Vulnerability Assessment Service Product List and Ranking from 35 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Aug 20, 2025~Sep 16, 2025
This ranking is based on the number of page views on our site.

Vulnerability Assessment Service Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Aug 20, 2025~Sep 16, 2025
This ranking is based on the number of page views on our site.

  1. ranryu Tokyo//Information and Communications
  2. B7 Tokyo//Information and Communications
  3. アイ・エフ・ティ Tokyo//Information and Communications
  4. 未来研究所 Kanagawa//Service Industry
  5. サイファー・テック Tokyo//others

Vulnerability Assessment Service Product ranking

Last Updated: Aggregation Period:Aug 20, 2025~Sep 16, 2025
This ranking is based on the number of page views on our site.

  1. Ministry of Economy, Trade and Industry Certified | Vulnerability Diagnosis Service and Testing Service [Fully Remote] ranryu
  2. 『Trellix Protect』 B7
  3. Ministry of Economy, Trade and Industry Certified | Web Application Vulnerability Assessment Service ranryu
  4. Cybersecurity Vulnerability Assessment Service "Aegis EW" 未来研究所
  5. 4 Platform Vulnerability Assessment Service アイ・エフ・ティ

Vulnerability Assessment Service Product List

1~15 item / All 60 items

Displayed results

Automated Vulnerability Diagnosis Service "SCT SECURE Cloud Scan"

Always diagnose based on new vulnerability information! Introduction to the cloud-based automatic annual vulnerability diagnosis service.

"SCT SECURE Cloud Scan" is a cloud-based security service that regularly diagnoses whether there are vulnerabilities that could serve as footholds for cyber attacks, based on new security information. With this product, sites diagnosed as having no vulnerabilities and secure websites are issued a safety certification mark. Additionally, we offer a manual diagnostic service called "SCT SECURE Manual Web Application Diagnosis" to complement the cloud-based automated vulnerability diagnosis. 【Features of SCT SECURE Cloud Scan】 ■ Promote security strength with a date-stamped safety certification mark ■ Diagnosis based on always updated vulnerability information ■ Diagnostic tool with PCI DSS ASV qualification ■ User-friendly management console and support for various report outputs *For more details, please refer to the PDF materials or feel free to contact us.

  • Security Assessment
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] How to Protect Data in Microsoft 365

Five reasons why the standard features of Microsoft 365 are not enough!

This document introduces the data protection methods for Microsoft 365 by Arcserve. It includes five reasons why the standard features of Microsoft 365 are insufficient, as well as the protection of Microsoft 365 using Arcserve UDP/UDP Appliance. We encourage you to read it. [Contents] ■ Five reasons why the standard features of Microsoft 365 are insufficient ■ Data protection methods for Microsoft 365 by Arcserve ■ Protection of Microsoft 365 using Arcserve UDP/UDP Appliance ■ Protection of Microsoft 365 using Arcserve UDP Cloud Hybrid ■ Long-term storage of emails using Arcserve Email Archiving/Arcserve Email Archiving Cloud *For more details, please refer to the PDF document or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Ikeda Mohando Co., Ltd.

Introducing a case where robust data protection management has become possible alongside core business operations!

We would like to introduce a case study of "Arcserve Backup / Arcserve Replication" implemented at Ikeda Mohando Co., Ltd. Until now, the company operated its information systems on a branch-by-branch basis, storing important business data using NAS, but gradually began to suffer from hardware failures. Therefore, they introduced our product. As a result, the two-tiered data protection operation eliminated the risk of data loss, allowing users at each branch to focus on their own work without concerns about data storage. [Case Study] - Industry: Pharmaceuticals - Company Name: Ikeda Mohando Co., Ltd. - Challenge: Faced significant barriers with business data *For more details, please refer to the PDF document or feel free to contact us.

  • Data Backup

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI Vulnerability Diagnosis Service "V-threat"

Achieving an unprecedentedly superior cost performance! The diagnostic speed is also overwhelmingly fast, and the price is overwhelmingly low.

