Site Search

Manufacturer

You can search the page from the first letter of the manufacturer name. Click on the appropriate initial letter.

A

Abnormal AI

Abnormal AI

Abnormal AI

A leader in email security. Rather than relying on traditional threat intelligence, the company responds to advanced attacks by detecting them through "user behavior modeling." It also protects all communication tools and accounts.

Akamai

Akamai

Akamai

The world's most distributed platform foundation for edge-scale security

AnChain.AI

AnChain.AI

Web3 Security, blockchain monitoring, smart contract diagnostics

Arculus

Arculus

arcurus

Arculus is a revolutionary hardware wallet that securely stores your crypto assets and NFTs. Easily manage your keys with card-shaped hardware and a smartphone app. Compatible with Web3, it is also possible to save and view NFTs.

Axonius

Axonius

Axonius

A pioneer in Cyber Asset Attack Surface Management (CAASM), which integrates various products to centrally manage your assets and risks. We support the advancement of security operations to achieve cyber hygiene.

B

BlackDuck

BlackDuck

Black Duck Software

The leader in application security testing across the secure development lifecycle.
We offer a portfolio that meets a variety of needs in software development, including software composition analysis (SCA) and static analysis (SAST).

Box

Box

Box

cloud storage service
Secure content management and collaboration in one platform. Centralized management of content is possible by linking with other systems. cloud, cloud storage, work style reform

C

Cato Networks

Cato Networks

Cato Networks

All-in-one SASE (Secure Access Service Edge) with native SD-WAN implementation
Securely and optimally connect all locations, data centers, mobile, telework and cloud services. Centralized management of telework, network security, and global security measures

Cisco

Cisco

Cisco

We have the broadest security portfolio in the industry. We provide products and solutions such as XDR (Extended Detection and Response), Zero Trust, and OT security that connect and protect in this ultra-distributed era where networks and security are becoming more complex and the data we need to protect is also distributed.

CrowdStrike

CrowdStrike

CrowdStrike

In addition to external threat countermeasures such as NGAV, EDR, and threat hunting, CrowdStrike realizes various functions related to endpoint security such as USB control, vulnerability management, asset visualization, and security management of cloud settings with a single agent.

CyberArk

CyberArk

cyber arc

Privileged Access Management (PAM), Privileged Identity Management, Secure Privileged Accounts, Endpoint Privilege Manager (EPM)

D

Data Theorem

Data Theorem

Data Theorem

Automatic and continuous vulnerability assessment of mobile applications

Deep L

Deep L

Deep L

DeepL is an innovative language AI that breaks down language barriers. In addition to text translation, DeepL Translation, DeepL Voice enables real-time speech translation for remote meetings and face-to-face conversations, DeepL Write is a high-performance AI writing assistant, and DeepL API can be integrated with customer applications.

DeviceTotal

DeviceTotal

device total

A solution that automatically collects vulnerability information and clarifies your company's security risks by uploading information on OT/IoT/network devices (vendor name, hardware name, firmware version).

Dragos

Dragos

Dragos

Dragos was founded by a team of ICS/OT experts and has a wealth of threat intelligence. We provide a comprehensive platform necessary for OT security, including assessment services that utilize that knowledge, threat visualization, detection, incident response, and remote monitoring.

E

Exabeam

Exabeam

Exabeam

Next-generation SIEM platform. Utilize machine learning to improve the efficiency of security operations and implement countermeasures against internal fraud. Integrated log management, SIEM (Security Information & Event Management), UEBA (User & Entity Behavior Analytics), SOAR (Security Orchestration, Automation & Response)

F

Finite State

Finite State

finite state

Fireblocks

Fireblocks

Fire Blocks

We provide cloud services for wallet-as-a-service, including protection, management, operation of crypto assets and wallets, and asset tokenization.

G

Google Cloud

Google Cloud

Google Cloud

SIEM, Security Operations, SOAR, AI, Security Operations

H

I

Illumio

Illumio

Illumio

A leader in providing micro-segmentation to achieve zero trust. It is possible to minimize lateral movement and prevent the spread of damage such as ransomware.

Imperva

Imperva

Imperva

WAF, database security, file security

Infoblox

Infoblox

infoblocks

Infoblox provides world-class, high-performance core network services (DNS, DHCP, IPAM) and DNS security services for simpler, more unified networking and security.

Island

Island

island

Island's enterprise browser helps improve security, governance, and productivity for enterprises aiming for BYOD, VDI, and zero trust.

Ivanti (formerly MobileIron)

Ivanti (formerly MobileIron)

Ivanti

Providing an essential platform for mobile business utilization

Ivanti (formerly PulseSecure)

Ivanti (formerly PulseSecure)

Ivanti

SSL-VPN/リモートアクセスソリューション/ゼロトラスト

J

JumpCloud

JumpCloud

A service that supports IT and security operations for small and medium-sized enterprises. By entrusting all operations related to ID management, device management, cloud security, and document management to Macnica, you can alleviate the shortage of human resources in your information systems department, reduce your workload, and contribute to the growth of your company.

K

Keeper

Keeper

keeper

An advanced password manager based on zero trust. Passwords and credentials are encrypted and securely managed centrally. It features automatic password entry and strong password generation, enabling strong authentication to systems while simultaneously improving work efficiency.

L

Lean Seeks

Lean Seeks

LeanSeeks

M

Macnica Attack Surface Management

Macnica Attack Surface Management

Macnica Attack Surface Management

Macnica 's proprietary Attack Surface Mangagement (ASM) utilizes the unique knowledge of the Security Research Center and, when necessary, uses "human hands and eyes" to achieve accurate and comprehensive investigations.

Macnica Security Service

Macnica Security Service

Macnica Security Services

Macnica provides security services and SaaS. We provide services such as SOC, EDR monitoring, threat hunting and incident response.

Menlo Security

Menlo Security

Menlo Security

SSE/SWG solution with isolation (internet separation) as the core. SSE (Security Service Edge), RBI (Remote Browser Isolation), ZTNA (Zero Trust Network Access), SWG (Secure Web Gateway), CASB (Cloud Access Security Broker), DLP (Data Loss Prevention),

mxHERO

mxHERO

mxHero

Email management system
By linking with the content cloud "Box", file sharing when sending and receiving emails is safe and efficient. Elimination of PPAP, email security

N

Netskope

Netskope

netscope

Leader company of SSE (Security Service Edge) that is strong in data protection. In addition to the CASB (Cloud Access Security Broker) function, SWG (Secure Web Gateway), ZTNA (ZTNA (Zero Trust Network Access), FWaaS, etc. are also integrated into SSE solutions.

NinjaOne

NinjaOne

Ninja One

We provide an integrated IT management platform that centralizes the monitoring, management, and automation of IT assets, regardless of whether they are PCs, servers, or mobile devices, and can also flexibly link with other tools.

O

Ohalo

Ohalo

Ohalo

Ohalo Data X-Ray is a DSPM (Data Security Posture Management) solution that centrally manages and visualizes the huge amount of unstructured data that exists within an organization.

Okta

Okta

Octa

IDaaS standard, CIAM (Customer Identity and Access Management), customer ID management and access management

P

Proofpoint

Proofpoint

proof point

Cyber security, internal threat countermeasures, email security, and security education focusing on "people"

Q

R

runZero

runZero

Run Zero

A pioneer in EAP (Exposure Assessment Platform), which provides agentless, integrated visibility into IT/OT/IoT assets and risks. It visualizes all digital assets and risks within a company's network and cloud environment, enabling exposure management.

S

Saviynt

Saviynt

Savient

IGA (Identity Governance & Administration) realizes risk management, governance, and operational efficiency in ID operation management. for audits and regulatory compliance

SecureNavi

SecureNavi

Secure Navi

By systematizing the procedures for obtaining ISMS certification and the P-mark, we have significantly reduced the amount of work and resources required. By centrally managing the large amount of documents required for obtaining, maintaining, and renewing certification, we have contributed to improving work efficiency and reducing costs, and strengthened the organization's internal regulations and information security governance.

Security Scorecard

Security Scorecard

security scorecard

Quantification of security risks. A solution that can quantify the likelihood of being targeted by intruders.
Automatically collects information on the Internet and uses a unique algorithm to evaluate 10 items, such as network security and application security, on a 5-point scale

Sift

Sift

shift

Fraud detection solution that utilizes machine learning. Real-time detection of online fraud on the web to prevent fraudulent payments and account hijacking.

Skyhigh Security

Skyhigh Security

sky high security

Skyhigh Security (formerly McAfee) provides secure access for work environments, both inside and outside the company. Shadow IT countermeasures, Internet access enhancement, IaaS setting audits, information leakage countermeasures, zero traffic access, firewalls

Splunk

Splunk

Splunk

Data analysis platform
Capable of acquiring, analyzing, and visualizing data in a wide range of fields such as security, IT infrastructure management, IoT/M2M, and web analytics. SIEM (Security Information & Event Management), UEBA (User & Entity Behavior Analytics), SOAR (Security Orchestration, Automation & Response), internal fraud countermeasures, Observability, Observability

Swimlane

Swimlane

Swimlanes

A leader in SOAR (Security Orchestration, Automation and Response), which automates security operations. Resolves operational issues for each customer through automation using playbooks and customizable case management.

T

Tanium

Tanium

tanium

A unified management platform for endpoints. A platform that visualizes the status of endpoints in real time and enables quick control. Integrated endpoint security management from cyber hygiene to incident response

Team T5

Team T5

TeamT5

threat hunting tools

techtouch

techtouch

Tech Touch

A domestically developed digital adoption platform (DAP) that supports the use of SaaS, including Box. In addition to ensuring Box usage is established through user guides, it promotes the use of generated AI through integration with Box AI. It continuously supports companies in improving security and productivity.

Thales

Thales

Thales

Hardware Security Module

THXLAB

THXLAB

THFx Lab

A plug-and-play infrastructure that can be installed in as little as one day, with no gas fees, and a dedicated L1 chain for each company, this service enables full-scale utilization of Web3 with unprecedented speed and flexibility.

Trellix

Trellix

Trellix

A security brand created by integrating the former FireEye and the former McAfee. Provides EDR (Endpoint Detection & Response), email security, XDR (Extended Detection & Response), etc.

U

ULTRA RED

ULTRA RED

ultra red

It is a solution called EASM (External Attack Surface Management) that continuously grasps the external attack surface and addresses vulnerabilities. It realizes "understanding of externally disclosed assets" and "detection of vulnerabilities".

V

Vectra AI

Vectra AI

Vectra AI

An NDR (Network Detection & Response) solution that detects threats hidden in networks and clouds in real time.

W

Wiz

Wiz

With

X

Y

Z

a

Island

Island

island

Island's enterprise browser helps improve security, governance, and productivity for enterprises aiming for BYOD, VDI, and zero trust.

Akamai

Akamai

Akamai

The world's most distributed platform foundation for edge-scale security

Axonius

Axonius

Axonius

A pioneer in Cyber Asset Attack Surface Management (CAASM), which integrates various products to centrally manage your assets and risks. We support the advancement of security operations to achieve cyber hygiene.

Abnormal AI

Abnormal AI

Abnormal AI

A leader in email security. Rather than relying on traditional threat intelligence, the company responds to advanced attacks by detecting them through "user behavior modeling." It also protects all communication tools and accounts.

Arculus

Arculus

arcurus

Arculus is a revolutionary hardware wallet that securely stores your crypto assets and NFTs. Easily manage your keys with card-shaped hardware and a smartphone app. Compatible with Web3, it is also possible to save and view NFTs.

Illumio

Illumio

Illumio

A leader in providing micro-segmentation to achieve zero trust. It is possible to minimize lateral movement and prevent the spread of damage such as ransomware.

Imperva

Imperva

Imperva

WAF, database security, file security

Infoblox

Infoblox

infoblocks

Infoblox provides world-class, high-performance core network services (DNS, DHCP, IPAM) and DNS security services for simpler, more unified networking and security.

Ivanti (formerly MobileIron)

Ivanti (formerly MobileIron)

Ivanti

Providing an essential platform for mobile business utilization

Wiz

Wiz

With

ULTRA RED

ULTRA RED

ultra red

It is a solution called EASM (External Attack Surface Management) that continuously grasps the external attack surface and addresses vulnerabilities. It realizes "understanding of externally disclosed assets" and "detection of vulnerabilities".

Exabeam

Exabeam

Exabeam

Next-generation SIEM platform. Utilize machine learning to improve the efficiency of security operations and implement countermeasures against internal fraud. Integrated log management, SIEM (Security Information & Event Management), UEBA (User & Entity Behavior Analytics), SOAR (Security Orchestration, Automation & Response)

mxHERO

mxHERO

mxHero

Email management system
By linking with the content cloud "Box", file sharing when sending and receiving emails is safe and efficient. Elimination of PPAP, email security

Okta

Okta

Octa

IDaaS standard, CIAM (Customer Identity and Access Management), customer ID management and access management

Ohalo

Ohalo

Ohalo

Ohalo Data X-Ray is a DSPM (Data Security Posture Management) solution that centrally manages and visualizes the huge amount of unstructured data that exists within an organization.

mosquito

Keeper

Keeper

keeper

An advanced password manager based on zero trust. Passwords and credentials are encrypted and securely managed centrally. It features automatic password entry and strong password generation, enabling strong authentication to systems while simultaneously improving work efficiency.

CrowdStrike

CrowdStrike

CrowdStrike

In addition to external threat countermeasures such as NGAV, EDR, and threat hunting, CrowdStrike realizes various functions related to endpoint security such as USB control, vulnerability management, asset visualization, and security management of cloud settings with a single agent.

Google Cloud

Google Cloud

Google Cloud

SIEM, Security Operations, SOAR, AI, Security Operations

Cato Networks

Cato Networks

Cato Networks

All-in-one SASE (Secure Access Service Edge) with native SD-WAN implementation
Securely and optimally connect all locations, data centers, mobile, telework and cloud services. Centralized management of telework, network security, and global security measures

difference

CyberArk

CyberArk

cyber arc

Privileged Access Management (PAM), Privileged Identity Management, Secure Privileged Accounts, Endpoint Privilege Manager (EPM)

Cisco

Cisco

Cisco

We have the broadest security portfolio in the industry. We provide products and solutions such as XDR (Extended Detection and Response), Zero Trust, and OT security that connect and protect in this ultra-distributed era where networks and security are becoming more complex and the data we need to protect is also distributed.

Sift

Sift

shift

Fraud detection solution that utilizes machine learning. Real-time detection of online fraud on the web to prevent fraudulent payments and account hijacking.

Josis

Josis

Josis

Automate the analog work of the information system department to reduce business costs and improve security levels
[IT device & SaaS integrated management] [Automation of routine tasks associated with joining and leaving the company] [Improved security by detecting shadow IT and accounts that have not been deleted]

Swimlane

Swimlane

Swimlanes

A leader in SOAR (Security Orchestration, Automation and Response), which automates security operations. Resolves operational issues for each customer through automation using playbooks and customizable case management.

Skyhigh Security

Skyhigh Security

sky high security

Skyhigh Security (formerly McAfee) provides secure access for work environments, both inside and outside the company. Shadow IT countermeasures, Internet access enhancement, IaaS setting audits, information leakage countermeasures, zero traffic access, firewalls

Splunk

Splunk

Splunk

Data analysis platform
Capable of acquiring, analyzing, and visualizing data in a wide range of fields such as security, IT infrastructure management, IoT/M2M, and web analytics. SIEM (Security Information & Event Management), UEBA (User & Entity Behavior Analytics), SOAR (Security Orchestration, Automation & Response), internal fraud countermeasures, Observability, Observability

Saviynt

Saviynt

Savient

IGA (Identity Governance & Administration) realizes risk management, governance, and operational efficiency in ID operation management. for audits and regulatory compliance

SecureNavi

SecureNavi

Secure Navi

By systematizing the procedures for obtaining ISMS certification and the P-mark, we have significantly reduced the amount of work and resources required. By centrally managing the large amount of documents required for obtaining, maintaining, and renewing certification, we have contributed to improving work efficiency and reducing costs, and strengthened the organization's internal regulations and information security governance.

Security Scorecard

Security Scorecard

security scorecard

Quantification of security risks. A solution that can quantify the likelihood of being targeted by intruders.
Automatically collects information on the Internet and uses a unique algorithm to evaluate 10 items, such as network security and application security, on a 5-point scale

Complete security support service

Complete security support service

Complete security support service

We provide a framework that enables efficient and effective security measures to address security issues that arise in the process of promoting digital transformation and DX in medium-sized and small businesses, contributing to corporate growth.

rice field

Tanium

Tanium

tanium

A unified management platform for endpoints. A platform that visualizes the status of endpoints in real time and enables quick control. Integrated endpoint security management from cyber hygiene to incident response

Thales

Thales

Thales

Hardware Security Module

Team T5

Team T5

TeamT5

threat hunting tools

THXLAB

THXLAB

THFx Lab

A plug-and-play infrastructure that can be installed in as little as one day, with no gas fees, and a dedicated L1 chain for each company, this service enables full-scale utilization of Web3 with unprecedented speed and flexibility.

techtouch

techtouch

Tech Touch

A domestically developed digital adoption platform (DAP) that supports the use of SaaS, including Box. In addition to ensuring Box usage is established through user guides, it promotes the use of generated AI through integration with Box AI. It continuously supports companies in improving security and productivity.

Deep L

Deep L

Deep L

DeepL is an innovative language AI that breaks down language barriers. In addition to text translation, DeepL Translation, DeepL Voice enables real-time speech translation for remote meetings and face-to-face conversations, DeepL Write is a high-performance AI writing assistant, and DeepL API can be integrated with customer applications.

DeviceTotal

DeviceTotal

device total

A solution that automatically collects vulnerability information and clarifies your company's security risks by uploading information on OT/IoT/network devices (vendor name, hardware name, firmware version).

Data Theorem

Data Theorem

Data Theorem

Automatic and continuous vulnerability assessment of mobile applications

Trellix

Trellix

Trellix

A security brand created by integrating the former FireEye and the former McAfee. Provides EDR (Endpoint Detection & Response), email security, XDR (Extended Detection & Response), etc.

Dragos

Dragos

Dragos

Dragos was founded by a team of ICS/OT experts and has a wealth of threat intelligence. We provide a comprehensive platform necessary for OT security, including assessment services that utilize that knowledge, threat visualization, detection, incident response, and remote monitoring.

Nana

NinjaOne

NinjaOne

Ninja One

We provide an integrated IT management platform that centralizes the monitoring, management, and automation of IT assets, regardless of whether they are PCs, servers, or mobile devices, and can also flexibly link with other tools.

Netskope

Netskope

netscope

Leader company of SSE (Security Service Edge) that is strong in data protection. In addition to the CASB (Cloud Access Security Broker) function, SWG (Secure Web Gateway), ZTNA (ZTNA (Zero Trust Network Access), FWaaS, etc. are also integrated into SSE solutions.

teeth

Finite State

Finite State

finite state

Fireblocks

Fireblocks

Fire Blocks

We provide cloud services for wallet-as-a-service, including protection, management, operation of crypto assets and wallets, and asset tokenization.

BlackDuck

BlackDuck

Black Duck Software

The leader in application security testing across the secure development lifecycle.
We offer a portfolio that meets a variety of needs in software development, including software composition analysis (SCA) and static analysis (SAST).

Proofpoint

Proofpoint

proof point

Cyber security, internal threat countermeasures, email security, and security education focusing on "people"

Vectra AI

Vectra AI

Vectra AI

An NDR (Network Detection & Response) solution that detects threats hidden in networks and clouds in real time.

Box

Box

Box

cloud storage service
Secure content management and collaboration in one platform. Centralized management of content is possible by linking with other systems. cloud, cloud storage, work style reform

devil

Macnica Attack Surface Management

Macnica Attack Surface Management

Macnica Attack Surface Management

Macnica 's proprietary Attack Surface Mangagement (ASM) utilizes the unique knowledge of the Security Research Center and, when necessary, uses "human hands and eyes" to achieve accurate and comprehensive investigations.

Macnica Security Service

Macnica Security Service

Macnica Security Services

Macnica provides security services and SaaS. We provide services such as SOC, EDR monitoring, threat hunting and incident response.

Menlo Security

Menlo Security

Menlo Security

SSE/SWG solution with isolation (internet separation) as the core. SSE (Security Service Edge), RBI (Remote Browser Isolation), ZTNA (Zero Trust Network Access), SWG (Secure Web Gateway), CASB (Cloud Access Security Broker), DLP (Data Loss Prevention),

or

and others

runZero

runZero

Run Zero

A pioneer in EAP (Exposure Assessment Platform), which provides agentless, integrated visibility into IT/OT/IoT assets and risks. It visualizes all digital assets and risks within a company's network and cloud environment, enabling exposure management.

Lean Seeks

Lean Seeks

LeanSeeks

circle