,000 Series"

Provision of integrated management functions.

The "NISG 3,000 Series" is an integrated threat management appliance (UTM) that consolidates all security features into one. It protects servers and clients while providing integrated management capabilities. It is equipped with excellent security measures in a compact body, safeguarding corporate offices from internet threats. 【Features】 ■ Integration of all security functions into one ■ Protection for servers and clients ■ Provision of integrated management capabilities *For more details, please contact us or download the catalog.

  • others
  • Firewall
  • Security Solutions

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

5G security solution

Providing security and scalability in the transition to 5G mobile networks!

Our company provides highly scalable security solutions, anticipating various scenarios of 5G networks. We offer mobile communication operators evolving their networks for 5G the highest levels of flexibility, scalability, and protection. Robust firewalls and DDoS mitigation and detection technologies can be deployed in various form factors (physical, virtual, bare metal, container) according to individual network topologies (4G, 5G-NSA, MEC, 5G SA). 【Main Solutions】 ■ Gi-LAN Security ■ Mobile Roaming Security ■ Network Slicing ■ DDoS Attack Defense Covering All Networks ■ Secure and Efficient MEC *For more details, please download the PDF or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録