"V-threat" is a third-generation AI & HUMAN vulnerability assessment that can continuously detect advanced vulnerabilities through AI machine learning, enabling a much more accurate vulnerability diagnosis through a hybrid of AI and engineers. This service provides a comprehensive assessment of web applications, web servers, APIs, and SSL, delivering inspection results quickly and at a low cost. [Features] ■ Comprehensive assessment not only for web applications but also for web servers & SSL ■ Diagnosis of mobile applications is also overwhelmingly fast and inexpensive. ■ World-class high quality and proven track record *For more details, please download the PDF or feel free to contact us.

  • Company:バルク
  • Price:1 million yen-5 million yen
  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Risk Analysis "V-sec"

Security risk analysis 'V-sec' for implementing cost-effective cybersecurity measures!

"V-sec" is a service that has received approval from the Ministry of Economy, Trade and Industry's "Information Security Audit Service Standards Compliance Service" and is listed in the IPA's Information Security Service Standards Compliance List. From the perspective of four safety management measures (human, organizational, physical, and technical) and multi-layered defense, it visualizes the company's security level and the vulnerabilities it faces, aiming to create a shared understanding between management and the field. This helps prevent unnecessary investments and establishes appropriate security investment indicators. It is the optimal solution for customers such as: ▶ Those who do not know where to start with security measures. ▶ Those who want to know the priority of measures that should be implemented in their company. ▶ Those who seek effectiveness even with the minimum necessary security measures. ▶ Those who are unsure if their current measures are adequate. ▶ Those who are working on it themselves but want a third-party evaluation. *For more details, please download the PDF or feel free to contact us.

  • Company:バルク
  • Price:500,000 yen-1 million yen
  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Corporate Information Monitoring 'Discovery'

Already available password lists and leaked information on the dark web can be investigated!

Corporate information monitoring "Discovery" is a service that investigates and monitors whether hackers can collect information that targets your company for cyber attacks. Utilizing award-winning OSINT and AI technology, it investigates and monitors external attack surfaces. It continuously detects, tests, and scores digital and IT assets, enhancing visibility by proactively monitoring mentions of the company on the dark web and code repositories. 【Features】 ■ Easy to start ■ Information gathering from a hacker's perspective ■ Investigation of information leaks is also possible *For more details, please download the PDF or feel free to contact us.

  • Security Assessment
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

High-speed, high-quality vulnerability assessment using AI tools!

We utilize RayAegis' unique AI tools to provide vulnerability assessments conducted by over 250 advanced security engineers worldwide. With our AI × Security approach, which we have practiced since our founding, we can offer comprehensive diagnostic services that maintain quality in a short period, even for the increasing number of systems each year. Please feel free to contact us if you have any requests. 【Features】 ■ A package pricing system based on FQDN units that becomes more cost-effective as the environment scales ■ No need for preliminary narrowing down of diagnostic targets when making a request ■ The information we need to gather in advance is very simple ■ Short duration and high quality *For more details, please download the PDF or contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

Vulnerability assessment service using cloud service infrastructure!

Our company offers a "Vulnerability Assessment Service" to verify whether information systems such as network devices, servers, and client terminals are truly secure. As a general principle, we conduct information exchanges with customers using a reliable cloud service infrastructure (within the scope of ISMS Cloud Security Certification Registration), ensuring a high level of security for data related to the assessment. Please feel free to contact us if you have any requests. [Examples of Threats and Vulnerabilities] ■ Database leaks ■ Password leaks ■ Unauthorized information manipulation ■ Website tampering ■ Service interruptions, etc. *For more details, please download the PDF or contact us.

  • Company:i-3c
  • Price:Other
  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability assessment service

We will continue to strive to reduce even one security incident caused by vulnerabilities in this world.

We provide vulnerability assessment services to proactively prevent the risks of cyber attacks and information leaks, and to strengthen security. Even if you have little expertise in vulnerabilities, we will support you from the ground up in promoting vulnerability management so that you can ultimately operate independently and continuously. We will achieve a manageable, risk-based approach to vulnerability management. Please feel free to contact us if you have any requests. [Support Examples] ■ Learning how to use tools ■ Providing Japanese operation manuals ■ Discussing response policies for identified vulnerabilities *For more details, please download the PDF or contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI Vulnerability Assessment "ImmuniWeb"

Detecting unknown threats! We prevent risks such as information leakage incidents caused by cyber attacks in advance.

"ImmuniWeb" is an AI vulnerability assessment service that can continuously detect new vulnerabilities through machine learning. For pages that cannot be handled by AI (such as shopping carts and contact pages), RPA rules are set to escalate them to security engineers. By accurately dividing the roles between AI and security specialists, we achieve overwhelmingly superior cost performance. 【Features】 ■ Covers various global security guidelines ■ Bulk diagnosis of web servers, SSL diagnosis, and trademark infringement diagnosis ■ Over 40,390,000 web server security test results ■ Over 42,560,000 server SSL/TLS configuration compliance test results ■ Over 915,100,000 domain brand test results *For more details, please refer to the PDF materials or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Tool "HTML Guardian"

Equipped with various features such as "code encryption" and "password protection"!

"HTML Guardian" is a tool designed to protect the content of websites. It offers a range of features aimed at protecting intellectual property on the web. It includes various functions such as "image protection" and "advanced batch encryption." Please feel free to contact us when needed. 【Main Features (Excerpt)】 ■ Code encryption ■ Image protection ■ Password protection ■ Protection from email spiders ■ Protection from hackers and cybercriminals ■ Protection from site rippers *For more details, please refer to the PDF materials or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service "Security Blanket Series"

Diagnosis can be performed at a fixed rate, regardless of the system scale or the number of screens on the site.

We offer a vulnerability assessment service called 'Security Blanket Series,' which includes manual diagnostics by specialized engineers and diagnostics using SaaS-based tools. By considering and executing various simulated attacks from the perspective of an attacker on your website, we support the operation of a safe and secure IT environment. In addition to vulnerability assessments, we also provide services such as source code reviews and penetration testing. Please feel free to contact us if you have any requests. 【Features】 - Since it is provided as a SaaS model, there is no need for customers to prepare new equipment or devices. - All diagnostics are completed via the internet. - Supports crawling and diagnostics of dynamic sites. - Manual diagnostics by specialized engineers can also be combined. - A dedicated management screen for customers allows for the confirmation of various diagnostic histories and detected vulnerabilities, among other features. *Please note that we do not accept inquiries by phone. *For more details, please download the PDF or feel free to contact us.

  • Company:M&K
  • Price:Other
  • Security Assessment
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

Enhance the security of the website and avoid risks.

Our company offers vulnerability assessment services conducted by skilled engineers who are also well-versed in web application development. We go beyond merely pointing out vulnerabilities and suggesting general countermeasures; we provide examples of vulnerability verification and propose countermeasures tailored to the characteristics of the target site. Additionally, our in-depth explanations, which incorporate insights from security consulting and current security trends, have received positive feedback, as they do not stop at merely reading the report or explaining vulnerabilities. 【Features】 ■ Presentation of specific verification examples and countermeasures ■ High customer satisfaction ■ Supervision by a leading expert in web security *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Risk Analysis "V-sec"

We will visualize the current security measures and create a roadmap for future security measures from the perspective of priority and cost-effectiveness.

CYBERGYM's "V-Sec" analyzes the security status of organizations in accordance with various industry guidelines, in addition to being aimed at the general industry, and develops a roadmap for security measures. It also supports the specific selection, implementation, and operation of each measure. It can be effectively utilized not only for the initial security measures of your own company and for improving security but also for the security management of related companies and the supply chain. V-Sec is listed in the "IPA Information Security Service Standards Compliant Service List." Guidelines adhered to: <V-Sec STandard> for the general industry NIST SP800-171, ISO27001, ISO27002, guidelines for risk assessment against advanced cyber attacks, various guidelines such as the Personal Information Protection Law <V-Sec FActory> for factories Guidelines for cyber-physical security measures in factories, Jidokai/ Bukokai guidelines, etc. <V-Sec HOspital> Ministry of Health, Labour and Welfare guidelines on safety management of medical systems, version 6.0

  • Security Assessment
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Smartphone application vulnerability assessment service

We are conducting static diagnostics using diagnosable source code.

We offer vulnerability assessments for smartphone applications. We check for issues in the code within iOS/Android smartphone applications, whether unauthorized communication occurs, and the risk of content tampering. Please feel free to contact us if you have any requests. 【Assessment Items】 ■Common inspections for Android/iOS apps ■Inspections specific to Android apps ■Inspections specific to iOS apps ■Inspections related to communication with APIs *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration