We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Vulnerability Assessment Service.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Vulnerability Assessment Service Product List and Ranking from 34 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Vulnerability Assessment Service Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. ONWARD SECURITY JAPAN Tokyo//IT/Telecommunications
  2. ブロードバンドセキュリティ Tokyo//IT/Telecommunications
  3. ワールドスカイ Tokyo//Service Industry
  4. アイロバ Tokyo//IT/Telecommunications
  5. ガイオ・テクノロジー Tokyo//IT/Telecommunications

Vulnerability Assessment Service Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. Information Security Verification Service for Amazon Alexa ONWARD SECURITY JAPAN
  2. Vulnerability Assessment Service ワールドスカイ
  3. Comprehensive Security Service "BLUE Sphere" アイロバ
  4. Cracker Probing-Eyes(R) Core ブロードバンドセキュリティ
  5. 4 「SharedVariableChecker2」 ガイオ・テクノロジー

Vulnerability Assessment Service Product List

16~30 item / All 56 items

Displayed results

OSS Risk Management System "HERCULES SecSAM"

Easily manage your software supply chain with "HERCULES SecSAM."

By conducting a firmware scan and analyzing the open-source components adopted in one go, we can centrally manage the risks they encompass, such as those listed below, thereby protecting brand image, avoiding license violations, and reducing vulnerabilities. ■ Vulnerabilities caused by OSS ■ License issues ■ OSS dependency management Managing the software supply chain is crucial to doing so without any issues! 1. Management of the OSS list 2. Understanding vulnerabilities and license issues caused by OSS 3. Tracking vulnerabilities and responding immediately ↑ Doing all of this manually would require enormous effort and cost. Why not manage it with SecSAM?

  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI Vulnerability Diagnosis Service "V-threat"

Achieving an unprecedentedly superior cost performance! The diagnostic speed is also overwhelmingly fast, and the price is overwhelmingly low.

"V-threat" is a third-generation AI & HUMAN vulnerability assessment that can continuously detect advanced vulnerabilities through AI machine learning, enabling far more accurate vulnerability diagnostics through a hybrid of AI and engineers. This service provides a comprehensive assessment of web applications, web servers, APIs, and SSL, delivering inspection results quickly and at a low cost. [Features] - Comprehensive assessment not only for web applications but also for web servers and SSL. - Diagnosis of mobile applications is also overwhelmingly fast and inexpensive. - World-class high quality and proven track record. *For more details, please download the PDF or feel free to contact us.

  • Company:バルク
  • Price:1 million yen-5 million yen
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

We will continue to strive to reduce even one security incident caused by vulnerabilities in this world.

We provide vulnerability assessment services to prevent the risks of cyber attacks and information leaks in advance and to strengthen security. Even if you have little expertise in vulnerabilities, we will support you from scratch in promoting vulnerability management so that you can ultimately operate independently and continuously. We will achieve a manageable risk-based vulnerability management approach. Please feel free to contact us if you have any requests. [Support Examples] ■ Learning how to use tools ■ Providing operation manuals in Japanese ■ Considering response policies for identified vulnerabilities *For more details, please download the PDF or contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI Vulnerability Diagnosis 'ImmuniWeb'

Detecting unknown threats! Preventing risks such as information leakage incidents caused by cyber attacks in advance.

"ImmuniWeb" is an AI vulnerability assessment service that can constantly detect new vulnerabilities through machine learning. For pages that cannot be handled by AI (such as shopping carts and contact pages), RPA rules are set to escalate them to security engineers. By accurately dividing the roles between AI and security specialists, we achieve overwhelmingly superior cost performance. 【Features】 ■ Covers various global security guidelines ■ Bulk diagnosis of web servers, SSL diagnosis, and trademark infringement diagnosis ■ Over 40,390,000 web server security test results ■ Over 42,560,000 server SSL/TLS configuration compliance test results ■ Over 915,100,000 domain brand test results *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Static analysis tool "NDepend"

Analyze the structure and coupling of the code using dependency graphs and dependency matrices!

"NDepend" is a static analysis tool designed to improve the quality of .NET code. It can be used in conjunction with Visual Studio Code and Rider. Using CQLinq, which employs C# LINQ syntax, it detects code issues and areas for improvement, as well as sets constraints. There are about 200 types of default queries and rules available, which can be easily read and written. 【Features】 ■ Visualization of dependencies ■ Estimation of technical debt ■ Monitoring of code metrics ■ Detection of regressions and code smells ■ Generation of diagrams and reports *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Development support tools (ICE, emulators, debuggers, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

VendorTrustLink

Is Excel management outdated? Transforming outsourced risk management with SaaS for digital transformation!

Automated sending, collection, and graphing of check sheets to and from contractors. This service allows for efficient understanding and management of various risks at contractors, such as information leaks and compliance violations. (Official release is scheduled for September 2024)

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ministry of Economy, Trade and Industry Certified | Vulnerability Diagnosis Service and Testing Service [Fully Remote]

Enhancing web security through vulnerability assessments certified by the Ministry of Economy, Trade and Industry, regardless of industry or size.

Are you neglecting the "invisible risks" of web services? Don't just stop at "discovering" vulnerabilities. We provide actionable support all the way to remediation and improvement. ■ Do you have these concerns? - You think you are taking security measures, but you have never confirmed them from an external perspective. - You want to ensure the safety of your web services or internal systems before their release. - You are being asked by clients or business partners to submit a diagnostic report. - You want to effectively identify security risks within a limited budget. ■ What is ranryu's vulnerability assessment service? Ranryu Co., Ltd. provides vulnerability assessments targeting web services and business systems, with engineers holding CEH and Information Security Management certifications, as a registered business compliant with the Ministry of Economy, Trade and Industry's "Information Security Service Standards." The key feature is that we not only conduct assessments but also consistently provide concrete countermeasure support for detected risks and review security policies. With a wealth of experience in system development and infrastructure construction, we offer technical advice and implementation support to ensure that your assessment results are not left "as is." We support the strengthening of your security from a realistic perspective.

  • Other security
  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

「SharedVariableChecker2」

Don't miss the competition! Visualize variable access.

We perform static analysis of C source code, generate and visualize race conditions of external variables in charts, contributing to the efficiency and quality of reviews. - Supports function pointers/pointer variables - Addresses variable interference between multi-core cores - Analyzes mutual exclusion control by specifying interrupt disable/enable functions - Automatically generates review sheets for shared variables

  • Development support tools (ICE, emulators, debuggers, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

C#/VB.NET compatible static and dynamic analysis tool 'dotTEST'

It will be possible to significantly reduce the development and testing effort for secure and high-quality C#/VB.NET applications.

"dotTEST" is a testing tool that supports C# and VB.NET languages for static analysis (coding standard verification/flow analysis) and unit testing. In static analysis, it is possible to perform coding standard checks using various categories of coding standards to point out issues in the source code. Furthermore, it analyzes the processing flow of .NET applications to detect potentially dangerous code for security, such as SQL injection and cross-site scripting (XSS), as well as operational issues like resource leaks and NullReferenceExceptions. 【Features】 ■ Reduces risks in C#/VB.NET development ■ Supports improvement of source code quality through flow analysis and coding standard checks ■ Assists unit testing and UI testing with coverage measurement functionality ■ Supports automation of static analysis and unit test execution ■ Can integrate with the platform "Parasoft DTP" *For more details, please refer to the PDF materials or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Monitoring-type diagnostic solution 'SCT SECURE SWAT'

Ideal for continuous vulnerability monitoring of web applications! Annual diagnostic service for monitored web applications.

"SCT SECURE SWAT" is a monitoring-type annual diagnostic service for web applications that thoroughly diagnoses using the characteristics of both automated and manual diagnostics. It balances the comprehensiveness of automated diagnostics with the flexibility of manual diagnostics. Frequent modifications and updates are automatically detected and diagnosed. Additionally, we offer a vulnerability diagnostic service for smartphone applications called "SCT SECURE Mobile App Diagnostic Service." 【Features of SCT SECURE SWAT】 ■ Thorough diagnosis of web applications utilizing the characteristics of both automated and manual diagnostics ■ Balances the comprehensiveness of automated diagnostics with the flexibility of manual diagnostics ■ Automatically detects and diagnoses frequent modifications and updates ■ Well-suited for continuous vulnerability monitoring of critical web applications ■ Diagnostic results can be checked in real-time from a dedicated portal *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Server monitoring and network management tools
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service "gSCAN"

A cloud-based service that can accommodate flexible schedules such as spot diagnoses and regular check-ups.

"gSCAN" is a cloud-based vulnerability assessment service that supports both Web SCAN and Network SCAN. It can accommodate flexible schedules such as spot assessments and regular assessments, and it is also compatible with websites that require login authentication. We offer options for re-assessment after fixes and annual contracts. Additionally, we provide on-site reporting sessions as an option. 【Features】 ■ Very affordable ■ Supports both Web SCAN and Network SCAN ■ Flexible scheduling for spot assessments and regular assessments ■ Compatible with websites that require login authentication ■ Options for re-assessment after fixes and annual contracts available *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] SecuDog | Hokkaido Electric Power Information System Service Co., Ltd.

Case study of a security assessment that checks 7,000 accounts in 30 minutes!

At Hokkaido Electric Power Company Information System Service Co., Ltd., we have been conducting "network-type" security diagnostics that diagnose systems from the outside over the network. This time, by introducing "SecuDog," a "host-type" security diagnostic method that checks the internal configuration of servers, we were able to complete the diagnosis of 7,000 domain server accounts in just 30 minutes. As a result, we achieved both a reduction in diagnostic costs and the enhancement of information security. *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Other contract services
  • Other services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cloud-based comprehensive security service "BLUE Sphere"

DNS monitoring to prevent hacking! If you're new to implementing a WAF, you can trust us to handle it with ease.

"BLUE Sphere" is a cloud-based comprehensive security service that protects web applications. In addition to three website protection features: WAF, DDoS defense, and tampering detection, it also includes DNS monitoring and cyber security insurance for emergencies. Based on extensive experience and know-how cultivated over many years of providing CDN services, dedicated engineers with expertise in both CDN and WAF will support the implementation. [Main Features] ■ WAF functionality to prevent attacks on web applications ■ DDoS defense functionality to avoid service interruptions ■ Tampering detection for websites ■ DNS monitoring to prevent hacking ■ Cyber security insurance for emergencies *For more details, please refer to the related links or feel free to contact us.

  • Other security
  • Other network tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web application vulnerability scanning tool 'Vex'

More advanced, more convenient! Products of professional quality recognized by security experts.

"Vulnerability EXplorer (Vex)" is a web application vulnerability scanning tool that continues to evolve while having a track record of diagnostics across thousands of sites. It has gained a reputation for its high accuracy in vulnerability assessments, starting with its adoption by financial institutions that require robust security. Its high detection capability is due to features such as "provision of inspection signatures" and "highly flexible scenario creation," allowing for meticulous configuration that enables high-quality inspections. [Features] ■ Powerful scenario creation support ■ Comprehensive inspection functions ■ Extensive vulnerability inspection items ■ Support for the latest vulnerabilities ■ Regular addition of new features *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Webアプリケーション脆弱性自動検査ツール『Vex Cloud』

機械学習やJavaScript動的解析などの技術により、高い巡回・診断性能を実現!

『Vex Cloud』は、検査用のシナリオ(疑似攻撃リクエスト)も自動生成 でき、設定や操作も簡単なWebアプリケーション脆弱性自動検査ツールです。 開発者様やサイト運用担当者様の「気軽に脆弱性診断を行いたい」 「開発工程にあわせて随時検査したい」といったニーズにお応え。 また、お客様の保有するWebサイトを自動巡回し、すべてのWebサイトを リストアップ、それらをWebサイト単位で管理します。 【特長】 ■自動クローラーで面倒なシナリオ作成が不要 ■ログイン認証が必要なサイトも問題なし ■SPA(Single Page Application)にも対応 ※詳しくはPDF資料をご覧いただくか、お気軽にお問い合わせ下さい。

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration