Security software Product List and Ranking from 37 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Nov 05, 2025~Dec 02, 2025
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Nov 05, 2025~Dec 02, 2025
This ranking is based on the number of page views on our site.

  1. あさかわシステムズ 大阪本社、東京支店、福岡支店、沖縄オフィス、仙台営業所、和歌山分室 Osaka//others
  2. ハミングヘッズ 本社 Tokyo//Information and Communications
  3. ZenmuTech Tokyo//Information and Communications
  4. 4 KICOシステムズ Tokyo//Information and Communications
  5. 4 東光高岳 Tokyo//Information and Communications

Security software Product ranking

Last Updated: Aggregation Period:Nov 05, 2025~Dec 02, 2025
This ranking is based on the number of page views on our site.

  1. Gulliver NEXT あさかわシステムズ 大阪本社、東京支店、福岡支店、沖縄オフィス、仙台営業所、和歌山分室
  2. [Information Leakage Countermeasures] Security Platform 'SeP' ハミングヘッズ 本社
  3. Data De-identification Solution "ZENMU" ZenmuTech
  4. ScreenChaser KICOシステムズ
  5. 4 [Information] The three simplest measures to prevent security troubles. DAIKO XTECH

Security software Product List

16~30 item / All 47 items

Displayed results

Things to Address in 2022 [Security Measures]

We will introduce key points and security switches for matters that require strengthened measures!

In preparation for the day when measures to prevent the spread of viruses become even more essential, we would like to introduce the actions to be taken in 2022. Key points for strengthening measures include the "amendment of the Personal Information Protection Law," the "amendment of the Electronic Book Preservation Law," and "measures for telework PCs." Our security switch, 'SubGate,' allows for easy internal measures. It is suitable for preventing the spread of computer viruses, detecting and blocking harmful traffic, and preventing eavesdropping on internal IP phones and confidential data. [Key Points for Strengthening Measures] ■ Amendment of the Personal Information Protection Law Stricter reporting (mandatory), two types of reports (preliminary and final) ■ Amendment of the Electronic Book Preservation Law Changes in preservation methods, security of storage locations ■ Measures for Telework PCs Home cluster, censorship during internal connections *For more details, please refer to the PDF document or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] BANDAI SPIRITS Co., Ltd.

Quickly grasp the status of email sending and any configuration issues! Introducing case studies of "DMARC/25 Analyze."

We would like to introduce a case study on the implementation of "DMARC/25 Analyze" at BANDAI SPIRITS Co., Ltd. In recent times, as security incidents have been increasing, the company had been relying solely on manual checks based on reports to confirm the existence of phishing emails impersonating their e-commerce site "Premium Bandai." With the introduction of "DMARC/25 Analyze," the company was able to easily quantify the status of phishing email countermeasures and actively detect such threats. This also significantly reduced the effort previously required. [Challenges Before Implementation] ■ The company was looking for a clearer and more robust way to confirm the existence of phishing emails, which had been unclear. *For more details, please refer to the PDF document or feel free to contact us.*

  • Data Backup

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Ricoh Company, Ltd.

Introducing a case study that achieved visualization of email system status and enhanced security!

We would like to introduce a case study of the implementation of the "Cloudmark Security Platform for Email" at Ricoh Company, Ltd. The company was in a black box state, completely unaware of what emails were flowing, in what quantities, and from where to where. To achieve security measures, promote digital transformation (DX), and improve operational efficiency, it was urgent to visualize and restructure the email system. To break this situation, the "Cloudmark Security Platform for Email" was introduced as an email gateway while standardizing the email software specifications. This enabled real-time visualization and control of traffic, resulting in significant improvements in security through finely tunable policies. [Challenges Before Implementation] - The email system was in a black box state, posing significant security risks. - Different organizations operated email systems and standards, leading to issues such as garbled text and undelivered emails. *For more details, please refer to the PDF document or feel free to contact us.*

  • Data Backup

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IT Asset Management and Information Security Software SS1

If you're unsure about IT asset management tools, choose SS1.

<Standard Features> ●Asset Management - Equipment Management: Automatically collects and centrally manages hardware and software information of IT assets such as PCs. - System Management: Thoroughly manages the status of networks including WAN, LAN, and hubs. - Software Management: Clearly displays the software and license usage status of managed PCs. - Contract Management: Manages contract information for equipment leasing/rental, with the ability to output reports. ●Operational Support - PC Operation Functions: Supports operational tasks such as file distribution, message delivery, and alerts for changes in IT assets. - Update Program Management: Enables management of major updates for Windows 10 and update programs for Office 365. - Working Hours Management: Restricts PC usage outside of working hours to reduce long working hours. - SS1 Operation Functions: Provides comprehensive support for operations, allowing for a consolidated view of changes in the management environment and violation alerts.

  • Traceability
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A new form of security that does not manifest even if breached.

A new concept in cybersecurity products called "AppGuard" that prevents malicious software such as ransomware from "activating even if it intrudes."

"AppGuard" is an endpoint security product that controls and disables malicious actions that can harm the system, regardless of the execution entity, unlike traditional antivirus software. [Features] - Prevents computer viruses from causing outbreaks even if they infiltrate - Controls and disables malicious actions that harm Windows OS, regardless of the execution entity - Ensures that malicious actions cannot be triggered through two layers of control - Provides reliable protection even in case of user "oversights" - Lightweight operation as it does not perform virus scans - Prevents the execution of ransomware *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Site "AV-TEST"

Detects spam and phishing emails! Equipped with a security certification program.

"AV-TEST" is an independent research organization based in Germany that conducts comparisons and individual tests of IT security products. It publishes test results for antivirus software compatible with operating systems such as Windows and Android. Additionally, it features security software that addresses ransomware technologies. [Services Provided] ■E-Mail Security Test ■AV-TEST seal of approval ■Monitored Malware Protection for Windows and Android ■The AV-TEST certificate for smart home and IoT *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Site Search

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

SmartPOP2Exchange

Reliable spam and virus protection! Can be installed independently of the incoming SMTP server.

"SmartPOP2Exchange" is a product developed by JAM Software. It provides POP3 and IMAP accounts to ensure all emails are reliably connected and filtered. It includes spam and virus protection. Additionally, it features automatic parallel processing of multiple email accounts and a comprehensive rule system. [Main Features (Partial)] ■ Flexibility between systems ■ Integrated modules ■ Configuration control features ■ Compatibility and integration ■ Reliable spam and virus protection *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

senda

Practice of "Threat Hunting" to identify assets exposed to threats!

"Senda" is world-class internet intelligence. It can discover publicly exposed assets through shadow IT. It can automatically identify assets with configuration errors, as well as determine which assets have a high level of risk. Please feel free to contact us if you have any inquiries. 【Features】 ■ Discover publicly exposed assets through shadow IT ■ Automatically identify assets with configuration errors ■ Discover management consoles that remain exposed ■ Determine which assets have a high level of risk *For more details, please download the PDF or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

MatrixQuestWLAN/wpa 【WPA2 Supplicant】

MatrixQuestWLAN/wpa 【WPA2 Supplicant】

【Overview】 1. High Portability Designed to facilitate easy combinations with various wireless LAN drivers. 2. Supports WPA/WPA2 - WPA-PSK/WPA2-PSK - WPA-1X/WPA2-1X 3. Supports numerous authentication protocols - EAP-TLS - EAP-PEAP - EAP-TTLS - EAP-FAST (planned support)

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AppGuard Small Business Edition

Launch of a new edition for 4.2 million small and medium-sized enterprises nationwide!

"AppGuard Small Business Edition" is a product designed for small to medium-sized enterprises with 1 to 300 employees, combining the simplicity of AppGuard Solo with the integrated management features of AppGuard Enterprise. 【Features】 ■ License for Small Businesses For small businesses that cannot make significant investments in security, we offer licenses at an affordable price for companies with up to 300 employees, maintaining the core technology of AppGuard. ■ Pre-installed Standard Settings By presetting policies at the same level as AppGuard Solo as default values, we can reduce the costs and time required for implementation. ■ Diversification of Implementation Services By diversifying the implementation service menu from simple options to traditional full services, we can provide proposals that match our customers' budget considerations. *For more details, please refer to the PDF document or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Is your email threat protection foolproof? "Cloud Security Service"

Security measures during the migration to Microsoft 365, G Suite, etc. Can be evaluated with minimal impact on the existing environment by using in conjunction with current products.

"Aimatrix Security" addresses various threats to email. For those who want to consider it but are afraid that touching the current environment might disrupt business, or who want to try it discreetly because the introduction and installation of equipment are noticeable within the company, this is recommended. You can try out our cloud service security, which can be completed via email or phone, and by using it alongside your current products, you can evaluate our products without impacting your existing environment, depending on the settings. For operations and various settings that differ from the products you are currently using, our engineers are available to provide explanations and design support, regardless of whether you adopt or evaluate our products. Please feel free to consult us. 【Features】 ■ Unique functions of Aimatrix ■ Response to "spoofing emails" that impersonate your company ■ A stable email environment even with increased email traffic ■ Measures for transitioning to cloud services (such as Microsoft 365, G Suite, etc.) *For more details, please refer to the PDF document or feel free to contact us. *We also accept evaluation use (short-term lending). Please feel free to reach out.

  • Other security systems
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Blocking unauthorized operations, malicious software, and access on PCs - IP-guard V3

Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leakage prevention through powerful violation control and logging at the kernel level.

IP-guard V3 is a product for "PC log management," "information security," and "IT asset management" that is adopted by over 20,000 major companies and government agencies in 27 countries worldwide. In Japan, it particularly contributes to solving various industry challenges with powerful controls and detailed recording functions that could not be achieved with other products. Additionally, the various functions composed of 14 types of modules allow users to select only what they need, minimizing the burden on users and reducing the workload for administrators. It is also a product that can meet almost all the requirements outlined in the safety measures of the My Number Act (government-issued security guidelines).

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Corresponds to each requirement of the My Number Act's safety measures! IP-guard V3

Adopted by over 20,000 major companies and government agencies in 27 countries worldwide! We achieve information leakage prevention through powerful violation control and logging at the kernel level.

IP-guard V3 is a product for "PC log management," "information security," and "IT asset management" that has been adopted by over 20,000 major companies and government agencies in 27 countries worldwide. In Japan, it particularly contributes to solving various industry challenges with powerful controls and detailed recording functions that were not achievable with other products. Additionally, the features, composed of 14 different modules, allow users to select only what they need, reducing the burden on users and alleviating the workload for administrators. Furthermore, it is a product that can meet almost all the requirements outlined in the safety measures of the My Number Act (government-issued security guidelines).

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

GDATA Total Protection Multi-License Version

World-class detection rates protecting against all types of threats. Equipped with everything needed for the best protection and the highest peace of mind in PC security.

Protected from all types of threats with the world's highest virus detection rate. This all-in-one product is packed with security features of G DATA's personal products, including firewall, vulnerability protection, online banking protection, and backup, ensuring peace of mind.

  • Civil Engineering Company
  • Architectural CAD
  • Civil Engineering CAD

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[KAITO Series Case Study] Ikeda Senshu Bank

Introduced on approximately 900 iPads! A case study that achieved secure access to in-house systems.

We would like to introduce a case study of the implementation of the business-oriented security product "KAITO Series" at Ikeda Senshu Bank. The company wanted to reduce the risk of information leakage associated with theft or loss when accessing the internal system via iPads distributed to their sales representatives. After implementation, the product minimizes the risk of information leakage in the event of theft or loss by ensuring that data such as communication history is deleted from the device when the session ends, and by automatically terminating the session after a certain period of inactivity. 【Case Overview】 ■Challenges - Reduce the risk of information leakage associated with the theft or loss of iPads accessing the internal system. ■Effects - Minimized the risk of important information, such as customer and negotiation history, leaking from the iPads. - Achieved secure internal access from external visits, significantly improving sales efficiency. - Reduced the effort required to prepare sales materials before customer visits. *For more details, please download the PDF or feel free to contact us.

  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search Keywords Related to Security software