Manufacturer

You can search the page from the first letter of the manufacturer name. Click on the appropriate initial letter.

A

Adaptive Shield

Adaptive Shield

adaptive shield

Safety evaluation of SaaS settings and compliance measures

AnChain.AI

AnChain.AI

Web3 Security, blockchain monitoring, smart contract diagnostics

Arculus

Arculus

arcurus

Arculus is a revolutionary hardware wallet that securely stores your crypto assets and NFTs. Easily manage your keys with card-shaped hardware and a smartphone app. Compatible with Web3, it is also possible to save and view NFTs.

Axonius

Axonius

Axonius

A pioneer in Cyber Asset Attack Surface Management (CAASM), which integrates various products to centrally manage your assets and risks. We support the advancement of security operations to achieve cyber hygiene.

B

Box

Box

Box

cloud storage service
Secure content management and collaboration in one platform. Centralized management of content is possible by linking with other systems. cloud, cloud storage, work style reform

C

Cato Networks

Cato Networks

Cato Networks

All-in-one SASE (Secure Access Service Edge) with native SD-WAN implementation
Securely and optimally connect all locations, data centers, mobile, telework and cloud services. Centralized management of telework, network security, and global security measures

CrowdStrike

CrowdStrike

CrowdStrike

In addition to external threat countermeasures such as NGAV, EDR, and threat hunting, CrowdStrike realizes various functions related to endpoint security such as USB control, vulnerability management, asset visualization, and security management of cloud settings with a single agent.

CyberArk

CyberArk

cyber arc

Privileged Access Management (PAM), Privileged Identity Management, Secure Privileged Accounts, Endpoint Privilege Manager (EPM)

D

Data Theorem

Data Theorem

Data Theorem

Automatic and continuous vulnerability assessment of mobile applications

E

Eclypsium

Eclypsium

Eclypsium

Firmware security VBOS measures. Provides a function to visualize terminals, servers, network devices, etc. managed by companies, and to continuously check mainly firmware settings and compliance with various compliances.

Exabeam

Exabeam

Exabeam

Next-generation SIEM platform. Utilize machine learning to improve the efficiency of security operations and implement countermeasures against internal fraud. Integrated log management, SIEM (Security Information & Event Management), UEBA (User & Entity Behavior Analytics), SOAR (Security Orchestration, Automation & Response)

F

F5, Inc (Shape Security)

F5, Inc (Shape Security)

F-Five (Shape Security)

State-of-the-art technology for highly automated attack detection and response. Unauthorized access countermeasure solutions check the environment and behavior of PCs and mobile devices to detect and block unauthorized access by organized "humans" as well as cutting-edge automated "bot" attacks. Possible

G

Gemini Data

Gemini Data

Gemini Data

Best dedicated server for Splunk

H

I

Illumio

Illumio

Illumio

A leader in providing micro-segmentation to achieve zero trust. It is possible to minimize lateral movement and prevent the spread of damage such as ransomware.

Imperva

Imperva

Imperva

WAF, database security, file security

Infoblox

Infoblox

infoblocks

Infoblox provides world-class, high-performance core network services (DNS, DHCP, IPAM) and DNS security services for simpler, more unified networking and security.

Island

Island

island

Island's enterprise browser helps improve security, governance, and productivity for enterprises aiming for BYOD, VDI, and zero trust.

Ivanti (formerly MobileIron)

Ivanti (formerly MobileIron)

Ivanti

Providing an essential platform for mobile business utilization

Ivanti (formerly PulseSecure)

Ivanti (formerly PulseSecure)

Ivanti

SSL-VPN/リモートアクセスソリューション/ゼロトラスト

J

K.

L

M

Macnica

Macnica

Macnica

Macnica provides security services and SaaS. Services include ASM (Attack Surface Management), SOC, EDR monitoring, threat hunting and incident response.

Mandiant

Mandiant

Mandiant

security intelligence company. Provides ASM (Attack Surface Management) and security measure effectiveness measurement tools

Menlo Security

Menlo Security

Menlo Security

SSE/SWG solution with isolation (internet separation) as the core. SSE (Security Service Edge), RBI (Remote Browser Isolation), ZTNA (Zero Trust Network Access), SWG (Secure Web Gateway), CASB (Cloud Access Security Broker), DLP (Data Loss Prevention),

mxHero

mxHero

mxHero

Email management system
By linking with the content cloud "Box", file sharing when sending and receiving emails is safe and efficient. Elimination of PPAP, email security

N

Netskope

Netskope

netscope

Leader company of SSE (Security Service Edge) that is strong in data protection. In addition to the CASB (Cloud Access Security Broker) function, SWG (Secure Web Gateway), ZTNA (ZTNA (Zero Trust Network Access), FWaaS, etc. are also integrated into SSE solutions.

O

Ohalo

Ohalo

Ohalo

Ohalo Data X-Ray is a DSPM (Data Security Posture Management) solution that centrally manages and visualizes the huge amount of unstructured data that exists within an organization.

Okta

Okta

Octa

IDaaS standard, CIAM (Customer Identity and Access Management), customer ID management and access management

P

Proofpoint

Proofpoint

proof point

Cyber security, internal threat countermeasures, email security, and security education focusing on "people"

Q

R

RiskIQ

RiskIQ

RiskIQ

RiskIQ provides a service that visualizes and manages risks on the Internet. Protect your corporate brand from threats to websites, fraudulent apps, and fraudulent advertisements associated with the spread of phishing attacks, vulnerabilities in your own website, and IT assets that are not under the control of M&A and overseas subsidiaries.

S

Saviynt

Saviynt

Savient

IGA (Identity Governance & Administration) realizes risk management, governance, and operational efficiency in ID operation management. for audits and regulatory compliance

Security Scorecard

Security Scorecard

security scorecard

Quantification of security risks. A solution that can quantify the likelihood of being targeted by intruders.
Automatically collects information on the Internet and uses a unique algorithm to evaluate 10 items, such as network security and application security, on a 5-point scale

Sift

Sift

shift

Fraud detection solution that utilizes machine learning. Real-time detection of online fraud on the web to prevent fraudulent payments and account hijacking.

Skyhigh Security

Skyhigh Security

sky high security

Skyhigh Security (formerly McAfee) provides secure access for work environments, both inside and outside the company. Shadow IT countermeasures, Internet access enhancement, IaaS setting audits, information leakage countermeasures, zero traffic access, firewalls

Splunk

Splunk

Splunk

Data analysis platform
Capable of acquiring, analyzing, and visualizing data in a wide range of fields such as security, IT infrastructure management, IoT/M2M, and web analytics. SIEM (Security Information & Event Management), UEBA (User & Entity Behavior Analytics), SOAR (Security Orchestration, Automation & Response), internal fraud countermeasures, Observability, Observability

Symantec products

Symantec products

symantec products

A security solution powered by the world's largest threat intelligence. CASB (Cloud Access Security Broker), cloud, SWG (Secure Web Gateway), proxy, isolation, web separation, etc.

T

Tanium

Tanium

tanium

A unified management platform for endpoints. A platform that visualizes the status of endpoints in real time and enables quick control. Integrated endpoint security management from cyber hygiene to incident response

Team T5

Team T5

TeamT5

threat hunting tools

Thales

Thales

Thales

Hardware Security Module

Trellix

Trellix

Trellix

A security brand created by integrating the former FireEye and the former McAfee. Provides EDR (Endpoint Detection & Response), email security, XDR (Extended Detection & Response), etc.

U

ULTRA RED

ULTRA RED

ultra red

It is a solution called EASM (External Attack Surface Management) that continuously grasps the external attack surface and addresses vulnerabilities. It realizes "understanding of externally disclosed assets" and "detection of vulnerabilities".

V

Vectra AI

Vectra AI

Vectra AI

An NDR (Network Detection & Response) solution that detects threats hidden in networks and clouds in real time.

W

X

Y

Z

a

Island

Island

island

Island's enterprise browser helps improve security, governance, and productivity for enterprises aiming for BYOD, VDI, and zero trust.

Axonius

Axonius

Axonius

A pioneer in Cyber Asset Attack Surface Management (CAASM), which integrates various products to centrally manage your assets and risks. We support the advancement of security operations to achieve cyber hygiene.

Adaptive Shield

Adaptive Shield

adaptive shield

Safety evaluation of SaaS settings and compliance measures

Arculus

Arculus

arcurus

Arculus is a revolutionary hardware wallet that securely stores your crypto assets and NFTs. Easily manage your keys with card-shaped hardware and a smartphone app. Compatible with Web3, it is also possible to save and view NFTs.

Illumio

Illumio

Illumio

A leader in providing micro-segmentation to achieve zero trust. It is possible to minimize lateral movement and prevent the spread of damage such as ransomware.

Imperva

Imperva

Imperva

WAF, database security, file security

Infoblox

Infoblox

infoblocks

Infoblox provides world-class, high-performance core network services (DNS, DHCP, IPAM) and DNS security services for simpler, more unified networking and security.

Ivanti (formerly MobileIron)

Ivanti (formerly MobileIron)

Ivanti

Providing an essential platform for mobile business utilization

ULTRA RED

ULTRA RED

ultra red

It is a solution called EASM (External Attack Surface Management) that continuously grasps the external attack surface and addresses vulnerabilities. It realizes "understanding of externally disclosed assets" and "detection of vulnerabilities".

Exabeam

Exabeam

Exabeam

Next-generation SIEM platform. Utilize machine learning to improve the efficiency of security operations and implement countermeasures against internal fraud. Integrated log management, SIEM (Security Information & Event Management), UEBA (User & Entity Behavior Analytics), SOAR (Security Orchestration, Automation & Response)

Eclypsium

Eclypsium

Eclypsium

Firmware security VBOS measures. Provides a function to visualize terminals, servers, network devices, etc. managed by companies, and to continuously check mainly firmware settings and compliance with various compliances.

F5, Inc (Shape Security)

F5, Inc (Shape Security)

F-Five (Shape Security)

State-of-the-art technology for highly automated attack detection and response. Unauthorized access countermeasure solutions check the environment and behavior of PCs and mobile devices to detect and block unauthorized access by organized "humans" as well as cutting-edge automated "bot" attacks. Possible

mxHero

mxHero

mxHero

Email management system
By linking with the content cloud "Box", file sharing when sending and receiving emails is safe and efficient. Elimination of PPAP, email security

Okta

Okta

Octa

IDaaS standard, CIAM (Customer Identity and Access Management), customer ID management and access management

Ohalo

Ohalo

Ohalo

Ohalo Data X-Ray is a DSPM (Data Security Posture Management) solution that centrally manages and visualizes the huge amount of unstructured data that exists within an organization.

mosquito

CrowdStrike

CrowdStrike

CrowdStrike

In addition to external threat countermeasures such as NGAV, EDR, and threat hunting, CrowdStrike realizes various functions related to endpoint security such as USB control, vulnerability management, asset visualization, and security management of cloud settings with a single agent.

Cato Networks

Cato Networks

Cato Networks

All-in-one SASE (Secure Access Service Edge) with native SD-WAN implementation
Securely and optimally connect all locations, data centers, mobile, telework and cloud services. Centralized management of telework, network security, and global security measures

difference

CyberArk

CyberArk

cyber arc

Privileged Access Management (PAM), Privileged Identity Management, Secure Privileged Accounts, Endpoint Privilege Manager (EPM)

Sift

Sift

shift

Fraud detection solution that utilizes machine learning. Real-time detection of online fraud on the web to prevent fraudulent payments and account hijacking.

Symantec products

Symantec products

symantec products

A security solution powered by the world's largest threat intelligence. CASB (Cloud Access Security Broker), cloud, SWG (Secure Web Gateway), proxy, isolation, web separation, etc.

Gemini Data

Gemini Data

Gemini Data

Best dedicated server for Splunk

Josis

Josis

Josis

Automate the analog work of the information system department to reduce business costs and improve security levels
[IT device & SaaS integrated management] [Automation of routine tasks associated with joining and leaving the company] [Improved security by detecting shadow IT and accounts that have not been deleted]

Skyhigh Security

Skyhigh Security

sky high security

Skyhigh Security (formerly McAfee) provides secure access for work environments, both inside and outside the company. Shadow IT countermeasures, Internet access enhancement, IaaS setting audits, information leakage countermeasures, zero traffic access, firewalls

Splunk

Splunk

Splunk

Data analysis platform
Capable of acquiring, analyzing, and visualizing data in a wide range of fields such as security, IT infrastructure management, IoT/M2M, and web analytics. SIEM (Security Information & Event Management), UEBA (User & Entity Behavior Analytics), SOAR (Security Orchestration, Automation & Response), internal fraud countermeasures, Observability, Observability

Saviynt

Saviynt

Savient

IGA (Identity Governance & Administration) realizes risk management, governance, and operational efficiency in ID operation management. for audits and regulatory compliance

Security Scorecard

Security Scorecard

security scorecard

Quantification of security risks. A solution that can quantify the likelihood of being targeted by intruders.
Automatically collects information on the Internet and uses a unique algorithm to evaluate 10 items, such as network security and application security, on a 5-point scale

rice field

Tanium

Tanium

tanium

A unified management platform for endpoints. A platform that visualizes the status of endpoints in real time and enables quick control. Integrated endpoint security management from cyber hygiene to incident response

Thales

Thales

Thales

Hardware Security Module

Team T5

Team T5

TeamT5

threat hunting tools

Data Theorem

Data Theorem

Data Theorem

Automatic and continuous vulnerability assessment of mobile applications

Trellix

Trellix

Trellix

A security brand created by integrating the former FireEye and the former McAfee. Provides EDR (Endpoint Detection & Response), email security, XDR (Extended Detection & Response), etc.

Nana

Netskope

Netskope

netscope

Leader company of SSE (Security Service Edge) that is strong in data protection. In addition to the CASB (Cloud Access Security Broker) function, SWG (Secure Web Gateway), ZTNA (ZTNA (Zero Trust Network Access), FWaaS, etc. are also integrated into SSE solutions.

teeth

Proofpoint

Proofpoint

proof point

Cyber security, internal threat countermeasures, email security, and security education focusing on "people"

Vectra AI

Vectra AI

Vectra AI

An NDR (Network Detection & Response) solution that detects threats hidden in networks and clouds in real time.

Box

Box

Box

cloud storage service
Secure content management and collaboration in one platform. Centralized management of content is possible by linking with other systems. cloud, cloud storage, work style reform

devil

Macnica

Macnica

Macnica

Macnica provides security services and SaaS. Services include ASM (Attack Surface Management), SOC, EDR monitoring, threat hunting and incident response.

Mandiant

Mandiant

Mandiant

security intelligence company. Provides ASM (Attack Surface Management) and security measure effectiveness measurement tools

Menlo Security

Menlo Security

Menlo Security

SSE/SWG solution with isolation (internet separation) as the core. SSE (Security Service Edge), RBI (Remote Browser Isolation), ZTNA (Zero Trust Network Access), SWG (Secure Web Gateway), CASB (Cloud Access Security Broker), DLP (Data Loss Prevention),

or

and others

RiskIQ

RiskIQ

RiskIQ

RiskIQ provides a service that visualizes and manages risks on the Internet. Protect your corporate brand from threats to websites, fraudulent apps, and fraudulent advertisements associated with the spread of phishing attacks, vulnerabilities in your own website, and IT assets that are not under the control of M&A and overseas subsidiaries.

circle