Vulnerability Assessment Service Product List and Ranking from 36 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Oct 08, 2025~Nov 04, 2025
This ranking is based on the number of page views on our site.

Vulnerability Assessment Service Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Oct 08, 2025~Nov 04, 2025
This ranking is based on the number of page views on our site.

  1. レイ・イージス・ジャパン Tokyo//Information and Communications
  2. M&K Tokyo//Information and Communications
  3. スプライン・ネットワーク Tokyo//others
  4. 4 バルク Tokyo//Information and Communications
  5. 4 ranryu Tokyo//Information and Communications

Vulnerability Assessment Service Product ranking

Last Updated: Aggregation Period:Oct 08, 2025~Nov 04, 2025
This ranking is based on the number of page views on our site.

  1. Vulnerability Assessment Service "Security Blanket Series" M&K
  2. Ministry of Economy, Trade and Industry Certified | Web Application Vulnerability Assessment Service ranryu
  3. WiSAS Vulnerability Assessment スプライン・ネットワーク
  4. Mobile App Diagnosis Essential Edition サイファー・テック
  5. 4 Automated Vulnerability Diagnosis Service "SCT SECURE Cloud Scan" 三和コムテック

Vulnerability Assessment Service Product List

1~15 item / All 62 items

Displayed results

Mobile App Diagnosis Essential Edition

Achieve low-cost vulnerability assessment for mobile apps! A vulnerability assessment service that you must have.

Based on our track record of over 1,600 mobile app assessments, we will pick up the essential items that mobile apps should care for and conduct an evaluation. In addition to using our proprietary automated diagnostic tool, experienced security engineers will manually verify particularly important functions to assess preparedness against common vulnerabilities. By narrowing down the target items, we can provide assessments in a short period at a reasonable and clear fixed fee.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Automated Vulnerability Diagnosis Service "SCT SECURE Cloud Scan"

Always diagnose based on new vulnerability information! Introduction to the cloud-based automatic annual vulnerability diagnosis service.

"SCT SECURE Cloud Scan" is a cloud-based security service that regularly diagnoses whether there are vulnerabilities that could serve as footholds for cyber attacks, based on new security information. With this product, sites diagnosed as having no vulnerabilities and secure websites are issued a safety certification mark. Additionally, we offer a manual diagnostic service called "SCT SECURE Manual Web Application Diagnosis" to complement the cloud-based automated vulnerability diagnosis. 【Features of SCT SECURE Cloud Scan】 ■ Promote security strength with a date-stamped safety certification mark ■ Diagnosis based on always updated vulnerability information ■ Diagnostic tool with PCI DSS ASV qualification ■ User-friendly management console and support for various report outputs *For more details, please refer to the PDF materials or feel free to contact us.

  • Security Assessment
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment | Security Check for Servers and Web

Before becoming the perpetrator from the victim...

At Net Assist, we offer security vulnerability assessments. - A considerable amount of time has passed since it was built. - I can't find the handover documents from my predecessor. - My boss has repeatedly asked, "Our server is okay, right?" We recommend this for those in charge.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] How to Protect Data in Microsoft 365

Five reasons why the standard features of Microsoft 365 are not enough!

This document introduces the data protection methods for Microsoft 365 by Arcserve. It includes five reasons why the standard features of Microsoft 365 are insufficient, as well as the protection of Microsoft 365 using Arcserve UDP/UDP Appliance. We encourage you to read it. [Contents] ■ Five reasons why the standard features of Microsoft 365 are insufficient ■ Data protection methods for Microsoft 365 by Arcserve ■ Protection of Microsoft 365 using Arcserve UDP/UDP Appliance ■ Protection of Microsoft 365 using Arcserve UDP Cloud Hybrid ■ Long-term storage of emails using Arcserve Email Archiving/Arcserve Email Archiving Cloud *For more details, please refer to the PDF document or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Ikeda Mohando Co., Ltd.

Introducing a case where robust data protection management has become possible alongside core business operations!

