Vulnerability Assessment Service Product List and Ranking from 37 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Jan 14, 2026~Feb 10, 2026
This ranking is based on the number of page views on our site.

Vulnerability Assessment Service Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Jan 14, 2026~Feb 10, 2026
This ranking is based on the number of page views on our site.

  1. 株式会社クロスポイントソリューション 株式会社クロスポイントソリューション Tokyo//Information and Communications
  2. テガラ 本社 Shizuoka//Trading company/Wholesale
  3. コンピューターサイエンス Tokyo//Information and Communications
  4. 4 レイ・イージス・ジャパン Tokyo//Information and Communications
  5. 4 M&K Tokyo//Information and Communications

Vulnerability Assessment Service Product ranking

Last Updated: Aggregation Period:Jan 14, 2026~Feb 10, 2026
This ranking is based on the number of page views on our site.

  1. Information Security Management Solution "MCSGLOBAL" 株式会社クロスポイントソリューション 株式会社クロスポイントソリューション
  2. Malware Sandbox "Hatching Triage" テガラ 本社
  3. Vulnerability Assessment Service "Security Blanket Series" M&K
  4. Web Application Vulnerability Assessment Service コンピューターサイエンス
  5. 4 Automated Vulnerability Diagnosis Service "SCT SECURE Cloud Scan" 三和コムテック

Vulnerability Assessment Service Product List

1~30 item / All 63 items

Displayed results

Mobile App Diagnosis Essential Edition

Achieve low-cost vulnerability assessment for mobile apps! A vulnerability assessment service that you must have.

Based on our track record of over 1,600 mobile app assessments, we will pick up the essential items that mobile apps should care for and conduct an evaluation. In addition to using our proprietary automated diagnostic tool, experienced security engineers will manually verify particularly important functions to assess preparedness against common vulnerabilities. By narrowing down the target items, we can provide assessments in a short period at a reasonable and clear fixed fee.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Automated Vulnerability Diagnosis Service "SCT SECURE Cloud Scan"

Always diagnose based on new vulnerability information! Introduction to the cloud-based automatic annual vulnerability diagnosis service.

"SCT SECURE Cloud Scan" is a cloud-based security service that regularly diagnoses whether there are vulnerabilities that could serve as footholds for cyber attacks, based on new security information. With this product, sites diagnosed as having no vulnerabilities and secure websites are issued a safety certification mark. Additionally, we offer a manual diagnostic service called "SCT SECURE Manual Web Application Diagnosis" to complement the cloud-based automated vulnerability diagnosis. 【Features of SCT SECURE Cloud Scan】 ■ Promote security strength with a date-stamped safety certification mark ■ Diagnosis based on always updated vulnerability information ■ Diagnostic tool with PCI DSS ASV qualification ■ User-friendly management console and support for various report outputs *For more details, please refer to the PDF materials or feel free to contact us.

  • Security Assessment
  • Other Software
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment | Security Check for Servers and Web

Before becoming the perpetrator from the victim...

At Net Assist, we offer security vulnerability assessments. - A considerable amount of time has passed since it was built. - I can't find the handover documents from my predecessor. - My boss has repeatedly asked, "Our server is okay, right?" We recommend this for those in charge.

  • others
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] How to Protect Data in Microsoft 365

Five reasons why the standard features of Microsoft 365 are not enough!

This document introduces the data protection methods for Microsoft 365 by Arcserve. It includes five reasons why the standard features of Microsoft 365 are insufficient, as well as the protection of Microsoft 365 using Arcserve UDP/UDP Appliance. We encourage you to read it. [Contents] ■ Five reasons why the standard features of Microsoft 365 are insufficient ■ Data protection methods for Microsoft 365 by Arcserve ■ Protection of Microsoft 365 using Arcserve UDP/UDP Appliance ■ Protection of Microsoft 365 using Arcserve UDP Cloud Hybrid ■ Long-term storage of emails using Arcserve Email Archiving/Arcserve Email Archiving Cloud *For more details, please refer to the PDF document or feel free to contact us.

  • others
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Ikeda Mohando Co., Ltd.

Introducing a case where robust data protection management has become possible alongside core business operations!

We would like to introduce a case study of "Arcserve Backup / Arcserve Replication" implemented at Ikeda Mohando Co., Ltd. Until now, the company operated its information systems on a branch-by-branch basis, storing important business data using NAS, but gradually began to suffer from hardware failures. Therefore, they introduced our product. As a result, the two-tiered data protection operation eliminated the risk of data loss, allowing users at each branch to focus on their own work without concerns about data storage. [Case Study] - Industry: Pharmaceuticals - Company Name: Ikeda Mohando Co., Ltd. - Challenge: Faced significant barriers with business data *For more details, please refer to the PDF document or feel free to contact us.

  • Data Backup
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI Vulnerability Diagnosis Service "V-threat"

Achieving an unprecedentedly superior cost performance! The diagnostic speed is also overwhelmingly fast, and the price is overwhelmingly low.

"V-threat" is a third-generation AI & HUMAN vulnerability assessment that can continuously detect advanced vulnerabilities through AI machine learning, enabling a much more accurate vulnerability diagnosis through a hybrid of AI and engineers. This service provides a comprehensive assessment of web applications, web servers, APIs, and SSL, delivering inspection results quickly and at a low cost. [Features] ■ Comprehensive assessment not only for web applications but also for web servers & SSL ■ Diagnosis of mobile applications is also overwhelmingly fast and inexpensive. ■ World-class high quality and proven track record *For more details, please download the PDF or feel free to contact us.

  • Company:バルク
  • Price:1 million yen-5 million yen
  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Risk Analysis "V-sec"

Security risk analysis 'V-sec' for implementing cost-effective cybersecurity measures!

"V-sec" is a service that has received approval from the Ministry of Economy, Trade and Industry's "Information Security Audit Service Standards Compliance Service" and is listed in the IPA's Information Security Service Standards Compliance List. From the perspective of four safety management measures (human, organizational, physical, and technical) and multi-layered defense, it visualizes the company's security level and the vulnerabilities it faces, aiming to create a shared understanding between management and the field. This helps prevent unnecessary investments and establishes appropriate security investment indicators. It is the optimal solution for customers such as: ▶ Those who do not know where to start with security measures. ▶ Those who want to know the priority of measures that should be implemented in their company. ▶ Those who seek effectiveness even with the minimum necessary security measures. ▶ Those who are unsure if their current measures are adequate. ▶ Those who are working on it themselves but want a third-party evaluation. *For more details, please download the PDF or feel free to contact us.

  • Company:バルク
  • Price:500,000 yen-1 million yen
  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Corporate Information Monitoring 'Discovery'

Already available password lists and leaked information on the dark web can be investigated!

Corporate information monitoring "Discovery" is a service that investigates and monitors whether hackers can collect information that targets your company for cyber attacks. Utilizing award-winning OSINT and AI technology, it investigates and monitors external attack surfaces. It continuously detects, tests, and scores digital and IT assets, enhancing visibility by proactively monitoring mentions of the company on the dark web and code repositories. 【Features】 ■ Easy to start ■ Information gathering from a hacker's perspective ■ Investigation of information leaks is also possible *For more details, please download the PDF or feel free to contact us.

  • Security Assessment
  • Other Software
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Dark web exploration service

Investigating the risk of information leakage! Services provided by one of the world's largest groups of white hat hackers.

Our "Dark Web Exploration Service" is a one-stop service that enables early detection of any potential information leaks concerning our clients, thereby strengthening cybersecurity. Our company, which boasts over 320 white-hat hackers, one of the largest groups in the world, conducts investigations on the dark web based on specified keywords to identify the potential risks to our clients' information. Through our customized reports, clients can verify the risks associated with their information. [Service Coverage] ■ Information leaks and information breaches *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Fast Penetration Test

Devices facing the internet, such as firewalls and mail servers!

Our "Fast Penetration Test" utilizes not only commonly used tools but also our proprietary AI tools. It detects advanced attacks such as business logic flaws, DoS, and zero-day attacks. We also attempt attacks that mimic actual hacker techniques and combine multiple vulnerabilities. Thanks to this advanced technology and unique tools, we can conduct tests in a short period and discover vulnerabilities that are generally difficult to find. 【Pricing Features】 ■ Course-based pricing - A tiered pricing structure is set to ensure that smaller systems are more affordable. ■ Fixed pricing - Regardless of the number of pages or requests, we offer a fixed pricing model per "IP address/FQDN/application" to meet our customers' needs. *For more details, please refer to the PDF materials or feel free to contact us.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

Vulnerability assessment service using cloud service infrastructure!

Our company offers a "Vulnerability Assessment Service" to verify whether information systems such as network devices, servers, and client terminals are truly secure. As a general principle, we conduct information exchanges with customers using a reliable cloud service infrastructure (within the scope of ISMS Cloud Security Certification Registration), ensuring a high level of security for data related to the assessment. Please feel free to contact us if you have any requests. [Examples of Threats and Vulnerabilities] ■ Database leaks ■ Password leaks ■ Unauthorized information manipulation ■ Website tampering ■ Service interruptions, etc. *For more details, please download the PDF or contact us.

  • Company:i-3c
  • Price:Other
  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability assessment service

We will continue to strive to reduce even one security incident caused by vulnerabilities in this world.

We provide vulnerability assessment services to proactively prevent the risks of cyber attacks and information leaks, and to strengthen security. Even if you have little expertise in vulnerabilities, we will support you from the ground up in promoting vulnerability management so that you can ultimately operate independently and continuously. We will achieve a manageable, risk-based approach to vulnerability management. Please feel free to contact us if you have any requests. [Support Examples] ■ Learning how to use tools ■ Providing Japanese operation manuals ■ Discussing response policies for identified vulnerabilities *For more details, please download the PDF or contact us.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI Vulnerability Assessment "ImmuniWeb"

Detecting unknown threats! We prevent risks such as information leakage incidents caused by cyber attacks in advance.

"ImmuniWeb" is an AI vulnerability assessment service that can continuously detect new vulnerabilities through machine learning. For pages that cannot be handled by AI (such as shopping carts and contact pages), RPA rules are set to escalate them to security engineers. By accurately dividing the roles between AI and security specialists, we achieve overwhelmingly superior cost performance. 【Features】 ■ Covers various global security guidelines ■ Bulk diagnosis of web servers, SSL diagnosis, and trademark infringement diagnosis ■ Over 40,390,000 web server security test results ■ Over 42,560,000 server SSL/TLS configuration compliance test results ■ Over 915,100,000 domain brand test results *For more details, please refer to the PDF materials or feel free to contact us.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Tool "HTML Guardian"

Equipped with various features such as "code encryption" and "password protection"!

"HTML Guardian" is a tool designed to protect the content of websites. It offers a range of features aimed at protecting intellectual property on the web. It includes various functions such as "image protection" and "advanced batch encryption." Please feel free to contact us when needed. 【Main Features (Excerpt)】 ■ Code encryption ■ Image protection ■ Password protection ■ Protection from email spiders ■ Protection from hackers and cybercriminals ■ Protection from site rippers *For more details, please refer to the PDF materials or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other Software
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『Trellix Protect』

Smart protection with Trellix Protect, strong preparedness, and forward-looking security.

Trellix Protect is a security solution that combines Endpoint Protection (EPP) and Endpoint Detection and Response (EDR) capabilities. It is designed to protect organizations from sophisticated cyber threats using advanced AI and machine learning technologies. With Trellix Protect, you can secure your defenses intelligently, prepare robustly, and anticipate future threats. 【Key Features】 ■ Detects and blocks malware using an advanced AI engine. ■ Continuously monitors and analyzes endpoint behavior. ■ Implements multi-layered defenses against ransomware. ■ Utilizes cloud-based threat intelligence in real-time. ■ Predicts zero-day attacks using machine learning and defends in advance. ■ Automatically scans and identifies endpoint vulnerabilities. *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other Software
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service "Security Blanket Series"

Diagnosis can be performed at a fixed rate, regardless of the system scale or the number of screens on the site.

We offer a vulnerability assessment service called 'Security Blanket Series,' which includes manual diagnostics by specialized engineers and diagnostics using SaaS-based tools. By considering and executing various simulated attacks from the perspective of an attacker on your website, we support the operation of a safe and secure IT environment. In addition to vulnerability assessments, we also provide services such as source code reviews and penetration testing. Please feel free to contact us if you have any requests. 【Features】 - Since it is provided as a SaaS model, there is no need for customers to prepare new equipment or devices. - All diagnostics are completed via the internet. - Supports crawling and diagnostics of dynamic sites. - Manual diagnostics by specialized engineers can also be combined. - A dedicated management screen for customers allows for the confirmation of various diagnostic histories and detected vulnerabilities, among other features. *Please note that we do not accept inquiries by phone. *For more details, please download the PDF or feel free to contact us.

  • Company:M&K
  • Price:Other
  • Security Assessment
  • others
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

Enhance the security of the website and avoid risks.

Our company offers vulnerability assessment services conducted by skilled engineers who are also well-versed in web application development. We go beyond merely pointing out vulnerabilities and suggesting general countermeasures; we provide examples of vulnerability verification and propose countermeasures tailored to the characteristics of the target site. Additionally, our in-depth explanations, which incorporate insights from security consulting and current security trends, have received positive feedback, as they do not stop at merely reading the report or explaining vulnerabilities. 【Features】 ■ Presentation of specific verification examples and countermeasures ■ High customer satisfaction ■ Supervision by a leading expert in web security *For more details, please download the PDF or feel free to contact us.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Risk Analysis "V-sec"

We will visualize the current security measures and create a roadmap for future security measures from the perspective of priority and cost-effectiveness.

CYBERGYM's "V-Sec" analyzes the security status of organizations in accordance with various industry guidelines, in addition to being aimed at the general industry, and develops a roadmap for security measures. It also supports the specific selection, implementation, and operation of each measure. It can be effectively utilized not only for the initial security measures of your own company and for improving security but also for the security management of related companies and the supply chain. V-Sec is listed in the "IPA Information Security Service Standards Compliant Service List." Guidelines adhered to: <V-Sec STandard> for the general industry NIST SP800-171, ISO27001, ISO27002, guidelines for risk assessment against advanced cyber attacks, various guidelines such as the Personal Information Protection Law <V-Sec FActory> for factories Guidelines for cyber-physical security measures in factories, Jidokai/ Bukokai guidelines, etc. <V-Sec HOspital> Ministry of Health, Labour and Welfare guidelines on safety management of medical systems, version 6.0

  • Security Assessment
  • others
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

System support service

We provide total support from the construction of the infrastructure environment to operation and maintenance.

We offer various system support services. We provide systems tailored to our customers' needs, from requirements definition to design and development. Additionally, we offer services focused on proposals, requirements definition, design and construction, as well as server infrastructure setup and equipment kitting, all while keeping operations in mind. Furthermore, we provide total support services for systems, including project management for information systems departments, support for smooth system operations, and operational management of hardware and software. 【Services】 ■ Design ■ Construction ■ Service Desk ■ Operations *For more details, please download the PDF or feel free to contact us.

  • Other Software
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ministry of Economy, Trade and Industry Certified | Vulnerability Diagnosis Service and Testing Service [Fully Remote]

Enhancing web security with vulnerability assessments certified by the Ministry of Economy, Trade and Industry, regardless of industry or size.

Are you ignoring the "invisible risks" of web services? Don't just stop at "discovering" vulnerabilities. We provide actionable support all the way to remediation and improvement. ■ Do you have these concerns? - You think you are taking security measures, but you have never confirmed them from an external perspective. - You want to ensure the safety of your web services or internal systems before their release. - You are being asked by clients or business partners to submit a diagnostic report. - You want to effectively identify security risks within a limited budget. ■ What is ranryu's vulnerability assessment service? Ranryu Co., Ltd. is registered as a compliant business under the Ministry of Economy, Trade and Industry's "Information Security Service Standards." Our engineers, who hold CEH and Information Processing Security Support Specialist certifications, provide vulnerability assessments for web services and business systems. Our distinguishing feature is that we not only conduct assessments but also provide concrete countermeasure support for identified risks and can consistently assist in reviewing security policies. With a wealth of experience in system development and infrastructure construction, we offer technical advice and implementation support to ensure that diagnostic results are not left "as is." We support the strengthening of your security from a realistic perspective.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ministry of Economy, Trade and Industry Certified | Web Application Vulnerability Assessment Service

"Ministry of Economy, Trade and Industry registered services × Expert diagnosis × Ongoing support" Total support for visualizing, improving, and maintaining web application security.

Ranryu's "Web Application Vulnerability Diagnosis Service" is a highly reliable diagnostic service registered on the IPA public list as a service compliant with the Ministry of Economy, Trade and Industry's "Information Security Service Standards." Not limited to mere tool diagnostics, it combines manual diagnostics by security engineers to prevent false positives and oversights. Furthermore, after the diagnosis, it offers improvement proposals, reporting sessions, re-diagnosis, and continuous monitoring, providing effective and reassuring security measures. ■ Features and PR Points - Peace of mind from public certification: Registered service with the Ministry of Economy, Trade and Industry and IPA - Four flexible plans to choose from: Ranging from cost-focused to thorough diagnostics - Detailed reports leading to improvements: Evaluations based on OWASP and IPA standards, along with correction proposals - Site seal provision: Visualizes completed diagnostics to instill trust in clients and customers - Regular diagnostic packages: 2 to 4 diagnostics per year plus re-diagnosis to continuously improve security levels.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cybersecurity Vulnerability Assessment Service "Aegis EW"

Your homepage is being targeted! You can check the diagnosis results in your browser.

"Aegis EW" is a platform diagnostic SaaS application that allows for ASM diagnostics and vulnerability assessments without the need to install any tools. It enables management of all platform diagnostics through a dashboard with a common GUI. Using tools equivalent to those of hackers, it identifies attack surfaces and leaked information. 【Features】 ■ User-friendly GUI for the dashboard ■ Powerful ASM and vulnerability diagnostics ■ Centralized management of all platform diagnostics ■ Reasonably priced *For more details, please download the PDF or feel free to contact us.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Yutaka Integration Network Monitoring Service

We have a thorough system in place to ensure that our customers can use our services with peace of mind, protecting and monitoring their data.

We provide 24/7 monitoring and maintenance of network remote monitoring, as well as operational monitoring of rental servers (including security monitoring), to support the stable operation of our customers' business and network systems.

  • Other Software
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Monitoring-type diagnostic solution 'SCT SECURE SWAT'

Ideal for continuous vulnerability monitoring of web applications! Annual diagnostic service for monitored web applications.

"SCT SECURE SWAT" is a monitoring-type annual diagnostic service for web applications that thoroughly diagnoses using the characteristics of both automated and manual diagnostics. It balances the comprehensiveness of automated diagnostics with the flexibility of manual diagnostics. Frequent modifications and updates are automatically detected and diagnosed. Additionally, we also offer the "SCT SECURE Mobile App Diagnostic Service," a vulnerability diagnostic service for smartphone applications. 【Features of SCT SECURE SWAT】 ■ Thorough diagnosis of web applications utilizing the characteristics of both automated and manual diagnostics ■ Balances the comprehensiveness of automated diagnostics with the flexibility of manual diagnostics ■ Automatically detects and diagnoses frequent modifications and updates ■ Suitable for continuous vulnerability monitoring of critical web applications ■ Diagnostic results can be checked in real-time from a dedicated portal *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment
  • Other Software
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service "gSCAN"

A cloud-based service that can accommodate flexible schedules such as spot diagnoses and regular check-ups.

"gSCAN" is a cloud-based vulnerability assessment service that supports both Web SCAN and Network SCAN. It can accommodate flexible schedules such as spot assessments and regular assessments, and it is also capable of handling websites that require login authentication. We offer options for re-assessment after fixes and annual contracts. Additionally, on-site reporting sessions are available as an option. 【Features】 ■ Very affordable ■ Supports both Web SCAN and Network SCAN ■ Flexible scheduling for spot assessments and regular assessments ■ Capable of handling websites that require login authentication ■ Options for re-assessment after fixes and annual contracts available *For more details, please refer to the PDF materials or feel free to contact us.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security Management Solution "MCSGLOBAL"

Unified management of PCs worldwide on a common platform! Global information security management solution.

"MCSGLOBAL" is a management solution created to meet the needs of global security measures, not only within Japan but also including overseas locations. It allows for the management of control and operation log information for each leakage route on a common platform across countries, achieving comprehensive security measures. In addition to significantly reducing the management workload of information systems through asset management functions and remote support capabilities, it also enhances information security through device control functions. 【Features】 ■ Support for four languages: Japanese, English, Chinese, and Korean ■ Collects information from internal PCs to visualize security ■ Standardizes the security level of internal PCs ■ Monitors and controls unauthorized use of PCs *For more details, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Explained in Manga: Understandable! How to Protect Your Company's Device Integration App

Introducing the security solution product "CrackProof" that protects applications from unauthorized attacks in a manga format!

Recently, collaboration between apps and devices has been advancing in various fields. While there are many benefits, such as increased convenience for users, there are also security risks associated with distributing apps that connect to proprietary devices, such as the sale of tampered apps or the analysis of proprietary technology from the apps. This document explains the necessary security measures for apps that connect to proprietary devices in an easy-to-understand manga format. Please feel free to download and take a look. 【Recommended for the following individuals】 ■ Those considering developing apps that connect proprietary devices with smartphones or PCs ■ Those considering measures to prevent the leakage of proprietary technology from apps that operate proprietary devices ■ Those considering developing apps for operating and maintaining proprietary devices ■ Those who want to prevent unauthorized changes to the settings of proprietary devices through apps *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web application vulnerability assessment tool 'Vex'

More advanced, more convenient! Products of professional quality recognized by security experts.

"Vulnerability EXplorer (Vex)" is a web application vulnerability scanning tool that continues to evolve while having a track record of diagnostics across thousands of sites. It has gained a reputation for its high accuracy in vulnerability assessments, starting with its adoption by financial institutions that require robust security. Its high detection capability is due to features such as "provision of inspection signatures" and "highly flexible scenario creation," allowing for meticulous configuration that enables high-quality inspections. [Features] ■ Powerful scenario creation support ■ Comprehensive inspection functions ■ Abundant vulnerability inspection items ■ Support for the latest vulnerabilities ■ Regular addition of new features *For more details, please refer to the PDF materials or feel free to contact us.

  • Firewall
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Webアプリケーション脆弱性自動検査ツール『Vex Cloud』

機械学習やJavaScript動的解析などの技術により、高い巡回・診断性能を実現!

『Vex Cloud』は、検査用のシナリオ(疑似攻撃リクエスト)も自動生成 でき、設定や操作も簡単なWebアプリケーション脆弱性自動検査ツールです。 開発者様やサイト運用担当者様の「気軽に脆弱性診断を行いたい」 「開発工程にあわせて随時検査したい」といったニーズにお応え。 また、お客様の保有するWebサイトを自動巡回し、すべてのWebサイトを リストアップ、それらをWebサイト単位で管理します。 【特長】 ■自動クローラーで面倒なシナリオ作成が不要 ■ログイン認証が必要なサイトも問題なし ■SPA(Single Page Application)にも対応 ※詳しくはPDF資料をご覧いただくか、お気軽にお問い合わせ下さい。

  • Firewall
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

OSS Management Solution "WhiteSource"

Timely provision of OSS vulnerability information! You can maintain the security level of your system.

"WhiteSource" is an OSS security and compliance management solution that automatically identifies and points out risks and issues by database-ing OSS information from around the world and matching it. Software developers can easily utilize appropriate and suitable OSS, contributing to increased development productivity. Additionally, business owners can proactively avoid troubles caused by license violations and vulnerabilities. 【Features】 ■ Accurate database and matching ■ Support for diverse programming environments ■ Integrated support for many tools and system environments ■ Suitable for continuous operation. Ongoing monitoring and reporting after release ■ Cross-team support. Fully covers the system development lifecycle, etc. *For more details, please download the PDF or feel free to contact us.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration