Vulnerability Assessment Serviceのメーカーや取扱い企業、製品情報、参考価格、ランキングをまとめています。
イプロスは、 製造業 BtoB における情報を集めた国内最大級の技術データベースサイトです。

Vulnerability Assessment Service - メーカー・企業34社の製品一覧とランキング

更新日: 集計期間:Sep 17, 2025~Oct 14, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

Vulnerability Assessment Serviceのメーカー・企業ランキング

更新日: 集計期間:Sep 17, 2025~Oct 14, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. ONWARD SECURITY JAPAN Tokyo//IT/Telecommunications
  2. ブロードバンドセキュリティ Tokyo//IT/Telecommunications
  3. ワールドスカイ Tokyo//Service Industry
  4. アイロバ Tokyo//IT/Telecommunications
  5. ガイオ・テクノロジー Tokyo//IT/Telecommunications

Vulnerability Assessment Serviceの製品ランキング

更新日: 集計期間:Sep 17, 2025~Oct 14, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. Information Security Verification Service for Amazon Alexa ONWARD SECURITY JAPAN
  2. Vulnerability Assessment Service ワールドスカイ
  3. Comprehensive Security Service "BLUE Sphere" アイロバ
  4. Cracker Probing-Eyes(R) Core ブロードバンドセキュリティ
  5. 4 「SharedVariableChecker2」 ガイオ・テクノロジー

Vulnerability Assessment Serviceの製品一覧

1~15 件を表示 / 全 58 件

表示件数

Code Analysis Refiner

We will supplement the missing features in CodeChecker and significantly reduce the time required for operating static analysis tools.

■Feature 1: Information related to violation warnings can be managed within a single framework Handling violation warnings requires multiple pieces of information, such as source code and coding rules. CAR allows for the integrated management of this information within a single framework. This enables quick access to the necessary information and significantly improves work efficiency. ■Feature 2: Equipped with AI learning capabilities Based on violation warnings and source code output by static analysis tools accumulated in CAR, as well as past violation warning judgments, AI learns to enhance the efficiency of reviews and response tasks.

  • Development support tools (ICE, emulators, debuggers, etc.)

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Static Analysis Add-on Tool C-STAT

Detect potential issues in the code and improve software quality.

By using C-STAT, advanced C/C++ code analysis can be performed, allowing for the detection of potential errors. Additionally, it can improve code quality while adhering to coding standards such as MISRA C:2012. C-STAT is a user-friendly original static analysis tool that runs on the integrated development environment IAR Embedded Workbench, enabling users to check the analysis results. It demonstrates high code analysis capabilities to detect potential issues in users' code.

  • Software (middle, driver, security, etc.)
  • Other embedded systems (software and hardware)
  • Development support tools (ICE, emulators, debuggers, etc.)

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Mobile App Diagnosis Essential Edition

Achieve low-cost vulnerability assessment for mobile apps! A vulnerability assessment service that you must have.

Based on our track record of over 1,600 mobile app assessments, we will conduct an evaluation by picking up the essential items that mobile apps should at least care for. In addition to using our proprietary automated diagnostic tool, experienced security engineers will manually verify particularly important features to assess whether adequate measures are in place against common vulnerabilities. By narrowing down the target items, we can provide assessments at a reasonable and clear fixed rate within a short period.

  • Other security

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Cracker Probing-Eyes(R) Core

Automated static analysis tool for inspecting vulnerabilities and quality issues in source code.

"Cracker Probing-Eyes(R) Core" is an automated analysis tool that allows you to diagnose vulnerabilities and quality of source code simply by compressing and uploading it directly to the CPE Core dedicated portal. Customers can use it without any new capital investment. Quality analysis can be performed at various stages of development, enabling issues to be addressed in the upstream processes of development, thus achieving cost and effort reduction. 【Features】 ■ No new capital investment required ■ Reduced risk of rework ■ Ensures source code safety in a short time *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other information systems

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Automated Vulnerability Diagnosis Service "SCT SECURE Cloud Scan"

Always diagnose based on new vulnerability information! Introduction to the cloud-based automatic annual vulnerability diagnosis service.

"SCT SECURE Cloud Scan" is a cloud-based security service that regularly diagnoses whether there are vulnerabilities that could serve as footholds for cyber attacks, based on new security information. With this product, sites diagnosed as having no vulnerabilities and secure websites are issued a safety certification mark. Additionally, we offer a manual diagnostic service called "SCT SECURE Manual Web Application Diagnosis" to complement the cloud-based automated vulnerability diagnosis. 【Features of SCT SECURE Cloud Scan】 ■ Promote security strength with a date-stamped safety certification mark ■ Diagnosis based on always up-to-date vulnerability information ■ Diagnostic tool with PCI DSS ASV qualification ■ User-friendly management console and support for various report outputs *For more details, please refer to the PDF materials or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Server monitoring and network management tools
  • Other security

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Vulnerability Assessment Service

High-precision manual diagnosis without relying on tools! Comprehensive coverage based on accumulated threat information from years of experience!

The "Vulnerability Assessment Service" is designed to neutralize security holes in order to prevent IT assets from being exploited by external attacks. A white-hat hacker conducts a manual assessment on the target system. After the assessment, we will provide specific countermeasures for the detected vulnerabilities. 【Features】 ■ High-precision manual assessment that does not rely on tools ■ Comprehensive coverage based on accumulated threat information from years of experience ■ Specific countermeasures for detected vulnerabilities will be provided ■ Neutralization of security holes to prevent exploitation of IT assets *For more details, please refer to the PDF document or feel free to contact us.

  • Other services
  • Analysis Services
  • EAI/ETL/WEB application server

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Host-based security diagnostic tool "Secudoc Series"

Understanding the current situation and addressing weaknesses! Are you aware of the current state of your security? A host-based server security assessment tool.

Toshiba IT Services' "SecuDock Series" is a host-based security diagnostic tool for servers and clients. It allows for easy and quick implementation of security patch applications and safe password setting diagnostics, enabling you to grasp the current situation. It diagnoses the security status of servers, which is difficult to detect in network-based assessments, from the administrator's perspective, and reports the current status in an easy-to-understand format. 【Three Major Benefits of SecuDock】 ■ Diagnoses proper account management ■ Diagnoses effective application of security patches ■ Diagnoses safe password settings *For more details, please refer to the PDF available for download.

  • Other services

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Mainframe Solution Services

For customers who are concerned about continued use, you can continue to use our services with peace of mind!

We would like to introduce our "Mainframe Solution Services." We offer a variety of solution services that support everything from the introduction of mainframes to operational maintenance. We listen to our customers' requests and provide a combination of services tailored to their needs. We support estimates and the introduction of hardware and software for new system implementations. 【Features】 ■Implementation support ■Design and construction ■Operational maintenance *For more details, please refer to the PDF document or feel free to contact us.

  • Other services

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

GRED Web Security Solution

Visualizing security risks of websites! Visualize risks and present solutions.

We would like to introduce our "GRED Web Security Solution." In addition to manual spot diagnostics for websites, the system conducts regular automated diagnostics. You can check the risk, content, impact, and resolution methods of the detection results on the management screen. Furthermore, we have created a database of characteristic patterns of tampering to reduce false positives. If tampering is detected, it will automatically switch to the maintenance screen immediately. 【Features】 ■ Cloud-based vulnerability diagnostics ■ Cloud-based tampering detection *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Vulnerability Assessment | Security Check for Servers and Web

Before becoming the perpetrator from the victim...

At Net Assist, we offer security vulnerability assessments. - A considerable amount of time has passed since it was built. - I can't find the handover documents from my predecessor. - My boss has repeatedly asked, "Our server is okay, right?" We recommend this for those in charge.

  • Other security and surveillance systems

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Security Diagnosis Service: Platform Diagnosis

Thoroughly inspect and clearly report vulnerabilities lurking in network devices and servers.

This is a service that inspects network devices, operating systems, servers, and middleware for vulnerabilities and configuration issues. After the inspection, we conduct a presentation by our technicians based on a detailed and easy-to-understand report, proposing the inspection results and future countermeasures. Benefits of implementing the service: - Optimization of the duration and cost of security measures through accurate diagnosis by security specialists. - Reduction of risks such as personal information leaks and associated damages. - Accurate understanding of the safety of the network that serves as the foundation for operating a website, enhancing the trust of operators. - Objective identification of issues through diagnosis by an independent third party, making it effective as a report for external audits.

  • Server monitoring and network management tools

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Onward OSS Risk Management System

It can manage and minimize the risks associated with OSS throughout the entire life cycle, contributing to compliance with regulations such as the EU's CRA and the US's NIST guidelines.

This is an introduction to the OSS risk management system provided by Onward Security. To address the risks of vulnerabilities and license violations as the use of OSS increases, two tools, "SecSAM" and "SecDevice," are presented. SecSAM is a platform that can integrate and manage CVE, CWE, license information, and SBOM, and it also supports SPDX, CycloneDX, and VEX. SecDevice automatically detects vulnerabilities at the binary level through fuzzing and enables centralized risk management in conjunction with SecSAM. This allows for the management of OSS risks throughout the entire lifecycle and contributes to compliance with regulations such as CRA and NIST.

  • Software (middle, driver, security, etc.)

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Infrastructure construction and operation services

From proposing a system configuration that meets service levels to implementation and operation!

We would like to introduce our "Infrastructure Construction and Operation Services." Do you have any requests such as "I want to review the system foundation..." or "I want to reduce high system operation costs"? In this service, we understand business requirements, define service levels, and propose system configurations utilizing our know-how in semiconductor factory operations. Please feel free to contact us when you need our services. 【Deliverables】 ■ Construction and operation of an appropriate foundation supporting factory systems - Robustness: Virtualization and redundancy ⇒ Achieving high availability - IT cost control: Server integration and consolidation ⇒ Effective use of existing assets - Security: Measures against vulnerabilities *For more details, please refer to the PDF document or feel free to contact us.

  • Other operation management software

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

External Outsourcing Risk Management System "SUPPLIER RISK MT"

A cloud-based management system for centralized management and visualization of security risks related to outsourcing.

"SUPPLIERISK MT" is a cloud application that centrally manages and visualizes security risks related to external contractors and business partners, thereby streamlining the management of external contractors and business partners. While it is one of the most critical issues in management, it supports the centralized management of information security risks that were previously managed individually for each external contractor, providing appropriate decision-making materials for management. 【Features】 ■ Centralization and reduction of workload through web and cloud-based aggregated management ■ Clear visibility of contractors to watch and their security risk levels ■ Support for contractor evaluation from multiple perspectives, including self-assessment results and subcontracting relationships ■ Can also be utilized as a master database for contractor management and contracting agreements *For more details, please download the PDF or feel free to contact us.

  • 企業:GRCS
  • 価格:Other
  • Software (middle, driver, security, etc.)

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Vulnerability Detection Automation Tool "HERCULES SecDevice"

An automated security assessment tool designed for network-connected products!

The "HERCULES SecDevice" is an automated vulnerability detection tool equipped with features such as known vulnerability testing, fuzzing tests, and web security testing. It utilizes patented AI learning technology, providing excellent time efficiency and accuracy in vulnerability detection. Additionally, it complies with information security standards such as IEC 62443, OWASP TOP 10, and CWE/SANS TOP 25. 【Features】 ■ Automatic detection and identification of targets ■ Automation of vulnerability testing and scanning ■ Smart vulnerability analysis ■ Reduced inspection time and improved accuracy ■ Ability to discover unknown vulnerabilities through fuzzing, etc. *For more details, please download the PDF or feel free to contact us.

  • Other security

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録