We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Vulnerability Assessment Service.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Vulnerability Assessment Service Product List and Ranking from 34 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Dec 17, 2025~Jan 13, 2026
This ranking is based on the number of page views on our site.

Vulnerability Assessment Service Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Dec 17, 2025~Jan 13, 2026
This ranking is based on the number of page views on our site.

  1. デジタルハーツ Tokyo//others
  2. B7 Tokyo//software
  3. ガイオ・テクノロジー Tokyo//IT/Telecommunications
  4. 4 サイファー・テック Tokyo//software
  5. 4 ブロードバンドセキュリティ Tokyo//IT/Telecommunications

Vulnerability Assessment Service Product ranking

Last Updated: Aggregation Period:Dec 17, 2025~Jan 13, 2026
This ranking is based on the number of page views on our site.

  1. What is vulnerability assessment? デジタルハーツ
  2. Static analysis tool "NDepend" B7
  3. [Information] AI Smart Web Diagnosis デジタルハーツ
  4. 4 Mobile App Diagnosis Essential Edition サイファー・テック
  5. 4 Cracker Probing-Eyes(R) ブロードバンドセキュリティ

Vulnerability Assessment Service Product List

31~45 item / All 56 items

Displayed results

Presentation of case studies! [Vex Implementation Case] Tower Records Inc.

In-house diagnosis of a vast number of websites! Achieving cost reduction and increased scope and frequency of diagnosis.

We would like to introduce a case study on the implementation of the web application vulnerability scanning tool "Vex" at Tower Records Inc. The site is large, and we felt challenges regarding the cost and frequency of vulnerability assessments each time. By internalizing the assessments with this product, we improved the scope, frequency, and number of assessments. [Case Overview] ■ Key Points - Achieved vulnerability assessments with increased scope, frequency, and number in line with frequent updates and the launch of new services. - Automatic generation of high-quality reports allows for handling without security knowledge or skills. - The ability to use a trial before full implementation allows for thorough confirmation of usability and features in advance. *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Data] Cybersecurity Measures

We propose a suitable plan! Security measures advanced through "diagnosis and investigation" and "countermeasures and strengthening."

As IT technology advances, cyber attacks are also evolving daily, making it difficult to completely prevent damage. To minimize damage, a multi-faceted approach is necessary, ranging from vulnerability diagnosis and investigation to measures and strengthening on both system and organizational fronts. This document introduces Allied Telesis's security solutions, such as "Vulnerability Diagnosis Service" and "Cloud UTM Service." We encourage you to read it. [Contents] ■ Security Challenges and Solutions ■ Allied Telesis Security Solutions ■ Case Studies *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] AI Smart Web Diagnosis

Reduce diagnostic costs with AI-driven labor efficiency! We also introduce the top 5 concerns companies have regarding vulnerability assessments.

This document introduces our "AI Smart Web Diagnosis" service. It provides a detailed explanation of the importance of vulnerability assessments, including social trends surrounding cybersecurity and the EC site security guidelines scheduled for implementation in 2025. Additionally, it includes the flow of the diagnosis and a Q&A section, making it a useful resource for those considering implementation. We encourage you to download and review it. [Contents] ■ Importance of vulnerability assessments ■ Corporate concerns regarding vulnerability assessments ■ What is AI Smart Web Diagnosis? ■ About AGEST *For more details, please download the PDF or feel free to contact us.

  • Other IT tools
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Management 'insightVM'

Automatically assess and understand the risks across the entire infrastructure.

"InsightVM" visualizes vulnerabilities with a customizable dashboard, allowing for an overview and prioritization of all information regarding exposure risks. By accurately understanding risks in advanced environments, collaborative activities with technical teams become possible. Additionally, alignment with traditionally siloed teams and sharing of visualized content maximizes effectiveness using a common language with "InsightVM." 【Features】 ■ Visualize risks ■ Expand the scope of security measures ■ Share progress *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service Lite

Providing vulnerability assessments that include manual diagnostics only where necessary, with short delivery times and low costs.

The "Vulnerability Assessment Service Lite" is a manual and tool-based assessment service that focuses on essential functions to conduct vulnerability assessments, based on the previously well-received "Vulnerability Assessment Service." It is designed to meet customer needs for quick assessments at a lower cost, optimized for the characteristics of the functions they wish to assess, providing a speedy and cost-effective service. For customers who do not have the luxury of time and budget but want to immediately understand the vulnerabilities of their website, we offer a highly cost-effective vulnerability assessment that maximizes the know-how cultivated by technicians from a security expert company. The "Vulnerability Assessment Service Lite" has two plans: - Web Function-Specific Assessment - Platform Assessment Please make use of it as a first step in understanding your company's security issues. * The "Vulnerability Assessment Service Lite" is provided in collaboration with SecureSky Technology.

  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Comprehensive Security Service "BLUE Sphere"

We provide comprehensive risk management solutions for your website!

"BLUE Sphere" is a comprehensive security service equipped with cloud-based WAF/DDoS protection and tampering detection features. It provides extensive defense against attacks at the network layer, OS vulnerabilities, information leaks from databases, large-scale cyberattacks, and redirection to fraudulent sites due to website tampering, offering a basic service that does not require security engineers to handle DDoS attacks that cannot be fully mitigated by WAF alone. 【Features】 ■ Unlimited domains ■ Individual tuning by experts to enhance WAF accuracy ■ A wealth of features to address numerous vulnerabilities and attacks ■ Easy implementation, just leave it to the professionals, etc. *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service "Site Scan"

The number of test items is approximately 20,000! There is a differential report feature that allows comparison with the previous scan results.

"Site Scan" is a vulnerability assessment service for the OS, network, and application layers. Using evaluation criteria compliant with the industry standard CVSS/CVE, it clarifies the level of security measures implemented in your system and identifies necessary actions for security improvements. Additionally, we offer an on-demand web application assessment called "WebSite Scan" and a manual assessment service called "Web Vulnerability Assessment." 【Features】 ■ Self-assessment is possible through a dedicated customer interface ■ Vulnerability assessment compliant with CVSS/CVE standards ■ Detailed vulnerability reports ■ Differential reports that can be compared with previous scan results *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Other contract services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web Application Vulnerability Assessment Service

Investigating major vulnerabilities that are easily exploited and have a significant impact!

We offer a "Web Application Vulnerability Diagnosis Service" to assess the vulnerabilities of web applications and mobile apps. We provide a "Light Plan" that diagnoses major vulnerabilities through black box testing, a "Premium Plan" that conducts vulnerability assessments using CyberGym Japan's "ImmuniWeb," and a "Free Plan" that allows customization of tools and target sites. Please feel free to contact us if you have any requests. 【Features】 ■ Premium - Diagnosis using CyberGym Japan's "ImmuniWeb." Advanced vulnerabilities detected through AI machine learning. - Covers domestic and international security guidelines and advanced attack methods. ■ Light - Diagnosis for major vulnerabilities. - Can also assess web applications in the production environment during the operational phase. - A report summarizing the diagnosis results and countermeasures will be provided, along with a results presentation meeting. *For more details, please download the PDF or contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI Remote Vulnerability Assessment Service

High quality, high speed, efficient! Diagnosis of all possible parts with our unique AI tool.

We would like to introduce our "AI Remote Vulnerability Diagnosis." Using a vulnerability scanning tool equipped with an AI engine developed independently by Ray Aegis, we conduct automated tool diagnostics. Following this, experienced diagnosticians manually assess items that cannot be covered by the automated tool diagnostics in detail. The diagnosis is priced per FQDN, allowing for fast and cost-effective use even for web applications with many screens and features, such as media distribution services. 【Other Services】 ■ Platform Diagnosis ■ AI Quick Tool Diagnosis ■ Fast Penetration Test ■ Penetration Test *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Supply Chain Attack Countermeasures Vulnerability Assessment Service [Helpful Materials Provided]

Cyberattacks targeting the vulnerabilities of the manufacturing industry's supply chain are on the rise! We are offering a document that explains the key points of necessary security measures!

At Ray Aegis Japan, we utilize our proprietary AI tools to provide vulnerability assessments conducted by over 320 highly skilled security engineers worldwide. As attacks exploiting weaknesses in the supply chain of the manufacturing industry are on the rise, what are the comprehensive security measures against cyberattacks? We are offering materials that explain the key points of necessary security measures! What are the world-class security measures? We explain them in an easy-to-understand manner! [Excerpt of the content] - Challenges of cybersecurity in the manufacturing industry - 59% have experienced security incidents? - Supply chain risks - Approaches to solving challenges *For more details, please download the PDF or contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ministry of Economy, Trade and Industry Certified | Web Application Vulnerability Assessment Service

"Ministry of Economy, Trade and Industry registered services × Expert diagnosis × Ongoing support" Total support for visualizing, improving, and maintaining web application security.

Ranryu's "Web Application Vulnerability Diagnosis Service" is a highly reliable diagnostic service registered on the IPA public list as a service compliant with the Ministry of Economy, Trade and Industry's "Information Security Service Standards." Not limited to mere tool diagnostics, it combines manual diagnostics by security engineers to prevent false positives and oversights. Furthermore, after the diagnosis, it offers improvement proposals, reporting sessions, re-diagnosis, and continuous monitoring, providing effective and reassuring security measures. ■ Features and PR Points - Peace of mind from public certification: Registered service with the Ministry of Economy, Trade and Industry and IPA - Four flexible plans to choose from: Ranging from cost-focused to thorough diagnostics - Detailed reports leading to improvements: Evaluations based on OWASP and IPA standards, along with correction proposals - Site seal provision: Visualizes completed diagnostics to instill trust in clients and partners - Regular diagnostic packages: 2 to 4 diagnostics per year, plus re-diagnosis, to continuously enhance security levels.

  • Other security
  • Firewall and intrusion prevention

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Coverity <Tool for PCI DSS Compliance>

Establish security and compliance as part of the normal business process!

PCI DSS is a data security standard applicable to all entities involved in payment card processing, including retailers, financial institutions, POS vendors, and hardware/software developers engaged in the development and operation of payment processing infrastructure. The static analysis tool 'Coverity' identifies critical quality defects and potential security vulnerabilities early in the software development lifecycle. By providing developers with reliable and specific remediation guidance, it contributes to risk reduction and overall project cost savings. 【PCI DSS Compliance Requirements (6 Groups)】 ■ Build and maintain a secure network and systems ■ Protect cardholder data ■ Maintain a vulnerability management program ■ Implement strong access control measures ■ Regularly monitor and test networks ■ Maintain an information security policy *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security
  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cracker Probing-Eyes(R)

Daily automated vulnerability diagnosis service that can quickly detect new vulnerabilities as it conducts assessments every day.

"Cracker Probing-Eyes(R)" is an ASP-based automated diagnostic service that checks the vulnerabilities of customer sites over the internet once a day. The reliable diagnostic program, developed in accordance with standards and guidelines established by world-class security organizations such as the U.S. National Security Agency (NSA), the U.S. Computer Security Institute (CSI), the U.S. Federal Bureau of Investigation (FBI), and SANS, has a significant effect on keeping your systems healthy. 【Features】 ■ Vulnerability diagnosis based on advanced security information ■ Easy-to-understand web report functionality ■ Excellent user interface *For more details, please download the PDF or feel free to contact us.

  • Other security
  • Other core systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

Visualize system vulnerabilities and prepare for risks! Introduction to cybersecurity diagnostics.

We would like to introduce our "Vulnerability Assessment Service." We offer flexible responses tailored to the assessment targets, including web application assessments, smartphone application assessments, platform assessments, and penetration testing. Additionally, our easy-to-understand assessment reports are a key feature, providing a comprehensive overview of the assessment results, risks, response guidelines, scoring for each assessment item, the status of detected vulnerabilities, and detailed explanations of what needs to be addressed. 【Strengths】 ■ Flexible scheduling ■ High-precision assessments ■ Adjustments to fit your budget *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability assessment service

High-speed and high-quality vulnerability diagnosis using AI tools!

We utilize RayAegis's unique AI tools to provide vulnerability assessments conducted by over 250 advanced security engineers worldwide. With our AI × Security approach practiced since our founding, we can offer comprehensive diagnostic services that maintain quality in a short period, even for the increasing number of systems year by year. Please feel free to contact us if you have any requests. 【Features】 ■ A package pricing system based on FQDN that becomes more cost-effective as the environment scales ■ No need for preliminary narrowing down of diagnostic targets when making a request ■ The information we need to gather in advance is very simple ■ Short duration and high quality *For more details, please download the PDF or contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration