Security software Product List and Ranking from 13 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Security software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. アイティアクセス 本社 Kanagawa//others
  2. KICOシステムズ Tokyo//Information and Communications
  3. あさかわシステムズ 大阪本社、東京支店、福岡支店、沖縄オフィス、仙台営業所、和歌山分室 Osaka//others
  4. 4 DAIKO XTECH Tokyo//others
  5. 5 ハンモック 本社 Tokyo//others

Security software Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. One-stop solution for the EU Cyber Resilience Act アイティアクセス 本社
  2. ScreenChaser KICOシステムズ
  3. Gulliver NEXT あさかわシステムズ 大阪本社、東京支店、福岡支店、沖縄オフィス、仙台営業所、和歌山分室
  4. 4 AssetView GOLD ハンモック 本社
  5. 4 [Sales Q Introduction Case] Eight Thousand Co., Ltd. シスポート

Security software Product List

1~15 item / All 15 items

Displayed results

AssetView GOLD

A security software that allows you to add only the necessary features as needed!

~ There is software that allows you to add only the necessary features as needed ~ Have you ever purchased packaged software that has unnecessary features or lacks necessary ones? With AssetView GOLD, you can solve those concerns all at once! □ Purchase at minimal cost You can select and purchase five features, avoiding unnecessary implementation. Purchasing all features is also a great deal. □ Easy installation It has a feature for automatic installation on each PC, and adding features can be done with simple operations. □ Easy operation Operation is achieved with simple operations. In particular, the strengths are the ability to save past logs and the automatic version upgrade feature. ◆◆ If you would like a catalog, please inquire through the document request ◆◆ ~ You can view some content from the download ~

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Gulliver NEXT

Security that supports global operations!

■ Security that supports global operations! Inherits the functions of the trusted and proven 'Gulliver/Win32'! It is possible to set access permissions at the subsystem level and for each function, and additionally, security features can be equipped for each responsible person. Security settings can also be configured at the processing unit level, such as whether updates are allowed or not, and whether references are allowed or not. Furthermore, access permission management is possible by user, by function, and by processing.

  • Construction and process management software
  • Cost management and cost estimation software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Sales Q Introduction Case] Eight Thousand Co., Ltd.

Contributing to work style reform! Introducing a case where shift adjustments could be made without worrying about job content.

We would like to introduce a case study of how Eight Thousand Corporation implemented "Hanbai Q" to enhance security and enable usage across multiple locations. The company was receiving a large number of malicious emails, including spam, and was considering the introduction of UTM due to the potential risks of virus infections. By implementing this solution, they were able to easily create an environment where work could be done from anywhere, significantly changing their work style. [Case Overview] ■ Issues - A large number of malicious emails, including spam, were being received. ■ Results - Thanks to our product's support for telecommuting, they were able to adjust shifts without worrying about their work content. *For more details, please refer to the related links or feel free to contact us.

  • Sales Management System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Taiho Pharmaceutical Co., Ltd.

Swan Store has achieved a satisfactory level of security when handling highly confidential information!

We would like to introduce a case where Taiho Pharmaceutical Co., Ltd., which creates highly valuable new drugs and contributes to health, has implemented "SWANStor" from Area B Japan. The company commissions clinical trials to CROs (Contract Research Organizations) located around the world and has been accumulating information on the side effects of drugs obtained through that process in an internal web system. Side effect information is highly confidential, and they were comparing products that could achieve a higher level of security, including stronger communication encryption and authentication. [Case Study] ■ Product Implemented: SWANStor ■ Purpose of Implementation: To safely input highly confidential side effect information After comparing multiple products, it was decided to implement this product due to its advantages in "no changes required to firewall settings" and "the ability to deliver specific applications precisely." *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security/Internal Data Sharing and Information Communication

We will also build a firewall as a measure to prevent information leakage!

We provide appropriate IT solutions for "security/internal data sharing and information communication." Regarding security, we implement antivirus measures and establish firewalls. We can also handle software updates collectively. Additionally, for internal data sharing and information communication, we set up file servers to enable data sharing within the company. It is also possible to set access rights for certain data to manage it. [For concerns like these] ■ I want to protect computers and servers from viruses. ■ I want to prevent information leakage from the internal network. ■ I want to enable data sharing within the company. ■ I want to deepen communication within the company. *For more details, please refer to the related links or feel free to contact us.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Linux kernel live patch tool "KernelCare"

The Linux kernel operates in a constantly updated state! Automatically applies vulnerability patches without rebooting.

"KernelCare" is a Linux kernel live patching tool that can always maintain a new security state. It applies ultra-fast, automated, reboot-free patches for security vulnerabilities in the Linux kernel. It ensures that no critical patches are missed. You can apply patches to running (or staging) servers automatically or manually without performance degradation or downtime. 【Features】 ■ Never miss critical patches ■ Significantly reduce downtime ■ Easy patching without rebooting ■ Operates in diverse servers and environments ■ Keeps the kernel up-to-date, improving service levels *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

One-stop solution for the EU Cyber Resilience Act

We provide a support system that covers all aspects of technology, tools, and certification for companies that are unsure where to start with CRA compliance!

