More advanced, more convenient! Products of professional quality recognized by security experts.
"Vulnerability EXplorer (Vex)" is a web application vulnerability scanning tool that continues to evolve while having a track record of diagnostics across thousands of sites. It has gained a reputation for its high accuracy in vulnerability assessments, starting with its adoption by financial institutions that require robust security. Its high detection capability is due to features such as "provision of inspection signatures" and "highly flexible scenario creation," allowing for meticulous configuration that enables high-quality inspections. [Features] ■ Powerful scenario creation support ■ Comprehensive inspection functions ■ Extensive vulnerability inspection items ■ Support for the latest vulnerabilities ■ Regular addition of new features *For more details, please refer to the PDF document or feel free to contact us.
Inquire About This Product
basic information
【Other Features】 ■ Comprehensive reporting functionality ■ Strong support from implementation to stabilization phase ■ Convenient features provided through the support portal *For more details, please refer to the PDF document or feel free to contact us.
Price range
Delivery Time
Applications/Examples of results
【Case Studies】 ■ OGIS-RI Co., Ltd. ■ Fujitsu Social Science Laboratory, Inc. ■ Fujitsu Limited ■ Cybozu, Inc. ■ NRI Secure Technologies, Inc. ■ Global Security Expert Co., Ltd. ■ Major Distribution IT Subsidiary ■ Video Equipment and Related Systems Development Company, etc. *For more details, please refer to the PDF document or feel free to contact us.
catalog(1)
Download All CatalogsCompany information
We are a security vendor that provides web application vulnerability assessment services and develops and sells the testing tool "Vex." We also offer consulting services related to the operation of information systems. We will support new challenges with services that make security easier.

![Presentation of case studies! [Vex Implementation Case] Tower Records Inc.](https://image.mono.ipros.com/public/product/image/75f/2001063836/IPROS50777670041435317865.png?w=280&h=280)
![Presentation of case studies! [Vex Implementation Case] Divx Inc.](https://image.mono.ipros.com/public/product/image/0e1/2001063842/IPROS78036389572712486809.png?w=280&h=280)
![Ministry of Economy, Trade and Industry Certified | Vulnerability Diagnosis Service and Testing Service [Fully Remote]](https://image.mono.ipros.com/public/product/image/2116822/IPROS2074623580677926845.jpeg?w=280&h=280)
![Supply Chain Attack Countermeasures Vulnerability Assessment Service [Helpful Materials Provided]](https://image.mono.ipros.com/public/product/image/ea6/2001181362/IPROS11488447219539233163.png?w=280&h=280)
![[Case Study] SecuDog | Hokkaido Electric Power Information System Service Co., Ltd.](https://image.mono.ipros.com/public/product/image/71c/2000435246/IPROS4476648901737813902.jpg?w=280&h=280)




![[Data] New Standards for Serial Connections Part 3: Cybersecurity](https://image.mono.ipros.com/public/product/image/2092544/IPROS14096924560777623903.png?w=280&h=280)