Manufacturer
You can search the page from the first letter of the manufacturer name. Click on the appropriate initial letter.
A
Safety evaluation of SaaS settings and compliance measures
Web3 Security, blockchain monitoring, smart contract diagnostics
Arculus is a revolutionary hardware wallet that securely stores your crypto assets and NFTs. Easily manage your keys with card-shaped hardware and a smartphone app. Compatible with Web3, it is also possible to save and view NFTs.
A pioneer in Cyber Asset Attack Surface Management (CAASM), which integrates various products to centrally manage your assets and risks. We support the advancement of security operations to achieve cyber hygiene.
B
cloud storage service
Secure content management and collaboration in one platform. Centralized management of content is possible by linking with other systems. cloud, cloud storage, work style reform
C
All-in-one SASE (Secure Access Service Edge) with native SD-WAN implementation
Securely and optimally connect all locations, data centers, mobile, telework and cloud services. Centralized management of telework, network security, and global security measures
In addition to external threat countermeasures such as NGAV, EDR, and threat hunting, CrowdStrike realizes various functions related to endpoint security such as USB control, vulnerability management, asset visualization, and security management of cloud settings with a single agent.
Privileged Access Management (PAM), Privileged Identity Management, Secure Privileged Accounts, Endpoint Privilege Manager (EPM)
D
Automatic and continuous vulnerability assessment of mobile applications
E
Firmware security VBOS measures. Provides a function to visualize terminals, servers, network devices, etc. managed by companies, and to continuously check mainly firmware settings and compliance with various compliances.
Next-generation SIEM platform. Utilize machine learning to improve the efficiency of security operations and implement countermeasures against internal fraud. Integrated log management, SIEM (Security Information & Event Management), UEBA (User & Entity Behavior Analytics), SOAR (Security Orchestration, Automation & Response)
F
State-of-the-art technology for highly automated attack detection and response. Unauthorized access countermeasure solutions check the environment and behavior of PCs and mobile devices to detect and block unauthorized access by organized "humans" as well as cutting-edge automated "bot" attacks. Possible
G
Best dedicated server for Splunk
H
I
A leader in providing micro-segmentation to achieve zero trust. It is possible to minimize lateral movement and prevent the spread of damage such as ransomware.
WAF, database security, file security
Infoblox provides world-class, high-performance core network services (DNS, DHCP, IPAM) and DNS security services for simpler, more unified networking and security.
Island's enterprise browser helps improve security, governance, and productivity for enterprises aiming for BYOD, VDI, and zero trust.
Providing an essential platform for mobile business utilization
SSL-VPN/リモートアクセスソリューション/ゼロトラスト
J
K.
L
M
Macnica provides security services and SaaS. Services include ASM (Attack Surface Management), SOC, EDR monitoring, threat hunting and incident response.
security intelligence company. Provides ASM (Attack Surface Management) and security measure effectiveness measurement tools
SSE/SWG solution with isolation (internet separation) as the core. SSE (Security Service Edge), RBI (Remote Browser Isolation), ZTNA (Zero Trust Network Access), SWG (Secure Web Gateway), CASB (Cloud Access Security Broker), DLP (Data Loss Prevention),
Email management system
By linking with the content cloud "Box", file sharing when sending and receiving emails is safe and efficient. Elimination of PPAP, email security
N
Leader company of SSE (Security Service Edge) that is strong in data protection. In addition to the CASB (Cloud Access Security Broker) function, SWG (Secure Web Gateway), ZTNA (ZTNA (Zero Trust Network Access), FWaaS, etc. are also integrated into SSE solutions.
O
Ohalo Data X-Ray is a DSPM (Data Security Posture Management) solution that centrally manages and visualizes the huge amount of unstructured data that exists within an organization.
IDaaS standard, CIAM (Customer Identity and Access Management), customer ID management and access management
P
Cyber security, internal threat countermeasures, email security, and security education focusing on "people"
Q
R
RiskIQ provides a service that visualizes and manages risks on the Internet. Protect your corporate brand from threats to websites, fraudulent apps, and fraudulent advertisements associated with the spread of phishing attacks, vulnerabilities in your own website, and IT assets that are not under the control of M&A and overseas subsidiaries.
S
IGA (Identity Governance & Administration) realizes risk management, governance, and operational efficiency in ID operation management. for audits and regulatory compliance
Quantification of security risks. A solution that can quantify the likelihood of being targeted by intruders.
Automatically collects information on the Internet and uses a unique algorithm to evaluate 10 items, such as network security and application security, on a 5-point scale
Fraud detection solution that utilizes machine learning. Real-time detection of online fraud on the web to prevent fraudulent payments and account hijacking.
Skyhigh Security (formerly McAfee) provides secure access for work environments, both inside and outside the company. Shadow IT countermeasures, Internet access enhancement, IaaS setting audits, information leakage countermeasures, zero traffic access, firewalls
Data analysis platform
Capable of acquiring, analyzing, and visualizing data in a wide range of fields such as security, IT infrastructure management, IoT/M2M, and web analytics. SIEM (Security Information & Event Management), UEBA (User & Entity Behavior Analytics), SOAR (Security Orchestration, Automation & Response), internal fraud countermeasures, Observability, Observability
A security solution powered by the world's largest threat intelligence. CASB (Cloud Access Security Broker), cloud, SWG (Secure Web Gateway), proxy, isolation, web separation, etc.
T
A unified management platform for endpoints. A platform that visualizes the status of endpoints in real time and enables quick control. Integrated endpoint security management from cyber hygiene to incident response
threat hunting tools
Hardware Security Module
A security brand created by integrating the former FireEye and the former McAfee. Provides EDR (Endpoint Detection & Response), email security, XDR (Extended Detection & Response), etc.
U
It is a solution called EASM (External Attack Surface Management) that continuously grasps the external attack surface and addresses vulnerabilities. It realizes "understanding of externally disclosed assets" and "detection of vulnerabilities".
V
An NDR (Network Detection & Response) solution that detects threats hidden in networks and clouds in real time.
W
X
Y
Z
a
Island's enterprise browser helps improve security, governance, and productivity for enterprises aiming for BYOD, VDI, and zero trust.
A pioneer in Cyber Asset Attack Surface Management (CAASM), which integrates various products to centrally manage your assets and risks. We support the advancement of security operations to achieve cyber hygiene.
Safety evaluation of SaaS settings and compliance measures
Arculus is a revolutionary hardware wallet that securely stores your crypto assets and NFTs. Easily manage your keys with card-shaped hardware and a smartphone app. Compatible with Web3, it is also possible to save and view NFTs.
A leader in providing micro-segmentation to achieve zero trust. It is possible to minimize lateral movement and prevent the spread of damage such as ransomware.
WAF, database security, file security
Infoblox provides world-class, high-performance core network services (DNS, DHCP, IPAM) and DNS security services for simpler, more unified networking and security.
Providing an essential platform for mobile business utilization
It is a solution called EASM (External Attack Surface Management) that continuously grasps the external attack surface and addresses vulnerabilities. It realizes "understanding of externally disclosed assets" and "detection of vulnerabilities".
Next-generation SIEM platform. Utilize machine learning to improve the efficiency of security operations and implement countermeasures against internal fraud. Integrated log management, SIEM (Security Information & Event Management), UEBA (User & Entity Behavior Analytics), SOAR (Security Orchestration, Automation & Response)
Firmware security VBOS measures. Provides a function to visualize terminals, servers, network devices, etc. managed by companies, and to continuously check mainly firmware settings and compliance with various compliances.
State-of-the-art technology for highly automated attack detection and response. Unauthorized access countermeasure solutions check the environment and behavior of PCs and mobile devices to detect and block unauthorized access by organized "humans" as well as cutting-edge automated "bot" attacks. Possible
Email management system
By linking with the content cloud "Box", file sharing when sending and receiving emails is safe and efficient. Elimination of PPAP, email security
IDaaS standard, CIAM (Customer Identity and Access Management), customer ID management and access management
Ohalo Data X-Ray is a DSPM (Data Security Posture Management) solution that centrally manages and visualizes the huge amount of unstructured data that exists within an organization.
mosquito
In addition to external threat countermeasures such as NGAV, EDR, and threat hunting, CrowdStrike realizes various functions related to endpoint security such as USB control, vulnerability management, asset visualization, and security management of cloud settings with a single agent.
All-in-one SASE (Secure Access Service Edge) with native SD-WAN implementation
Securely and optimally connect all locations, data centers, mobile, telework and cloud services. Centralized management of telework, network security, and global security measures
difference
Privileged Access Management (PAM), Privileged Identity Management, Secure Privileged Accounts, Endpoint Privilege Manager (EPM)
Fraud detection solution that utilizes machine learning. Real-time detection of online fraud on the web to prevent fraudulent payments and account hijacking.
A security solution powered by the world's largest threat intelligence. CASB (Cloud Access Security Broker), cloud, SWG (Secure Web Gateway), proxy, isolation, web separation, etc.
Best dedicated server for Splunk
Automate the analog work of the information system department to reduce business costs and improve security levels
[IT device & SaaS integrated management] [Automation of routine tasks associated with joining and leaving the company] [Improved security by detecting shadow IT and accounts that have not been deleted]
Skyhigh Security (formerly McAfee) provides secure access for work environments, both inside and outside the company. Shadow IT countermeasures, Internet access enhancement, IaaS setting audits, information leakage countermeasures, zero traffic access, firewalls
Data analysis platform
Capable of acquiring, analyzing, and visualizing data in a wide range of fields such as security, IT infrastructure management, IoT/M2M, and web analytics. SIEM (Security Information & Event Management), UEBA (User & Entity Behavior Analytics), SOAR (Security Orchestration, Automation & Response), internal fraud countermeasures, Observability, Observability
IGA (Identity Governance & Administration) realizes risk management, governance, and operational efficiency in ID operation management. for audits and regulatory compliance
Quantification of security risks. A solution that can quantify the likelihood of being targeted by intruders.
Automatically collects information on the Internet and uses a unique algorithm to evaluate 10 items, such as network security and application security, on a 5-point scale
rice field
A unified management platform for endpoints. A platform that visualizes the status of endpoints in real time and enables quick control. Integrated endpoint security management from cyber hygiene to incident response
Hardware Security Module
threat hunting tools
Automatic and continuous vulnerability assessment of mobile applications
A security brand created by integrating the former FireEye and the former McAfee. Provides EDR (Endpoint Detection & Response), email security, XDR (Extended Detection & Response), etc.
Nana
Leader company of SSE (Security Service Edge) that is strong in data protection. In addition to the CASB (Cloud Access Security Broker) function, SWG (Secure Web Gateway), ZTNA (ZTNA (Zero Trust Network Access), FWaaS, etc. are also integrated into SSE solutions.
teeth
Cyber security, internal threat countermeasures, email security, and security education focusing on "people"
An NDR (Network Detection & Response) solution that detects threats hidden in networks and clouds in real time.
cloud storage service
Secure content management and collaboration in one platform. Centralized management of content is possible by linking with other systems. cloud, cloud storage, work style reform
devil
Macnica provides security services and SaaS. Services include ASM (Attack Surface Management), SOC, EDR monitoring, threat hunting and incident response.
security intelligence company. Provides ASM (Attack Surface Management) and security measure effectiveness measurement tools
SSE/SWG solution with isolation (internet separation) as the core. SSE (Security Service Edge), RBI (Remote Browser Isolation), ZTNA (Zero Trust Network Access), SWG (Secure Web Gateway), CASB (Cloud Access Security Broker), DLP (Data Loss Prevention),
or
and others
RiskIQ provides a service that visualizes and manages risks on the Internet. Protect your corporate brand from threats to websites, fraudulent apps, and fraudulent advertisements associated with the spread of phishing attacks, vulnerabilities in your own website, and IT assets that are not under the control of M&A and overseas subsidiaries.