Introducing a one-stop solution provided by IT Access for companies struggling to comply with the EU Cyber Resilience Act (CRA). Engineers with 15 to 30 years of experience assist companies that lack understanding of the CRA or find it difficult to determine compliance standards, supporting everything from organizing security requirements to modifications and obtaining certification. We also support the provision and implementation of necessary tools such as wolfSSL's "wolfBoot" and "wolfCrypt," as well as Onward Security's "SecDevice" and "SecSAM." Furthermore, we provide comprehensive support from evaluation in the test lab to application to the certification body DEKRA, offering holistic assistance for CRA compliance.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introduction to wolfSSL's Services

We can establish a system that efficiently achieves compliance with standards and product protection even in environments with strict security requirements!

This is an overview of the services provided by the American company wolfSSL, which offers security features for embedded devices and IoT devices. The lightweight and fast TLS library "wolfSSL" supports RTOS and embedded Linux, while ensuring compatibility with OpenSSL. Additionally, "wolfCrypt" can function as a standalone cryptographic module with FIPS compliance and hardware integration capabilities. "wolfBoot" supports secure boot and OTA updates, and also includes tamper detection features. These products are offered with commercial licenses and technical support, making them effective for industrial applications that require compliance with FIPS and ISO standards.

  • Digital Certificate

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Site "AV-TEST"

Detects spam and phishing emails! Equipped with a security certification program.

"AV-TEST" is an independent research organization based in Germany that conducts comparisons and individual tests of IT security products. It publishes test results for antivirus software compatible with operating systems such as Windows and Android. Additionally, it features security software that addresses ransomware technologies. [Services Provided] ■E-Mail Security Test ■AV-TEST seal of approval ■Monitored Malware Protection for Windows and Android ■The AV-TEST certificate for smart home and IoT *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Site Search

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AppGuard Small Business Edition

Launch of a new edition for 4.2 million small and medium-sized enterprises nationwide!

"AppGuard Small Business Edition" is a product designed for small to medium-sized enterprises with 1 to 300 employees, combining the simplicity of AppGuard Solo with the integrated management features of AppGuard Enterprise. 【Features】 ■ License for Small Businesses For small businesses that cannot make significant investments in security, we offer licenses at an affordable price for companies with up to 300 employees, maintaining the core technology of AppGuard. ■ Pre-installed Standard Settings By presetting policies at the same level as AppGuard Solo as default values, we can reduce the costs and time required for implementation. ■ Diversification of Implementation Services By diversifying the implementation service menu from simple options to traditional full services, we can provide proposals that match our customers' budget considerations. *For more details, please refer to the PDF document or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

CrackProof Implementation Case: Metaverse Platform Operation

[Case Study] Understand the security measures for Metaverse (VR) applications!

In recent years, the "metaverse" has been gaining attention across various industries. While its expansion is occurring in all fields regardless of industry, on the other hand, there are various security risks that those operating the platforms must consider. *Our company’s column also explains the security of the metaverse↓ "Security Considerations When Utilizing the Metaverse for Business" https://www.hypertech.co.jp/column/marketing/2023/03/metaverse-security/ In this document, we have invited Company A, which operates a metaverse (VR) platform and has chosen CrackProof for their app's security measures, to discuss how CrackProof has addressed their security challenges. [Recommended for] - Those planning to develop apps for a metaverse (VR) platform - Those currently developing or operating metaverse (VR) apps and considering security measures - Those wanting to know the benefits of choosing CrackProof as a security measure for metaverse (VR) apps.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Genetec Product Catalog

Listing software applications, hardware, and appliances!

This catalog introduces the products of Genetec, which specializes in the field of security solutions. It features a lineup including "Genetec Security Center," which allows for smarter responses with a unified security view, as well as "Security Center Omnicast," "Streamvault," and "Synergis hardware." Industry-specific solutions are also included, so please take a moment to read through. [Contents] ■About Genetec ■Products and Services ■Industry-Specific Solutions *For more details, please refer to the PDF document or feel free to contact us.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

ScreenChaser

Information leak prevention from PC display shooting "ScreenChaser"

As a business owner or security officer implementing telework, can you manage unauthorized camera captures of displays showing confidential information? ScreenChaser can prevent unauthorized captures by projecting a watermark. ScreenChaser can control the display of watermarks on PCs used by employees working from home.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

StiftungSIC

Introducing various licenses such as XML Security and Mobile Security!

We would like to introduce "StiftungSIC," which we handle. We offer various licenses, including "Public Key Infrastructure," a security technology that utilizes public key cryptography, and "Document Security," which can be added to the XML Security Toolkit. We provide libraries specialized in encryption for the Java platform. Please feel free to contact us if you need assistance. 【Licenses】 ■Core Crypto Toolkits ■Public Key Infrastructure ■Document Security ■Communication & Messaging Security ■XML Security ■Mobile Security *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introduction to SentinelOne products

Not only large corporations but also small businesses can implement it! It excels in automated operations using AI technology!

We would like to introduce "SentinelOne," an AI security solution from Israel that we handle. It enables rapid response through AI operations, allowing for operation even without security personnel, thus not adding to the operational burden. Additionally, because it can be operated automatically, there is no need to outsource operational services, significantly reducing costs. 【Features】 ■ Fast response with AI for safety ■ Hassle-free ■ Significant cost reduction ■ Can be implemented from just one PC ■ Zero ransomware damage reported since the service started ■ Lightweight agent ensures that computer performance remains smooth and comfortable for work *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration