We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Vulnerability Assessment Service.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Vulnerability Assessment Service Product List and Ranking from 33 Manufacturers, Suppliers and Companies | IPROS GMS

Last Updated: Aggregation Period:Apr 08, 2026~May 05, 2026
This ranking is based on the number of page views on our site.

Vulnerability Assessment Service Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Apr 08, 2026~May 05, 2026
This ranking is based on the number of page views on our site.

  1. ガイオ・テクノロジー Tokyo//IT/Telecommunications
  2. ブロードバンドセキュリティ Tokyo//IT/Telecommunications
  3. 東芝ITサービス Kanagawa//Service Industry
  4. 鉄道情報システム Tokyo//IT/Telecommunications
  5. デジタルハーツ Tokyo//others

Vulnerability Assessment Service Product ranking

Last Updated: Aggregation Period:Apr 08, 2026~May 05, 2026
This ranking is based on the number of page views on our site.

  1. Cracker Probing-Eyes(R) ブロードバンドセキュリティ
  2. Static analysis tool "NDepend" B7
  3. 「SharedVariableChecker2」 ガイオ・テクノロジー
  4. Static Analysis Add-on Tool C-STAT IARシステムズ
  5. 4 Host-based security diagnostic tool "Secudoc Series" 東芝ITサービス

Vulnerability Assessment Service Product List

31~56 item / All 56 items

Displayed results

Presentation of case studies! [Vex Implementation Case] Tower Records Inc.

In-house diagnosis of a vast number of websites! Achieving cost reduction and increased scope and frequency of diagnosis.

We would like to introduce a case study on the implementation of the web application vulnerability scanning tool "Vex" at Tower Records Inc. The site is large, and we felt challenges regarding the cost and frequency of vulnerability assessments each time. By internalizing the assessments with this product, we improved the scope, frequency, and number of assessments. [Case Overview] ■ Key Points - Achieved vulnerability assessments with increased scope, frequency, and number in line with frequent updates and the launch of new services. - Automatic generation of high-quality reports allows for handling without security knowledge or skills. - The ability to use a trial before full implementation allows for thorough confirmation of usability and features in advance. *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Data] Cybersecurity Measures

We propose a suitable plan! Security measures advanced through "diagnosis and investigation" and "countermeasures and strengthening."

As IT technology advances, cyber attacks are also evolving daily, making it difficult to completely prevent damage. To minimize damage, a multi-faceted approach is necessary, ranging from vulnerability diagnosis and investigation to measures and strengthening on both system and organizational fronts. This document introduces Allied Telesis's security solutions, such as "Vulnerability Diagnosis Service" and "Cloud UTM Service." We encourage you to read it. [Contents] ■ Security Challenges and Solutions ■ Allied Telesis Security Solutions ■ Case Studies *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] AI Smart Web Diagnosis

Reduce diagnostic costs with AI-driven labor efficiency! We also introduce the top 5 concerns companies have regarding vulnerability assessments.

This document introduces our "AI Smart Web Diagnosis" service. It provides a detailed explanation of the importance of vulnerability assessments, including social trends surrounding cybersecurity and the EC site security guidelines scheduled for implementation in 2025. Additionally, it includes the flow of the diagnosis and a Q&A section, making it a useful resource for those considering implementation. We encourage you to download and review it. [Contents] ■ Importance of vulnerability assessments ■ Corporate concerns regarding vulnerability assessments ■ What is AI Smart Web Diagnosis? ■ About AGEST *For more details, please download the PDF or feel free to contact us.

  • Other IT tools
  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Management 'insightVM'

Automatically assess and understand the risks across the entire infrastructure.

"InsightVM" visualizes vulnerabilities with a customizable dashboard, allowing for an overview and prioritization of all information regarding exposure risks. By accurately understanding risks in advanced environments, collaborative activities with technical teams become possible. Additionally, alignment with traditionally siloed teams and sharing of visualized content maximizes effectiveness using a common language with "InsightVM." 【Features】 ■ Visualize risks ■ Expand the scope of security measures ■ Share progress *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service Lite

Providing vulnerability assessments that include manual diagnostics only where necessary, with short delivery times and low costs.

The "Vulnerability Assessment Service Lite" is a manual and tool-based assessment service that focuses on essential functions to conduct vulnerability assessments, based on the previously well-received "Vulnerability Assessment Service." It is designed to meet customer needs for quick assessments at a lower cost, optimized for the characteristics of the functions they wish to assess, providing a speedy and cost-effective service. For customers who do not have the luxury of time and budget but want to immediately understand the vulnerabilities of their website, we offer a highly cost-effective vulnerability assessment that maximizes the know-how cultivated by technicians from a security expert company. The "Vulnerability Assessment Service Lite" has two plans: - Web Function-Specific Assessment - Platform Assessment Please make use of it as a first step in understanding your company's security issues. * The "Vulnerability Assessment Service Lite" is provided in collaboration with SecureSky Technology.