We would like to introduce a case study of "Arcserve Backup / Arcserve Replication" implemented at Ikeda Mohando Co., Ltd. Until now, the company operated its information systems on a branch-by-branch basis, storing important business data using NAS, but gradually began to suffer from hardware failures. Therefore, they introduced our product. As a result, the two-tiered data protection operation eliminated the risk of data loss, allowing users at each branch to focus on their own work without concerns about data storage. [Case Study] - Industry: Pharmaceuticals - Company Name: Ikeda Mohando Co., Ltd. - Challenge: Faced significant barriers with business data *For more details, please refer to the PDF document or feel free to contact us.

  • Data Backup

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI Vulnerability Diagnosis Service "V-threat"

Achieving an unprecedentedly superior cost performance! The diagnostic speed is also overwhelmingly fast, and the price is overwhelmingly low.

"V-threat" is a third-generation AI & HUMAN vulnerability assessment that can continuously detect advanced vulnerabilities through AI machine learning, enabling a much more accurate vulnerability diagnosis through a hybrid of AI and engineers. This service provides a comprehensive assessment of web applications, web servers, APIs, and SSL, delivering inspection results quickly and at a low cost. [Features] ■ Comprehensive assessment not only for web applications but also for web servers & SSL ■ Diagnosis of mobile applications is also overwhelmingly fast and inexpensive. ■ World-class high quality and proven track record *For more details, please download the PDF or feel free to contact us.

  • Company:バルク
  • Price:1 million yen-5 million yen
  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Risk Analysis "V-sec"

Security risk analysis 'V-sec' for implementing cost-effective cybersecurity measures!

"V-sec" is a service that has received approval from the Ministry of Economy, Trade and Industry's "Information Security Audit Service Standards Compliance Service" and is listed in the IPA's Information Security Service Standards Compliance List. From the perspective of four safety management measures (human, organizational, physical, and technical) and multi-layered defense, it visualizes the company's security level and the vulnerabilities it faces, aiming to create a shared understanding between management and the field. This helps prevent unnecessary investments and establishes appropriate security investment indicators. It is the optimal solution for customers such as: ▶ Those who do not know where to start with security measures. ▶ Those who want to know the priority of measures that should be implemented in their company. ▶ Those who seek effectiveness even with the minimum necessary security measures. ▶ Those who are unsure if their current measures are adequate. ▶ Those who are working on it themselves but want a third-party evaluation. *For more details, please download the PDF or feel free to contact us.

  • Company:バルク
  • Price:500,000 yen-1 million yen
  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Corporate Information Monitoring 'Discovery'

Already available password lists and leaked information on the dark web can be investigated!

Corporate information monitoring "Discovery" is a service that investigates and monitors whether hackers can collect information that targets your company for cyber attacks. Utilizing award-winning OSINT and AI technology, it investigates and monitors external attack surfaces. It continuously detects, tests, and scores digital and IT assets, enhancing visibility by proactively monitoring mentions of the company on the dark web and code repositories. 【Features】 ■ Easy to start ■ Information gathering from a hacker's perspective ■ Investigation of information leaks is also possible *For more details, please download the PDF or feel free to contact us.

  • Security Assessment
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Dark web exploration service

Investigating the risk of information leakage! Services provided by one of the world's largest groups of white hat hackers.

Our "Dark Web Exploration Service" is a one-stop service that enables early detection of any potential information leaks concerning our clients, thereby strengthening cybersecurity. Our company, which boasts over 320 white-hat hackers, one of the largest groups in the world, conducts investigations on the dark web based on specified keywords to identify the potential risks to our clients' information. Through our customized reports, clients can verify the risks associated with their information. [Service Coverage] ■ Information leaks and information breaches *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Fast Penetration Test

Devices facing the internet, such as firewalls and mail servers!

Our "Fast Penetration Test" utilizes not only commonly used tools but also our proprietary AI tools. It detects advanced attacks such as business logic flaws, DoS, and zero-day attacks. We also attempt attacks that mimic actual hacker techniques and combine multiple vulnerabilities. Thanks to this advanced technology and unique tools, we can conduct tests in a short period and discover vulnerabilities that are generally difficult to find. 【Pricing Features】 ■ Course-based pricing - A tiered pricing structure is set to ensure that smaller systems are more affordable. ■ Fixed pricing - Regardless of the number of pages or requests, we offer a fixed pricing model per "IP address/FQDN/application" to meet our customers' needs. *For more details, please refer to the PDF materials or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

Vulnerability assessment service using cloud service infrastructure!

Our company offers a "Vulnerability Assessment Service" to verify whether information systems such as network devices, servers, and client terminals are truly secure. As a general principle, we conduct information exchanges with customers using a reliable cloud service infrastructure (within the scope of ISMS Cloud Security Certification Registration), ensuring a high level of security for data related to the assessment. Please feel free to contact us if you have any requests. [Examples of Threats and Vulnerabilities] ■ Database leaks ■ Password leaks ■ Unauthorized information manipulation ■ Website tampering ■ Service interruptions, etc. *For more details, please download the PDF or contact us.

  • Company:i-3c
  • Price:Other
  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability assessment service

We will continue to strive to reduce even one security incident caused by vulnerabilities in this world.

We provide vulnerability assessment services to proactively prevent the risks of cyber attacks and information leaks, and to strengthen security. Even if you have little expertise in vulnerabilities, we will support you from the ground up in promoting vulnerability management so that you can ultimately operate independently and continuously. We will achieve a manageable, risk-based approach to vulnerability management. Please feel free to contact us if you have any requests. [Support Examples] ■ Learning how to use tools ■ Providing Japanese operation manuals ■ Discussing response policies for identified vulnerabilities *For more details, please download the PDF or contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI Vulnerability Assessment "ImmuniWeb"

Detecting unknown threats! We prevent risks such as information leakage incidents caused by cyber attacks in advance.

"ImmuniWeb" is an AI vulnerability assessment service that can continuously detect new vulnerabilities through machine learning. For pages that cannot be handled by AI (such as shopping carts and contact pages), RPA rules are set to escalate them to security engineers. By accurately dividing the roles between AI and security specialists, we achieve overwhelmingly superior cost performance. 【Features】 ■ Covers various global security guidelines ■ Bulk diagnosis of web servers, SSL diagnosis, and trademark infringement diagnosis ■ Over 40,390,000 web server security test results ■ Over 42,560,000 server SSL/TLS configuration compliance test results ■ Over 915,100,000 domain brand test results *For more details, please refer to the PDF materials or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Tool "HTML Guardian"

Equipped with various features such as "code encryption" and "password protection"!

"HTML Guardian" is a tool designed to protect the content of websites. It offers a range of features aimed at protecting intellectual property on the web. It includes various functions such as "image protection" and "advanced batch encryption." Please feel free to contact us when needed. 【Main Features (Excerpt)】 ■ Code encryption ■ Image protection ■ Password protection ■ Protection from email spiders ■ Protection from hackers and cybercriminals ■ Protection from site rippers *For more details, please refer to the PDF materials or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『Trellix Protect』

Smart protection with Trellix Protect, strong preparedness, and forward-looking security.

Trellix Protect is a security solution that combines Endpoint Protection (EPP) and Endpoint Detection and Response (EDR) capabilities. It is designed to protect organizations from sophisticated cyber threats using advanced AI and machine learning technologies. With Trellix Protect, you can secure your defenses intelligently, prepare robustly, and anticipate future threats. 【Key Features】 ■ Detects and blocks malware using an advanced AI engine. ■ Continuously monitors and analyzes endpoint behavior. ■ Implements multi-layered defenses against ransomware. ■ Utilizes cloud-based threat intelligence in real-time. ■ Predicts zero-day attacks using machine learning and defends in advance. ■ Automatically scans and identifies endpoint vulnerabilities. *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration