Manufacturer
You can search the page from the first letter of the manufacturer name. Click on the appropriate initial letter.
A
A leader in email security. Rather than relying on traditional threat intelligence, the company responds to advanced attacks by detecting them through "user behavior modeling." It also protects all communication tools and accounts.
The world's most distributed platform foundation for edge-scale security
Web3 Security, blockchain monitoring, smart contract diagnostics
Arculus is a revolutionary hardware wallet that securely stores your crypto assets and NFTs. Easily manage your keys with card-shaped hardware and a smartphone app. Compatible with Web3, it is also possible to save and view NFTs.
A pioneer in Cyber Asset Attack Surface Management (CAASM), which integrates various products to centrally manage your assets and risks. We support the advancement of security operations to achieve cyber hygiene.
B
The leader in application security testing across the secure development lifecycle.
We offer a portfolio that meets a variety of needs in software development, including software composition analysis (SCA) and static analysis (SAST).
cloud storage service
Secure content management and collaboration in one platform. Centralized management of content is possible by linking with other systems. cloud, cloud storage, work style reform
C
All-in-one SASE (Secure Access Service Edge) with native SD-WAN implementation
Securely and optimally connect all locations, data centers, mobile, telework and cloud services. Centralized management of telework, network security, and global security measures
We have the broadest security portfolio in the industry. We provide products and solutions such as XDR (Extended Detection and Response), Zero Trust, and OT security that connect and protect in this ultra-distributed era where networks and security are becoming more complex and the data we need to protect is also distributed.
In addition to external threat countermeasures such as NGAV, EDR, and threat hunting, CrowdStrike realizes various functions related to endpoint security such as USB control, vulnerability management, asset visualization, and security management of cloud settings with a single agent.
Privileged Access Management (PAM), Privileged Identity Management, Secure Privileged Accounts, Endpoint Privilege Manager (EPM)
D
Automatic and continuous vulnerability assessment of mobile applications
DeepL is an innovative language AI that breaks down language barriers. In addition to text translation, DeepL Translation, DeepL Voice enables real-time speech translation for remote meetings and face-to-face conversations, DeepL Write is a high-performance AI writing assistant, and DeepL API can be integrated with customer applications.
A solution that automatically collects vulnerability information and clarifies your company's security risks by uploading information on OT/IoT/network devices (vendor name, hardware name, firmware version).
Dragos was founded by a team of ICS/OT experts and has a wealth of threat intelligence. We provide a comprehensive platform necessary for OT security, including assessment services that utilize that knowledge, threat visualization, detection, incident response, and remote monitoring.
E
Next-generation SIEM platform. Utilize machine learning to improve the efficiency of security operations and implement countermeasures against internal fraud. Integrated log management, SIEM (Security Information & Event Management), UEBA (User & Entity Behavior Analytics), SOAR (Security Orchestration, Automation & Response)
F
We provide cloud services for wallet-as-a-service, including protection, management, operation of crypto assets and wallets, and asset tokenization.
G
SIEM, Security Operations, SOAR, AI, Security Operations
H
I
A leader in providing micro-segmentation to achieve zero trust. It is possible to minimize lateral movement and prevent the spread of damage such as ransomware.
WAF, database security, file security
Infoblox provides world-class, high-performance core network services (DNS, DHCP, IPAM) and DNS security services for simpler, more unified networking and security.
Island's enterprise browser helps improve security, governance, and productivity for enterprises aiming for BYOD, VDI, and zero trust.
Providing an essential platform for mobile business utilization
SSL-VPN/リモートアクセスソリューション/ゼロトラスト
J
A service that supports IT and security operations for small and medium-sized enterprises. By entrusting all operations related to ID management, device management, cloud security, and document management to Macnica, you can alleviate the shortage of human resources in your information systems department, reduce your workload, and contribute to the growth of your company.
K
An advanced password manager based on zero trust. Passwords and credentials are encrypted and securely managed centrally. It features automatic password entry and strong password generation, enabling strong authentication to systems while simultaneously improving work efficiency.
L
M
Macnica 's proprietary Attack Surface Mangagement (ASM) utilizes the unique knowledge of the Security Research Center and, when necessary, uses "human hands and eyes" to achieve accurate and comprehensive investigations.
Macnica provides security services and SaaS. We provide services such as SOC, EDR monitoring, threat hunting and incident response.
SSE/SWG solution with isolation (internet separation) as the core. SSE (Security Service Edge), RBI (Remote Browser Isolation), ZTNA (Zero Trust Network Access), SWG (Secure Web Gateway), CASB (Cloud Access Security Broker), DLP (Data Loss Prevention),
Email management system
By linking with the content cloud "Box", file sharing when sending and receiving emails is safe and efficient. Elimination of PPAP, email security
N
Leader company of SSE (Security Service Edge) that is strong in data protection. In addition to the CASB (Cloud Access Security Broker) function, SWG (Secure Web Gateway), ZTNA (ZTNA (Zero Trust Network Access), FWaaS, etc. are also integrated into SSE solutions.
We provide an integrated IT management platform that centralizes the monitoring, management, and automation of IT assets, regardless of whether they are PCs, servers, or mobile devices, and can also flexibly link with other tools.
O
Ohalo Data X-Ray is a DSPM (Data Security Posture Management) solution that centrally manages and visualizes the huge amount of unstructured data that exists within an organization.
IDaaS standard, CIAM (Customer Identity and Access Management), customer ID management and access management
P
Cyber security, internal threat countermeasures, email security, and security education focusing on "people"
Q
R
A pioneer in EAP (Exposure Assessment Platform), which provides agentless, integrated visibility into IT/OT/IoT assets and risks. It visualizes all digital assets and risks within a company's network and cloud environment, enabling exposure management.
S
IGA (Identity Governance & Administration) realizes risk management, governance, and operational efficiency in ID operation management. for audits and regulatory compliance
By systematizing the procedures for obtaining ISMS certification and the P-mark, we have significantly reduced the amount of work and resources required. By centrally managing the large amount of documents required for obtaining, maintaining, and renewing certification, we have contributed to improving work efficiency and reducing costs, and strengthened the organization's internal regulations and information security governance.
Quantification of security risks. A solution that can quantify the likelihood of being targeted by intruders.
Automatically collects information on the Internet and uses a unique algorithm to evaluate 10 items, such as network security and application security, on a 5-point scale
Fraud detection solution that utilizes machine learning. Real-time detection of online fraud on the web to prevent fraudulent payments and account hijacking.
Skyhigh Security (formerly McAfee) provides secure access for work environments, both inside and outside the company. Shadow IT countermeasures, Internet access enhancement, IaaS setting audits, information leakage countermeasures, zero traffic access, firewalls
Data analysis platform
Capable of acquiring, analyzing, and visualizing data in a wide range of fields such as security, IT infrastructure management, IoT/M2M, and web analytics. SIEM (Security Information & Event Management), UEBA (User & Entity Behavior Analytics), SOAR (Security Orchestration, Automation & Response), internal fraud countermeasures, Observability, Observability
A leader in SOAR (Security Orchestration, Automation and Response), which automates security operations. Resolves operational issues for each customer through automation using playbooks and customizable case management.
T
A unified management platform for endpoints. A platform that visualizes the status of endpoints in real time and enables quick control. Integrated endpoint security management from cyber hygiene to incident response
threat hunting tools
A domestically developed digital adoption platform (DAP) that supports the use of SaaS, including Box. In addition to ensuring Box usage is established through user guides, it promotes the use of generated AI through integration with Box AI. It continuously supports companies in improving security and productivity.
Hardware Security Module
A plug-and-play infrastructure that can be installed in as little as one day, with no gas fees, and a dedicated L1 chain for each company, this service enables full-scale utilization of Web3 with unprecedented speed and flexibility.
A security brand created by integrating the former FireEye and the former McAfee. Provides EDR (Endpoint Detection & Response), email security, XDR (Extended Detection & Response), etc.
U
It is a solution called EASM (External Attack Surface Management) that continuously grasps the external attack surface and addresses vulnerabilities. It realizes "understanding of externally disclosed assets" and "detection of vulnerabilities".
V
An NDR (Network Detection & Response) solution that detects threats hidden in networks and clouds in real time.
W
X
Y
Z
a
Island's enterprise browser helps improve security, governance, and productivity for enterprises aiming for BYOD, VDI, and zero trust.
The world's most distributed platform foundation for edge-scale security
A pioneer in Cyber Asset Attack Surface Management (CAASM), which integrates various products to centrally manage your assets and risks. We support the advancement of security operations to achieve cyber hygiene.
A leader in email security. Rather than relying on traditional threat intelligence, the company responds to advanced attacks by detecting them through "user behavior modeling." It also protects all communication tools and accounts.
Arculus is a revolutionary hardware wallet that securely stores your crypto assets and NFTs. Easily manage your keys with card-shaped hardware and a smartphone app. Compatible with Web3, it is also possible to save and view NFTs.
A leader in providing micro-segmentation to achieve zero trust. It is possible to minimize lateral movement and prevent the spread of damage such as ransomware.
WAF, database security, file security
Infoblox provides world-class, high-performance core network services (DNS, DHCP, IPAM) and DNS security services for simpler, more unified networking and security.
Providing an essential platform for mobile business utilization
It is a solution called EASM (External Attack Surface Management) that continuously grasps the external attack surface and addresses vulnerabilities. It realizes "understanding of externally disclosed assets" and "detection of vulnerabilities".
Next-generation SIEM platform. Utilize machine learning to improve the efficiency of security operations and implement countermeasures against internal fraud. Integrated log management, SIEM (Security Information & Event Management), UEBA (User & Entity Behavior Analytics), SOAR (Security Orchestration, Automation & Response)
Email management system
By linking with the content cloud "Box", file sharing when sending and receiving emails is safe and efficient. Elimination of PPAP, email security
IDaaS standard, CIAM (Customer Identity and Access Management), customer ID management and access management
Ohalo Data X-Ray is a DSPM (Data Security Posture Management) solution that centrally manages and visualizes the huge amount of unstructured data that exists within an organization.
mosquito
An advanced password manager based on zero trust. Passwords and credentials are encrypted and securely managed centrally. It features automatic password entry and strong password generation, enabling strong authentication to systems while simultaneously improving work efficiency.
In addition to external threat countermeasures such as NGAV, EDR, and threat hunting, CrowdStrike realizes various functions related to endpoint security such as USB control, vulnerability management, asset visualization, and security management of cloud settings with a single agent.
SIEM, Security Operations, SOAR, AI, Security Operations
All-in-one SASE (Secure Access Service Edge) with native SD-WAN implementation
Securely and optimally connect all locations, data centers, mobile, telework and cloud services. Centralized management of telework, network security, and global security measures
difference
Privileged Access Management (PAM), Privileged Identity Management, Secure Privileged Accounts, Endpoint Privilege Manager (EPM)
We have the broadest security portfolio in the industry. We provide products and solutions such as XDR (Extended Detection and Response), Zero Trust, and OT security that connect and protect in this ultra-distributed era where networks and security are becoming more complex and the data we need to protect is also distributed.
Fraud detection solution that utilizes machine learning. Real-time detection of online fraud on the web to prevent fraudulent payments and account hijacking.
Automate the analog work of the information system department to reduce business costs and improve security levels
[IT device & SaaS integrated management] [Automation of routine tasks associated with joining and leaving the company] [Improved security by detecting shadow IT and accounts that have not been deleted]
A leader in SOAR (Security Orchestration, Automation and Response), which automates security operations. Resolves operational issues for each customer through automation using playbooks and customizable case management.
Skyhigh Security (formerly McAfee) provides secure access for work environments, both inside and outside the company. Shadow IT countermeasures, Internet access enhancement, IaaS setting audits, information leakage countermeasures, zero traffic access, firewalls
Data analysis platform
Capable of acquiring, analyzing, and visualizing data in a wide range of fields such as security, IT infrastructure management, IoT/M2M, and web analytics. SIEM (Security Information & Event Management), UEBA (User & Entity Behavior Analytics), SOAR (Security Orchestration, Automation & Response), internal fraud countermeasures, Observability, Observability
IGA (Identity Governance & Administration) realizes risk management, governance, and operational efficiency in ID operation management. for audits and regulatory compliance
By systematizing the procedures for obtaining ISMS certification and the P-mark, we have significantly reduced the amount of work and resources required. By centrally managing the large amount of documents required for obtaining, maintaining, and renewing certification, we have contributed to improving work efficiency and reducing costs, and strengthened the organization's internal regulations and information security governance.
Quantification of security risks. A solution that can quantify the likelihood of being targeted by intruders.
Automatically collects information on the Internet and uses a unique algorithm to evaluate 10 items, such as network security and application security, on a 5-point scale
We provide a framework that enables efficient and effective security measures to address security issues that arise in the process of promoting digital transformation and DX in medium-sized and small businesses, contributing to corporate growth.
rice field
A unified management platform for endpoints. A platform that visualizes the status of endpoints in real time and enables quick control. Integrated endpoint security management from cyber hygiene to incident response
Hardware Security Module
threat hunting tools
A plug-and-play infrastructure that can be installed in as little as one day, with no gas fees, and a dedicated L1 chain for each company, this service enables full-scale utilization of Web3 with unprecedented speed and flexibility.
A domestically developed digital adoption platform (DAP) that supports the use of SaaS, including Box. In addition to ensuring Box usage is established through user guides, it promotes the use of generated AI through integration with Box AI. It continuously supports companies in improving security and productivity.
DeepL is an innovative language AI that breaks down language barriers. In addition to text translation, DeepL Translation, DeepL Voice enables real-time speech translation for remote meetings and face-to-face conversations, DeepL Write is a high-performance AI writing assistant, and DeepL API can be integrated with customer applications.
A solution that automatically collects vulnerability information and clarifies your company's security risks by uploading information on OT/IoT/network devices (vendor name, hardware name, firmware version).
Automatic and continuous vulnerability assessment of mobile applications
A security brand created by integrating the former FireEye and the former McAfee. Provides EDR (Endpoint Detection & Response), email security, XDR (Extended Detection & Response), etc.
Dragos was founded by a team of ICS/OT experts and has a wealth of threat intelligence. We provide a comprehensive platform necessary for OT security, including assessment services that utilize that knowledge, threat visualization, detection, incident response, and remote monitoring.
Nana
We provide an integrated IT management platform that centralizes the monitoring, management, and automation of IT assets, regardless of whether they are PCs, servers, or mobile devices, and can also flexibly link with other tools.
Leader company of SSE (Security Service Edge) that is strong in data protection. In addition to the CASB (Cloud Access Security Broker) function, SWG (Secure Web Gateway), ZTNA (ZTNA (Zero Trust Network Access), FWaaS, etc. are also integrated into SSE solutions.
teeth
We provide cloud services for wallet-as-a-service, including protection, management, operation of crypto assets and wallets, and asset tokenization.
The leader in application security testing across the secure development lifecycle.
We offer a portfolio that meets a variety of needs in software development, including software composition analysis (SCA) and static analysis (SAST).
Cyber security, internal threat countermeasures, email security, and security education focusing on "people"
An NDR (Network Detection & Response) solution that detects threats hidden in networks and clouds in real time.
cloud storage service
Secure content management and collaboration in one platform. Centralized management of content is possible by linking with other systems. cloud, cloud storage, work style reform
devil
Macnica 's proprietary Attack Surface Mangagement (ASM) utilizes the unique knowledge of the Security Research Center and, when necessary, uses "human hands and eyes" to achieve accurate and comprehensive investigations.
Macnica provides security services and SaaS. We provide services such as SOC, EDR monitoring, threat hunting and incident response.
SSE/SWG solution with isolation (internet separation) as the core. SSE (Security Service Edge), RBI (Remote Browser Isolation), ZTNA (Zero Trust Network Access), SWG (Secure Web Gateway), CASB (Cloud Access Security Broker), DLP (Data Loss Prevention),
or
and others
A pioneer in EAP (Exposure Assessment Platform), which provides agentless, integrated visibility into IT/OT/IoT assets and risks. It visualizes all digital assets and risks within a company's network and cloud environment, enabling exposure management.























