  • Firewall and intrusion prevention
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Comprehensive Security Service "BLUE Sphere"

We provide comprehensive risk management solutions for your website!

"BLUE Sphere" is a comprehensive security service equipped with cloud-based WAF/DDoS protection and tampering detection features. It provides extensive defense against attacks at the network layer, OS vulnerabilities, information leaks from databases, large-scale cyberattacks, and redirection to fraudulent sites due to website tampering, offering a basic service that does not require security engineers to handle DDoS attacks that cannot be fully mitigated by WAF alone. 【Features】 ■ Unlimited domains ■ Individual tuning by experts to enhance WAF accuracy ■ A wealth of features to address numerous vulnerabilities and attacks ■ Easy implementation, just leave it to the professionals, etc. *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service "Site Scan"

The number of test items is approximately 20,000! There is a differential report feature that allows comparison with the previous scan results.

"Site Scan" is a vulnerability assessment service for the OS, network, and application layers. Using evaluation criteria compliant with the industry standard CVSS/CVE, it clarifies the level of security measures implemented in your system and identifies necessary actions for security improvements. Additionally, we offer an on-demand web application assessment called "WebSite Scan" and a manual assessment service called "Web Vulnerability Assessment." 【Features】 ■ Self-assessment is possible through a dedicated customer interface ■ Vulnerability assessment compliant with CVSS/CVE standards ■ Detailed vulnerability reports ■ Differential reports that can be compared with previous scan results *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Other contract services
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web Application Vulnerability Assessment Service

Investigating major vulnerabilities that are easily exploited and have a significant impact!

We offer a "Web Application Vulnerability Diagnosis Service" to assess the vulnerabilities of web applications and mobile apps. We provide a "Light Plan" that diagnoses major vulnerabilities through black box testing, a "Premium Plan" that conducts vulnerability assessments using CyberGym Japan's "ImmuniWeb," and a "Free Plan" that allows customization of tools and target sites. Please feel free to contact us if you have any requests. 【Features】 ■ Premium - Diagnosis using CyberGym Japan's "ImmuniWeb." Advanced vulnerabilities detected through AI machine learning. - Covers domestic and international security guidelines and advanced attack methods. ■ Light - Diagnosis for major vulnerabilities. - Can also assess web applications in the production environment during the operational phase. - A report summarizing the diagnosis results and countermeasures will be provided, along with a results presentation meeting. *For more details, please download the PDF or contact us.

  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI Remote Vulnerability Assessment Service

High quality, high speed, efficient! Diagnosis of all possible parts with our unique AI tool.

We would like to introduce our "AI Remote Vulnerability Diagnosis." Using a vulnerability scanning tool equipped with an AI engine developed independently by Ray Aegis, we conduct automated tool diagnostics. Following this, experienced diagnosticians manually assess items that cannot be covered by the automated tool diagnostics in detail. The diagnosis is priced per FQDN, allowing for fast and cost-effective use even for web applications with many screens and features, such as media distribution services. 【Other Services】 ■ Platform Diagnosis ■ AI Quick Tool Diagnosis ■ Fast Penetration Test ■ Penetration Test *For more details, please refer to the PDF document or feel free to contact us.

  • Other network tools
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Supply Chain Attack Countermeasures Vulnerability Assessment Service [Helpful Materials Provided]

Cyberattacks targeting the vulnerabilities of the manufacturing industry's supply chain are on the rise! We are offering a document that explains the key points of necessary security measures!

At Ray Aegis Japan, we utilize our proprietary AI tools to provide vulnerability assessments conducted by over 320 highly skilled security engineers worldwide. As attacks exploiting weaknesses in the supply chain of the manufacturing industry are on the rise, what are the comprehensive security measures against cyberattacks? We are offering materials that explain the key points of necessary security measures! What are the world-class security measures? We explain them in an easy-to-understand manner! [Excerpt of the content] - Challenges of cybersecurity in the manufacturing industry - 59% have experienced security incidents? - Supply chain risks - Approaches to solving challenges *For more details, please download the PDF or contact us.

  • others
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ministry of Economy, Trade and Industry Certified | Web Application Vulnerability Assessment Service

"Ministry of Economy, Trade and Industry registered services × Expert diagnosis × Ongoing support" Total support for visualizing, improving, and maintaining web application security.

Ranryu's "Web Application Vulnerability Diagnosis Service" is a highly reliable diagnostic service registered on the IPA public list as a service compliant with the Ministry of Economy, Trade and Industry's "Information Security Service Standards." Not limited to mere tool diagnostics, it combines manual diagnostics by security engineers to prevent false positives and oversights. Furthermore, after the diagnosis, it offers improvement proposals, reporting sessions, re-diagnosis, and continuous monitoring, providing effective and reassuring security measures. ■ Features and PR Points - Peace of mind from public certification: Registered service with the Ministry of Economy, Trade and Industry and IPA - Four flexible plans to choose from: Ranging from cost-focused to thorough diagnostics - Detailed reports leading to improvements: Evaluations based on OWASP and IPA standards, along with correction proposals - Site seal provision: Visualizes completed diagnostics to instill trust in clients and partners - Regular diagnostic packages: 2 to 4 diagnostics per year, plus re-diagnosis, to continuously enhance security levels.

  • Other security
  • Firewall and intrusion prevention
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cracker Probing-Eyes(R)

Daily automated vulnerability diagnosis service that can quickly detect new vulnerabilities as it conducts assessments every day.

"Cracker Probing-Eyes(R)" is an ASP-based automated diagnostic service that checks the vulnerabilities of customer sites over the internet once a day. The reliable diagnostic program, developed in accordance with standards and guidelines established by world-class security organizations such as the U.S. National Security Agency (NSA), the U.S. Computer Security Institute (CSI), the U.S. Federal Bureau of Investigation (FBI), and SANS, has a significant effect on keeping your systems healthy. 【Features】 ■ Vulnerability diagnosis based on advanced security information ■ Easy-to-understand web report functionality ■ Excellent user interface *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Other core systems
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

Visualize system vulnerabilities and prepare for risks! Introduction to cybersecurity diagnostics.

We would like to introduce our "Vulnerability Assessment Service." We offer flexible responses tailored to the assessment targets, including web application assessments, smartphone application assessments, platform assessments, and penetration testing. Additionally, our easy-to-understand assessment reports are a key feature, providing a comprehensive overview of the assessment results, risks, response guidelines, scoring for each assessment item, the status of detected vulnerabilities, and detailed explanations of what needs to be addressed. 【Strengths】 ■ Flexible scheduling ■ High-precision assessments ■ Adjustments to fit your budget *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability assessment service

High-speed and high-quality vulnerability diagnosis using AI tools!

We utilize RayAegis's unique AI tools to provide vulnerability assessments conducted by over 250 advanced security engineers worldwide. With our AI × Security approach practiced since our founding, we can offer comprehensive diagnostic services that maintain quality in a short period, even for the increasing number of systems year by year. Please feel free to contact us if you have any requests. 【Features】 ■ A package pricing system based on FQDN that becomes more cost-effective as the environment scales ■ No need for preliminary narrowing down of diagnostic targets when making a request ■ The information we need to gather in advance is very simple ■ Short duration and high quality *For more details, please download the PDF or contact us.

  • others
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

WiSAS Vulnerability Assessment

We provide visualization and optimization support for comfortable use of Wi-Fi environments, as well as prevention of information leaks due to unauthorized use and cyber attacks.

By acquiring the radio waves of the wireless network (Wi-Fi) and analyzing them from six security perspectives, we visualize the vulnerabilities and issues lurking in the Wi-Fi environment, preventing threats before they occur. Additionally, it is possible to eliminate threats using location information analysis (optional). You can understand the dangers of using Wi-Fi that directly leads to information leaks. By installing WiSAS sensors in the target area and visualizing the usage of Wi-Fi, we conduct investigations and analyses from a security perspective.

  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Issue] I want to improve the vulnerabilities of network applications.

We will prevent the leakage of important information by building a robust security system!

We offer a "Vulnerability Assessment Service" that addresses the challenge of wanting to improve the vulnerabilities of network applications. Engineers who have supported large-scale systems at JR accurately detect vulnerabilities that may exist in your network environment and website. We will clearly explain the countermeasures and verification methods for the detected vulnerabilities. Please feel free to contact us when needed. 【Features】 ■ High-precision detection through a two-way assessment combining automated and manual methods ■ Elimination of false positives in manual assessments ■ Detection of areas that cannot be identified by tools alone ■ Accurate advice unique to system integrators ■ Many cases do not require re-assessment *For more details, please refer to the related links or feel free to contact us.

  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Presentation of case studies! [Vex Implementation Case] Divx Inc.

Addressing new needs! Security has become an indispensable element among customer challenges.

We would like to introduce a case study on the implementation of the web application vulnerability scanning tool "Vex" for Divx Inc. As the risk of unauthorized access increases, ensuring security has become a prerequisite for solving the challenges faced by our clients. Clear reports that are sufficient as deliverables for clients are automatically generated, leading to a reduction in man-hours. [Case Overview] ■Challenges - While we excel in application development, we did not have enough engineers capable of conducting security tests. ■Results - Comprehensive support and easy-to-understand information were provided, allowing even first-time users to quickly become proficient. *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Detection Automation Tool "HERCULES SecDevice"

An automated security assessment tool designed for network-connected products!

The "HERCULES SecDevice" is an automated vulnerability detection tool equipped with features such as known vulnerability testing, fuzzing tests, and web security testing. It utilizes patented AI learning technology, providing excellent time efficiency and accuracy in vulnerability detection. When selling medical devices in North America, it is necessary to verify the cybersecurity measures required by the FDA's PREMARKET APPROVAL 510K. This includes advanced fuzzing techniques that are more sophisticated than general verification methods. 【Features】 ■ Automatic detection and identification of targets ■ Automation of vulnerability testing and scanning ■ Smart vulnerability analysis ■ Reduction of inspection time and improvement of accuracy ■ Ability to discover unknown vulnerabilities through fuzzing, etc. *For more details, please download the PDF or feel free to contact us.

  • Other Software
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security Verification Service for Amazon Alexa

When device manufacturers develop devices equipped with Amazon Alexa, security testing at an authorized lab is mandatory.

When device manufacturers develop devices equipped with Amazon Alexa provided by Amazon, security testing at a certified lab (only 7 companies worldwide are certified) is mandatory according to Amazon's regulations. Generally, customers are required to submit a development application through Amazon's developer site beforehand, but we are here to support you during that process. Therefore, even if you do not have preparations like an intake form, please feel free to consult with us first.

  • Contract Inspection
  • Other security
  • Public Testing/Laboratory
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ensure safety by appropriately providing and fixing vulnerability information for Linux/OSS!

Attention companies facing technical and resource challenges in vulnerability investigation and countermeasures! We can provide services tailored to your specific needs.

We would like to introduce our "Embedded Software (Linux/OSS) Vulnerability Diagnosis Service." As global cybersecurity risks increase, there is a growing consideration for strengthening security measures through legislation and standardization worldwide, particularly in Europe. Manufacturers developing devices are required to address vulnerabilities in their products. We regularly investigate and report on vulnerability information related to Linux/OSS embedded in commercialized devices, and release necessary patches as needed. 【Services provided in a format tailored to customer requests (1 only, 1 & 2 only, all 1, 2 & 3)】 1: Vulnerability Monitoring: Provision of reports on vulnerability items relevant to customer software 2: Vulnerability Analysis: Analysis of the severity of vulnerabilities 3: Application and Verification of Vulnerability Patches *For more details, please download the catalog or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What does ensuring cybersecurity in the utilization of Linux/OSS mean?

[Essential for companies developing and selling devices equipped with Linux OS] For addressing product vulnerabilities!

We would like to introduce our "Embedded Software (Linux/OSS) Vulnerability Diagnosis Service." As the global risk of cyber security increases, there are discussions worldwide, particularly in Europe, about strengthening security measures through legislation and standardization. Manufacturers developing devices are required to take measures regarding product vulnerabilities. We will regularly investigate and report on vulnerability information related to Linux/OSS embedded in commercialized devices, and release necessary patch updates as needed. 【Services provided in a format tailored to customer requests (1 only, 1 & 2 only, all 1, 2 & 3)】 1: Vulnerability Monitoring: Providing reports on vulnerability items applicable to customer software 2: Vulnerability Analysis: Analyzing the severity of vulnerabilities 3: Applying and verifying vulnerability patches *For more details, please download the PDF or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ministry of Economy, Trade and Industry Certified | Platform Vulnerability Diagnosis Service

Ministry of Economy, Trade and Industry Registered Service × Expert Diagnosis × Ongoing Support" Platform Diagnosis that "Doesn't End with Discovery

Ranryu's "Platform Vulnerability Diagnosis Service" is a highly reliable diagnostic service registered on the IPA public list as a service compliant with the Ministry of Economy, Trade and Industry's "Information Security Service Standards." ■Features Rather than merely detecting and reporting, it evaluates the "real risks" through a unique scoring system. It quantifies priorities by combining the following three elements: - Vulnerability items and scores (CVE / CVSS) - Exploitability (EPSS) - Asset and environmental information (importance, exposure level, configuration status, etc.) This unique scoring clarifies "which vulnerabilities should be addressed first," enabling effective and rapid improvements even with limited resources. ■PR Points - Assurance of public certification: Registered service with the Ministry of Economy, Trade and Industry and IPA - Two flexible plans to choose from: From cost-focused to thorough diagnostics - Risk assessment aligned with actual operations: Identifying "real dangers" through unique scoring - Site seal provision: Visualizing completed diagnostics to build trust with partners and customers - Regular diagnostic package: Continuous improvement of security levels with 2 to 4 diagnostics per year plus re-diagnostics.

  • Other security
  • Firewall and intrusion prevention
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Website Vulnerability Assessment Service

From the attacker's perspective, we will conduct a multifaceted assessment of whether the publicly available environment of the website is in a state where "valuable information can be collected."

Ranryu's "Website Vulnerability Diagnosis Service" conducts additional manual verification based on the information obtained after a diagnosis using tools. This manual verification allows for the discovery of vulnerabilities that may be overlooked by tools alone. By adding options, it is possible to conduct diagnoses that are "specialized for WordPress," "include web application diagnosis elements," and "include platform diagnosis elements." ■ Main Targets - Static websites focused on information dissemination - Systems primarily centered around content display. ■ Diagnosis Perspective A diagnosis that emphasizes the verification of static content and basic security settings. ■ Main Use Cases - Corporate websites - Landing pages - Blog sites, etc. ■ Features and PR Points - Assurance of public certification: A service provided by a company registered with the Ministry of Economy, Trade and Industry and IPA. - Detailed reports leading to improvements: Evaluation based on OWASP and IPA standards, along with correction proposals. - Site seal provision: Visualizes that a diagnosis has been conducted, appealing to trust from business partners and customers. - Regular diagnosis packages: 2 to 4 diagnoses per year, plus re-diagnosis, to continuously improve security levels.

  • Other security
  • Firewall and intrusion prevention
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

API Vulnerability Assessment Service

Visualizing API-specific risks with high precision based on international standards through a hybrid diagnosis of tools and manual methods.

Ranryu's "API Vulnerability Diagnosis Service" conducts assessments in accordance with the OWASP API Security Top 10, OWASP ASVS, and IPA standards. It goes beyond mere automated tool assessments by combining them with manual evaluations conducted by engineers holding internationally recognized white-hat hacker certifications, addressing API-specific risks such as authentication and authorization flaws, token management, and excessive information disclosure that are difficult to detect with tools alone. Furthermore, after the diagnosis, we support improvement proposals, reporting sessions, re-assessments, and continuous monitoring, providing effective measures to safely operate APIs. ■ Features and PR Points - Peace of mind from public certification: A service provided by a company registered with the Ministry of Economy, Trade and Industry and IPA. - Detailed reports leading to improvements: Evaluation based on OWASP and IPA standards, along with correction proposals. - Site seal provision: Visualizes that the diagnosis has been conducted, appealing to partners and customers for trust. - Regular diagnosis package: 2 to 4 assessments per year, along with re-assessments, to continuously improve security levels.

  • Other security
  • Firewall and intrusion prevention
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Smartphone app vulnerability assessment service

Before and during operation──a diagnostic service for safely evolving smartphone applications.

Ranryu's "Smartphone App Vulnerability Diagnosis Service" goes beyond mere tool diagnostics by combining static analysis, dynamic analysis, and manual diagnosis by security engineers to accurately detect vulnerabilities unique to mobile apps, such as deficiencies in API communication and improper data storage. Furthermore, after the diagnosis, we provide improvement proposals, reporting sessions, re-diagnosis, and ongoing monitoring, offering reliable and effective security measures. ■ Features and PR Points - Peace of mind from public certification: A service provided by a company registered with the Ministry of Economy, Trade and Industry and IPA. - Three flexible plans to choose from: From cost-focused options to thorough diagnostics. - Diagnosis items specific to mobile: Focused attention on API authentication and authorization deficiencies, data storage issues, session management, and more. - Detailed reports leading to improvements: Evaluation based on OWASP Mobile Top 10 and IPA standards, along with correction proposals. - Site seal provision: Visualizes that diagnostics have been conducted, appealing to users and business partners for trust. - Regular diagnosis packages: Continuous improvement of app security with 2 to 4 diagnoses and re-diagnoses per year.

  • Other security
  • Firewall and intrusion prevention
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration