We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Vulnerability Assessment Service.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Vulnerability Assessment Service Product List and Ranking from 34 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Vulnerability Assessment Service Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. ONWARD SECURITY JAPAN Tokyo//IT/Telecommunications
  2. ブロードバンドセキュリティ Tokyo//IT/Telecommunications
  3. ワールドスカイ Tokyo//Service Industry
  4. アイロバ Tokyo//IT/Telecommunications
  5. ガイオ・テクノロジー Tokyo//IT/Telecommunications

Vulnerability Assessment Service Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. Information Security Verification Service for Amazon Alexa ONWARD SECURITY JAPAN
  2. Vulnerability Assessment Service ワールドスカイ
  3. Comprehensive Security Service "BLUE Sphere" アイロバ
  4. Cracker Probing-Eyes(R) Core ブロードバンドセキュリティ
  5. 4 「SharedVariableChecker2」 ガイオ・テクノロジー

Vulnerability Assessment Service Product List

1~15 item / All 58 items

Displayed results

Code Analysis Refiner

We will supplement the missing features in CodeChecker and significantly reduce the time required for operating static analysis tools.

■Feature 1: Information related to violation warnings can be managed within a single framework Handling violation warnings requires multiple pieces of information, such as source code and coding rules. CAR allows for the integrated management of this information within a single framework. This enables quick access to the necessary information and significantly improves work efficiency. ■Feature 2: Equipped with AI learning capabilities Based on violation warnings and source code output by static analysis tools accumulated in CAR, as well as past violation warning judgments, AI learns to enhance the efficiency of reviews and response tasks.

  • Development support tools (ICE, emulators, debuggers, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Static Analysis Add-on Tool C-STAT

Detect potential issues in the code and improve software quality.

By using C-STAT, advanced C/C++ code analysis can be performed, allowing for the detection of potential errors. Additionally, it can improve code quality while adhering to coding standards such as MISRA C:2012. C-STAT is a user-friendly original static analysis tool that runs on the integrated development environment IAR Embedded Workbench, enabling users to check the analysis results. It demonstrates high code analysis capabilities to detect potential issues in users' code.

  • Software (middle, driver, security, etc.)
  • Other embedded systems (software and hardware)
  • Development support tools (ICE, emulators, debuggers, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Mobile App Diagnosis Essential Edition

Achieve low-cost vulnerability assessment for mobile apps! A vulnerability assessment service that you must have.

Based on our track record of over 1,600 mobile app assessments, we will conduct an evaluation by picking up the essential items that mobile apps should at least care for. In addition to using our proprietary automated diagnostic tool, experienced security engineers will manually verify particularly important features to assess whether adequate measures are in place against common vulnerabilities. By narrowing down the target items, we can provide assessments at a reasonable and clear fixed rate within a short period.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cracker Probing-Eyes(R) Core

Automated static analysis tool for inspecting vulnerabilities and quality issues in source code.

"Cracker Probing-Eyes(R) Core" is an automated analysis tool that allows you to diagnose vulnerabilities and quality of source code simply by compressing and uploading it directly to the CPE Core dedicated portal. Customers can use it without any new capital investment. Quality analysis can be performed at various stages of development, enabling issues to be addressed in the upstream processes of development, thus achieving cost and effort reduction. 【Features】 ■ No new capital investment required ■ Reduced risk of rework ■ Ensures source code safety in a short time *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other information systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Automated Vulnerability Diagnosis Service "SCT SECURE Cloud Scan"

Always diagnose based on new vulnerability information! Introduction to the cloud-based automatic annual vulnerability diagnosis service.

"SCT SECURE Cloud Scan" is a cloud-based security service that regularly diagnoses whether there are vulnerabilities that could serve as footholds for cyber attacks, based on new security information. With this product, sites diagnosed as having no vulnerabilities and secure websites are issued a safety certification mark. Additionally, we offer a manual diagnostic service called "SCT SECURE Manual Web Application Diagnosis" to complement the cloud-based automated vulnerability diagnosis. 【Features of SCT SECURE Cloud Scan】 ■ Promote security strength with a date-stamped safety certification mark ■ Diagnosis based on always up-to-date vulnerability information ■ Diagnostic tool with PCI DSS ASV qualification ■ User-friendly management console and support for various report outputs *For more details, please refer to the PDF materials or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Server monitoring and network management tools
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

High-precision manual diagnosis without relying on tools! Comprehensive coverage based on accumulated threat information from years of experience!

The "Vulnerability Assessment Service" is designed to neutralize security holes in order to prevent IT assets from being exploited by external attacks. A white-hat hacker conducts a manual assessment on the target system. After the assessment, we will provide specific countermeasures for the detected vulnerabilities. 【Features】 ■ High-precision manual assessment that does not rely on tools ■ Comprehensive coverage based on accumulated threat information from years of experience ■ Specific countermeasures for detected vulnerabilities will be provided ■ Neutralization of security holes to prevent exploitation of IT assets *For more details, please refer to the PDF document or feel free to contact us.

  • Other services
  • Analysis Services
  • EAI/ETL/WEB application server

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Host-based security diagnostic tool "Secudoc Series"

Understanding the current situation and addressing weaknesses! Are you aware of the current state of your security? A host-based server security assessment tool.

Toshiba IT Services' "SecuDock Series" is a host-based security diagnostic tool for servers and clients. It allows for easy and quick implementation of security patch applications and safe password setting diagnostics, enabling you to grasp the current situation. It diagnoses the security status of servers, which is difficult to detect in network-based assessments, from the administrator's perspective, and reports the current status in an easy-to-understand format. 【Three Major Benefits of SecuDock】 ■ Diagnoses proper account management ■ Diagnoses effective application of security patches ■ Diagnoses safe password settings *For more details, please refer to the PDF available for download.

  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Mainframe Solution Services

For customers who are concerned about continued use, you can continue to use our services with peace of mind!

We would like to introduce our "Mainframe Solution Services." We offer a variety of solution services that support everything from the introduction of mainframes to operational maintenance. We listen to our customers' requests and provide a combination of services tailored to their needs. We support estimates and the introduction of hardware and software for new system implementations. 【Features】 ■Implementation support ■Design and construction ■Operational maintenance *For more details, please refer to the PDF document or feel free to contact us.

  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

GRED Web Security Solution

Visualizing security risks of websites! Visualize risks and present solutions.

We would like to introduce our "GRED Web Security Solution." In addition to manual spot diagnostics for websites, the system conducts regular automated diagnostics. You can check the risk, content, impact, and resolution methods of the detection results on the management screen. Furthermore, we have created a database of characteristic patterns of tampering to reduce false positives. If tampering is detected, it will automatically switch to the maintenance screen immediately. 【Features】 ■ Cloud-based vulnerability diagnostics ■ Cloud-based tampering detection *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment | Security Check for Servers and Web

Before becoming the perpetrator from the victim...

At Net Assist, we offer security vulnerability assessments. - A considerable amount of time has passed since it was built. - I can't find the handover documents from my predecessor. - My boss has repeatedly asked, "Our server is okay, right?" We recommend this for those in charge.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Diagnosis Service: Platform Diagnosis

Thoroughly inspect and clearly report vulnerabilities lurking in network devices and servers.

This is a service that inspects network devices, operating systems, servers, and middleware for vulnerabilities and configuration issues. After the inspection, we conduct a presentation by our technicians based on a detailed and easy-to-understand report, proposing the inspection results and future countermeasures. Benefits of implementing the service: - Optimization of the duration and cost of security measures through accurate diagnosis by security specialists. - Reduction of risks such as personal information leaks and associated damages. - Accurate understanding of the safety of the network that serves as the foundation for operating a website, enhancing the trust of operators. - Objective identification of issues through diagnosis by an independent third party, making it effective as a report for external audits.

  • Server monitoring and network management tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Onward OSS Risk Management System

It can manage and minimize the risks associated with OSS throughout the entire life cycle, contributing to compliance with regulations such as the EU's CRA and the US's NIST guidelines.

This is an introduction to the OSS risk management system provided by Onward Security. To address the risks of vulnerabilities and license violations as the use of OSS increases, two tools, "SecSAM" and "SecDevice," are presented. SecSAM is a platform that can integrate and manage CVE, CWE, license information, and SBOM, and it also supports SPDX, CycloneDX, and VEX. SecDevice automatically detects vulnerabilities at the binary level through fuzzing and enables centralized risk management in conjunction with SecSAM. This allows for the management of OSS risks throughout the entire lifecycle and contributes to compliance with regulations such as CRA and NIST.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Infrastructure construction and operation services

From proposing a system configuration that meets service levels to implementation and operation!

We would like to introduce our "Infrastructure Construction and Operation Services." Do you have any requests such as "I want to review the system foundation..." or "I want to reduce high system operation costs"? In this service, we understand business requirements, define service levels, and propose system configurations utilizing our know-how in semiconductor factory operations. Please feel free to contact us when you need our services. 【Deliverables】 ■ Construction and operation of an appropriate foundation supporting factory systems - Robustness: Virtualization and redundancy ⇒ Achieving high availability - IT cost control: Server integration and consolidation ⇒ Effective use of existing assets - Security: Measures against vulnerabilities *For more details, please refer to the PDF document or feel free to contact us.

  • Other operation management software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

External Outsourcing Risk Management System "SUPPLIER RISK MT"

A cloud-based management system for centralized management and visualization of security risks related to outsourcing.

"SUPPLIERISK MT" is a cloud application that centrally manages and visualizes security risks related to external contractors and business partners, thereby streamlining the management of external contractors and business partners. While it is one of the most critical issues in management, it supports the centralized management of information security risks that were previously managed individually for each external contractor, providing appropriate decision-making materials for management. 【Features】 ■ Centralization and reduction of workload through web and cloud-based aggregated management ■ Clear visibility of contractors to watch and their security risk levels ■ Support for contractor evaluation from multiple perspectives, including self-assessment results and subcontracting relationships ■ Can also be utilized as a master database for contractor management and contracting agreements *For more details, please download the PDF or feel free to contact us.

  • Company:GRCS
  • Price:Other
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Detection Automation Tool "HERCULES SecDevice"

An automated security assessment tool designed for network-connected products!

The "HERCULES SecDevice" is an automated vulnerability detection tool equipped with features such as known vulnerability testing, fuzzing tests, and web security testing. It utilizes patented AI learning technology, providing excellent time efficiency and accuracy in vulnerability detection. Additionally, it complies with information security standards such as IEC 62443, OWASP TOP 10, and CWE/SANS TOP 25. 【Features】 ■ Automatic detection and identification of targets ■ Automation of vulnerability testing and scanning ■ Smart vulnerability analysis ■ Reduced inspection time and improved accuracy ■ Ability to discover unknown vulnerabilities through fuzzing, etc. *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration