We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Vulnerability Assessment Service.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Vulnerability Assessment Service Product List and Ranking from 34 Manufacturers, Suppliers and Companies | IPROS GMS

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

Vulnerability Assessment Service Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

  1. デジタルハーツ Tokyo//others
  2. ガイオ・テクノロジー Tokyo//IT/Telecommunications
  3. IARシステムズ Tokyo//software
  4. 4 ブロードバンドセキュリティ Tokyo//IT/Telecommunications
  5. 4 ONWARD SECURITY JAPAN Tokyo//IT/Telecommunications

Vulnerability Assessment Service Product ranking

Last Updated: Aggregation Period:Feb 04, 2026~Mar 03, 2026
This ranking is based on the number of page views on our site.

  1. 「SharedVariableChecker2」 ガイオ・テクノロジー
  2. Static Analysis Add-on Tool C-STAT IARシステムズ
  3. Cracker Probing-Eyes(R) ブロードバンドセキュリティ
  4. Host-based security diagnostic tool "Secudoc Series" 東芝ITサービス
  5. 4 What is vulnerability assessment? デジタルハーツ

Vulnerability Assessment Service Product List

1~30 item / All 56 items

Displayed results

Code Analysis Refiner

We will supplement the missing features in CodeChecker and significantly reduce the time required for operating static analysis tools.

■Feature 1: Information related to violation warnings can be managed within a single framework Handling violation warnings requires multiple pieces of information, such as source code and coding rules. CAR allows for the integrated management of this information within a single framework. This enables quick access to the necessary information and significantly improves work efficiency. ■Feature 2: Equipped with AI learning capabilities Based on violation warnings and source code output by static analysis tools accumulated in CAR, as well as past violation warning judgments, AI learns to enhance the efficiency of reviews and response tasks.

  • Development support tools (ICE, emulators, debuggers, etc.)
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Static Analysis Add-on Tool C-STAT

Detect potential issues in the code and improve software quality.

By using C-STAT, advanced C/C++ code analysis can be performed, allowing for the detection of potential errors. Additionally, it can improve code quality while adhering to coding standards such as MISRA C:2012. C-STAT is a user-friendly original static analysis tool that runs on the integrated development environment IAR Embedded Workbench, enabling users to check the analysis results. It demonstrates high code analysis capabilities to detect potential issues in users' code.

  • Software (middle, driver, security, etc.)
  • Other embedded systems (software and hardware)
  • Development support tools (ICE, emulators, debuggers, etc.)
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Mobile App Diagnosis Essential Edition

Achieve low-cost vulnerability assessment for mobile apps! A vulnerability assessment service that you must have.

Based on our track record of over 1,600 mobile app assessments, we will conduct an evaluation by picking up the essential items that mobile apps should at least care for. In addition to using our proprietary automated diagnostic tool, experienced security engineers will manually verify particularly important features to assess whether adequate measures are in place against common vulnerabilities. By narrowing down the target items, we can provide assessments at a reasonable and clear fixed rate within a short period.

  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cracker Probing-Eyes(R) Core

Automated static analysis tool for inspecting vulnerabilities and quality issues in source code.

"Cracker Probing-Eyes(R) Core" is an automated analysis tool that allows you to diagnose vulnerabilities and quality of source code simply by compressing and uploading it directly to the CPE Core dedicated portal. Customers can use it without any new capital investment. Quality analysis can be performed at various stages of development, enabling issues to be addressed in the upstream processes of development, thus achieving cost and effort reduction. 【Features】 ■ No new capital investment required ■ Reduced risk of rework ■ Ensures source code safety in a short time *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other information systems
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Automated Vulnerability Diagnosis Service "SCT SECURE Cloud Scan"

Always diagnose based on new vulnerability information! Introduction to the cloud-based automatic annual vulnerability diagnosis service.

"SCT SECURE Cloud Scan" is a cloud-based security service that regularly diagnoses whether there are vulnerabilities that could serve as footholds for cyber attacks, based on new security information. With this product, sites diagnosed as having no vulnerabilities and secure websites are issued a safety certification mark. Additionally, we offer a manual diagnostic service called "SCT SECURE Manual Web Application Diagnosis" to complement the cloud-based automated vulnerability diagnosis. 【Features of SCT SECURE Cloud Scan】 ■ Promote security strength with a date-stamped safety certification mark ■ Diagnosis based on always up-to-date vulnerability information ■ Diagnostic tool with PCI DSS ASV qualification ■ User-friendly management console and support for various report outputs *For more details, please refer to the PDF materials or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Server monitoring and network management tools
  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

High-precision manual diagnosis without relying on tools! Comprehensive coverage based on accumulated threat information from years of experience!

The "Vulnerability Assessment Service" is designed to neutralize security holes in order to prevent IT assets from being exploited by external attacks. A white-hat hacker conducts a manual assessment on the target system. After the assessment, we will provide specific countermeasures for the detected vulnerabilities. 【Features】 ■ High-precision manual assessment that does not rely on tools ■ Comprehensive coverage based on accumulated threat information from years of experience ■ Specific countermeasures for detected vulnerabilities will be provided ■ Neutralization of security holes to prevent exploitation of IT assets *For more details, please refer to the PDF document or feel free to contact us.

  • Other services
  • Analysis Services
  • EAI/ETL/WEB application server
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introduction to Security Measures Service Materials

Completely revamping security services! Latest materials now available.

Recently, there have been a series of reports about damage caused by ransomware even among large companies in the country. Once affected, the impact on business can be immeasurable, including system shutdowns and information leaks. We have completely revamped our security services and prepared a wide range of offerings that address various areas such as web applications, networks, smartphone applications, AI/LLM, IoT, and cloud services, as detailed below. ◇ Offered Services ◇ Web Application Vulnerability Assessment Network Vulnerability Assessment Source Code Assessment Smartphone Application Assessment Penetration Testing AI/LLM Assessment IoT Vulnerability Assessment Cloud Security Configuration Assessment This document clearly summarizes the features and assessment approaches of each service. We hope it will be helpful in your company's security measures. *Please feel free to contact us if you would like more detailed explanations or estimates.*

  • Software (middle, driver, security, etc.)
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Host-based security diagnostic tool "Secudoc Series"

Understanding the current situation and addressing weaknesses! Are you aware of the current state of your security? A host-based server security assessment tool.

Toshiba IT Services' "SecuDock Series" is a host-based security diagnostic tool for servers and clients. It allows for easy and quick implementation of security patch applications and safe password setting diagnostics, enabling you to grasp the current situation. It diagnoses the security status of servers, which is difficult to detect in network-based assessments, from the administrator's perspective, and reports the current status in an easy-to-understand format. 【Three Major Benefits of SecuDock】 ■ Diagnoses proper account management ■ Diagnoses effective application of security patches ■ Diagnoses safe password settings *For more details, please refer to the PDF available for download.

  • Other services
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment | Security Check for Servers and Web

Before becoming the perpetrator from the victim...

At Net Assist, we offer security vulnerability assessments. - A considerable amount of time has passed since it was built. - I can't find the handover documents from my predecessor. - My boss has repeatedly asked, "Our server is okay, right?" We recommend this for those in charge.

  • Other security and surveillance systems
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Diagnosis Service: Platform Diagnosis

Thoroughly inspect and clearly report vulnerabilities lurking in network devices and servers.

This is a service that inspects network devices, operating systems, servers, and middleware for vulnerabilities and configuration issues. After the inspection, we conduct a presentation by our technicians based on a detailed and easy-to-understand report, proposing the inspection results and future countermeasures. Benefits of implementing the service: - Optimization of the duration and cost of security measures through accurate diagnosis by security specialists. - Reduction of risks such as personal information leaks and associated damages. - Accurate understanding of the safety of the network that serves as the foundation for operating a website, enhancing the trust of operators. - Objective identification of issues through diagnosis by an independent third party, making it effective as a report for external audits.

  • Server monitoring and network management tools
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is vulnerability assessment?

A must-see for information security personnel! A clear explanation of purposes and necessities.

This document provides a detailed explanation of vulnerability assessments, including their purpose and necessity, as well as the differences from penetration testing, which is often confused with it. It also introduces the main types, such as web application assessments and platform assessments, and four key points to consider when selecting a vulnerability assessment service. To protect your company from the continuously evolving cyber attacks, it is essential to regularly assess vulnerabilities and prioritize responses accordingly. [Contents] ■ What is a vulnerability assessment ■ Main types of vulnerability assessments ■ Methods and approaches for vulnerability assessments ■ Utilizing and selecting vulnerability assessment services *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Onward OSS Risk Management System

It can manage and minimize the risks associated with OSS throughout the entire life cycle, contributing to compliance with regulations such as the EU's CRA and the US's NIST guidelines.

This is an introduction to the OSS risk management system provided by Onward Security. To address the risks of vulnerabilities and license violations as the use of OSS increases, two tools, "SecSAM" and "SecDevice," are presented. SecSAM is a platform that can integrate and manage CVE, CWE, license information, and SBOM, and it also supports SPDX, CycloneDX, and VEX. SecDevice automatically detects vulnerabilities at the binary level through fuzzing and enables centralized risk management in conjunction with SecSAM. This allows for the management of OSS risks throughout the entire lifecycle and contributes to compliance with regulations such as CRA and NIST.

  • Software (middle, driver, security, etc.)
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Infrastructure construction and operation services

From proposing a system configuration that meets service levels to implementation and operation!

We would like to introduce our "Infrastructure Construction and Operation Services." Do you have any requests such as "I want to review the system foundation..." or "I want to reduce high system operation costs"? In this service, we understand business requirements, define service levels, and propose system configurations utilizing our know-how in semiconductor factory operations. Please feel free to contact us when you need our services. 【Deliverables】 ■ Construction and operation of an appropriate foundation supporting factory systems - Robustness: Virtualization and redundancy ⇒ Achieving high availability - IT cost control: Server integration and consolidation ⇒ Effective use of existing assets - Security: Measures against vulnerabilities *For more details, please refer to the PDF document or feel free to contact us.

  • Other operation management software
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

External Outsourcing Risk Management System "SUPPLIER RISK MT"

A cloud-based management system for centralized management and visualization of security risks related to outsourcing.

"SUPPLIERISK MT" is a cloud application that centrally manages and visualizes security risks related to external contractors and business partners, thereby streamlining the management of external contractors and business partners. While it is one of the most critical issues in management, it supports the centralized management of information security risks that were previously managed individually for each external contractor, providing appropriate decision-making materials for management. 【Features】 ■ Centralization and reduction of workload through web and cloud-based aggregated management ■ Clear visibility of contractors to watch and their security risk levels ■ Support for contractor evaluation from multiple perspectives, including self-assessment results and subcontracting relationships ■ Can also be utilized as a master database for contractor management and contracting agreements *For more details, please download the PDF or feel free to contact us.

  • Company:GRCS
  • Price:Other
  • Software (middle, driver, security, etc.)
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Detection Automation Tool "HERCULES SecDevice"

An automated security assessment tool designed for network-connected products!

The "HERCULES SecDevice" is an automated vulnerability detection tool equipped with features such as known vulnerability testing, fuzzing tests, and web security testing. It utilizes patented AI learning technology, providing excellent time efficiency and accuracy in vulnerability detection. Additionally, it complies with information security standards such as IEC 62443, OWASP TOP 10, and CWE/SANS TOP 25. 【Features】 ■ Automatic detection and identification of targets ■ Automation of vulnerability testing and scanning ■ Smart vulnerability analysis ■ Reduced inspection time and improved accuracy ■ Ability to discover unknown vulnerabilities through fuzzing, etc. *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

OSS Risk Management System "HERCULES SecSAM"

Easily manage your software supply chain with "HERCULES SecSAM."

By conducting a firmware scan and analyzing the open-source components adopted in one go, we can centrally manage the risks they encompass, such as those listed below, thereby protecting brand image, avoiding license violations, and reducing vulnerabilities. ■ Vulnerabilities caused by OSS ■ License issues ■ OSS dependency management Managing the software supply chain is crucial to doing so without any issues! 1. Management of the OSS list 2. Understanding vulnerabilities and license issues caused by OSS 3. Tracking vulnerabilities and responding immediately ↑ Doing all of this manually would require enormous effort and cost. Why not manage it with SecSAM?

  • Software (middle, driver, security, etc.)
  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI Vulnerability Diagnosis Service "V-threat"

Achieving an unprecedentedly superior cost performance! The diagnostic speed is also overwhelmingly fast, and the price is overwhelmingly low.

"V-threat" is a third-generation AI & HUMAN vulnerability assessment that can continuously detect advanced vulnerabilities through AI machine learning, enabling far more accurate vulnerability diagnostics through a hybrid of AI and engineers. This service provides a comprehensive assessment of web applications, web servers, APIs, and SSL, delivering inspection results quickly and at a low cost. [Features] - Comprehensive assessment not only for web applications but also for web servers and SSL. - Diagnosis of mobile applications is also overwhelmingly fast and inexpensive. - World-class high quality and proven track record. *For more details, please download the PDF or feel free to contact us.

  • Company:バルク
  • Price:1 million yen-5 million yen
  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Challenges and Solutions for Cybersecurity in Domestic Manufacturing

A white paper explaining the challenges and solutions related to the existence of legacy systems. Vulnerability assessment services are also provided by qualified personnel.

This document explains the challenges of cybersecurity in the domestic manufacturing industry, including the persistence of legacy systems, supply chain risks, and a shortage of skilled personnel, as well as solutions utilizing our services. 【Contents (excerpt)】 ◎ What are the cybersecurity challenges in the manufacturing industry?  1. Persistence of legacy systems (high likelihood of vulnerabilities)  2. Integration of OT and IT systems (easier for attackers to infiltrate)  3. Supply chain risks (potential for damage to the entire chain)  4. Shortage of skilled personnel (lack of cybersecurity professionals hinders implementation of measures) ◎ Approaches and proposals for solving these challenges ◎ Introduction of our services *For more details, please refer to the document available for "PDF download." Feel free to contact us with any inquiries.

  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI Vulnerability Diagnosis 'ImmuniWeb'

Detecting unknown threats! Preventing risks such as information leakage incidents caused by cyber attacks in advance.

"ImmuniWeb" is an AI vulnerability assessment service that can constantly detect new vulnerabilities through machine learning. For pages that cannot be handled by AI (such as shopping carts and contact pages), RPA rules are set to escalate them to security engineers. By accurately dividing the roles between AI and security specialists, we achieve overwhelmingly superior cost performance. 【Features】 ■ Covers various global security guidelines ■ Bulk diagnosis of web servers, SSL diagnosis, and trademark infringement diagnosis ■ Over 40,390,000 web server security test results ■ Over 42,560,000 server SSL/TLS configuration compliance test results ■ Over 915,100,000 domain brand test results *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Static analysis tool "NDepend"

Analyze the structure and coupling of the code using dependency graphs and dependency matrices!

"NDepend" is a static analysis tool designed to improve the quality of .NET code. It can be used in conjunction with Visual Studio Code and Rider. Using CQLinq, which employs C# LINQ syntax, it detects code issues and areas for improvement, as well as sets constraints. There are about 200 types of default queries and rules available, which can be easily read and written. 【Features】 ■ Visualization of dependencies ■ Estimation of technical debt ■ Monitoring of code metrics ■ Detection of regressions and code smells ■ Generation of diagrams and reports *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Development support tools (ICE, emulators, debuggers, etc.)
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

VendorTrustLink

Is Excel management outdated? Transforming outsourced risk management with SaaS for digital transformation!

Automated sending, collection, and graphing of check sheets to and from contractors. This service allows for efficient understanding and management of various risks at contractors, such as information leaks and compliance violations. (Official release is scheduled for September 2024)

  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ministry of Economy, Trade and Industry Certified | Vulnerability Diagnosis Service and Testing Service [Fully Remote]

Enhancing web security through vulnerability assessments certified by the Ministry of Economy, Trade and Industry, regardless of industry or size.

Are you neglecting the "invisible risks" of web services? Don't just stop at "discovering" vulnerabilities. We provide actionable support all the way to remediation and improvement. ■ Do you have these concerns? - You think you are taking security measures, but you have never confirmed them from an external perspective. - You want to ensure the safety of your web services or internal systems before their release. - You are being asked by clients or business partners to submit a diagnostic report. - You want to effectively identify security risks within a limited budget. ■ What is ranryu's vulnerability assessment service? Ranryu Co., Ltd. provides vulnerability assessments targeting web services and business systems, with engineers holding CEH and Information Security Management certifications, as a registered business compliant with the Ministry of Economy, Trade and Industry's "Information Security Service Standards." The key feature is that we not only conduct assessments but also consistently provide concrete countermeasure support for detected risks and review security policies. With a wealth of experience in system development and infrastructure construction, we offer technical advice and implementation support to ensure that your assessment results are not left "as is." We support the strengthening of your security from a realistic perspective.

  • Other security
  • Firewall and intrusion prevention
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

「SharedVariableChecker2」

Don't miss the competition! Visualize variable access.

We perform static analysis of C source code, generate and visualize race conditions of external variables in charts, contributing to the efficiency and quality of reviews. - Supports function pointers/pointer variables - Addresses variable interference between multi-core cores - Analyzes mutual exclusion control by specifying interrupt disable/enable functions - Automatically generates review sheets for shared variables

  • Development support tools (ICE, emulators, debuggers, etc.)
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

C#/VB.NET compatible static and dynamic analysis tool 'dotTEST'

It will be possible to significantly reduce the development and testing effort for secure and high-quality C#/VB.NET applications.

"dotTEST" is a testing tool that supports C# and VB.NET languages for static analysis (coding standard verification/flow analysis) and unit testing. In static analysis, it is possible to perform coding standard checks using various categories of coding standards to point out issues in the source code. Furthermore, it analyzes the processing flow of .NET applications to detect potentially dangerous code for security, such as SQL injection and cross-site scripting (XSS), as well as operational issues like resource leaks and NullReferenceExceptions. 【Features】 ■ Reduces risks in C#/VB.NET development ■ Supports improvement of source code quality through flow analysis and coding standard checks ■ Assists unit testing and UI testing with coverage measurement functionality ■ Supports automation of static analysis and unit test execution ■ Can integrate with the platform "Parasoft DTP" *For more details, please refer to the PDF materials or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Monitoring-type diagnostic solution 'SCT SECURE SWAT'

Ideal for continuous vulnerability monitoring of web applications! Annual diagnostic service for monitored web applications.

"SCT SECURE SWAT" is a monitoring-type annual diagnostic service for web applications that thoroughly diagnoses using the characteristics of both automated and manual diagnostics. It balances the comprehensiveness of automated diagnostics with the flexibility of manual diagnostics. Frequent modifications and updates are automatically detected and diagnosed. Additionally, we offer a vulnerability diagnostic service for smartphone applications called "SCT SECURE Mobile App Diagnostic Service." 【Features of SCT SECURE SWAT】 ■ Thorough diagnosis of web applications utilizing the characteristics of both automated and manual diagnostics ■ Balances the comprehensiveness of automated diagnostics with the flexibility of manual diagnostics ■ Automatically detects and diagnoses frequent modifications and updates ■ Well-suited for continuous vulnerability monitoring of critical web applications ■ Diagnostic results can be checked in real-time from a dedicated portal *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Server monitoring and network management tools
  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service "gSCAN"

A cloud-based service that can accommodate flexible schedules such as spot diagnoses and regular check-ups.

"gSCAN" is a cloud-based vulnerability assessment service that supports both Web SCAN and Network SCAN. It can accommodate flexible schedules such as spot assessments and regular assessments, and it is also compatible with websites that require login authentication. We offer options for re-assessment after fixes and annual contracts. Additionally, we provide on-site reporting sessions as an option. 【Features】 ■ Very affordable ■ Supports both Web SCAN and Network SCAN ■ Flexible scheduling for spot assessments and regular assessments ■ Compatible with websites that require login authentication ■ Options for re-assessment after fixes and annual contracts available *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] SecuDog | Hokkaido Electric Power Information System Service Co., Ltd.

Case study of a security assessment that checks 7,000 accounts in 30 minutes!

At Hokkaido Electric Power Company Information System Service Co., Ltd., we have been conducting "network-type" security diagnostics that diagnose systems from the outside over the network. This time, by introducing "SecuDog," a "host-type" security diagnostic method that checks the internal configuration of servers, we were able to complete the diagnosis of 7,000 domain server accounts in just 30 minutes. As a result, we achieved both a reduction in diagnostic costs and the enhancement of information security. *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Other contract services
  • Other services
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cloud-based comprehensive security service "BLUE Sphere"

DNS monitoring to prevent hacking! If you're new to implementing a WAF, you can trust us to handle it with ease.

"BLUE Sphere" is a cloud-based comprehensive security service that protects web applications. In addition to three website protection features: WAF, DDoS defense, and tampering detection, it also includes DNS monitoring and cyber security insurance for emergencies. Based on extensive experience and know-how cultivated over many years of providing CDN services, dedicated engineers with expertise in both CDN and WAF will support the implementation. [Main Features] ■ WAF functionality to prevent attacks on web applications ■ DDoS defense functionality to avoid service interruptions ■ Tampering detection for websites ■ DNS monitoring to prevent hacking ■ Cyber security insurance for emergencies *For more details, please refer to the related links or feel free to contact us.

  • Other security
  • Other network tools
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web application vulnerability scanning tool 'Vex'

More advanced, more convenient! Products of professional quality recognized by security experts.

"Vulnerability EXplorer (Vex)" is a web application vulnerability scanning tool that continues to evolve while having a track record of diagnostics across thousands of sites. It has gained a reputation for its high accuracy in vulnerability assessments, starting with its adoption by financial institutions that require robust security. Its high detection capability is due to features such as "provision of inspection signatures" and "highly flexible scenario creation," allowing for meticulous configuration that enables high-quality inspections. [Features] ■ Powerful scenario creation support ■ Comprehensive inspection functions ■ Extensive vulnerability inspection items ■ Support for the latest vulnerabilities ■ Regular addition of new features *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Webアプリケーション脆弱性自動検査ツール『Vex Cloud』

機械学習やJavaScript動的解析などの技術により、高い巡回・診断性能を実現!

『Vex Cloud』は、検査用のシナリオ(疑似攻撃リクエスト)も自動生成 でき、設定や操作も簡単なWebアプリケーション脆弱性自動検査ツールです。 開発者様やサイト運用担当者様の「気軽に脆弱性診断を行いたい」 「開発工程にあわせて随時検査したい」といったニーズにお応え。 また、お客様の保有するWebサイトを自動巡回し、すべてのWebサイトを リストアップ、それらをWebサイト単位で管理します。 【特長】 ■自動クローラーで面倒なシナリオ作成が不要 ■ログイン認証が必要なサイトも問題なし ■SPA(Single Page Application)にも対応 ※詳しくはPDF資料をご覧いただくか、お気軽にお問い合わせ下さい。

  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration