Vulnerability Assessment Service Product List and Ranking from 35 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Aug 20, 2025~Sep 16, 2025
This ranking is based on the number of page views on our site.

Vulnerability Assessment Service Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Aug 20, 2025~Sep 16, 2025
This ranking is based on the number of page views on our site.

  1. ranryu Tokyo//Information and Communications
  2. B7 Tokyo//Information and Communications
  3. アイ・エフ・ティ Tokyo//Information and Communications
  4. 未来研究所 Kanagawa//Service Industry
  5. サイファー・テック Tokyo//others

Vulnerability Assessment Service Product ranking

Last Updated: Aggregation Period:Aug 20, 2025~Sep 16, 2025
This ranking is based on the number of page views on our site.

  1. Ministry of Economy, Trade and Industry Certified | Vulnerability Diagnosis Service and Testing Service [Fully Remote] ranryu
  2. 『Trellix Protect』 B7
  3. Ministry of Economy, Trade and Industry Certified | Web Application Vulnerability Assessment Service ranryu
  4. Cybersecurity Vulnerability Assessment Service "Aegis EW" 未来研究所
  5. 4 Platform Vulnerability Assessment Service アイ・エフ・ティ

Vulnerability Assessment Service Product List

16~30 item / All 60 items

Displayed results

WiSAS Vulnerability Assessment

We provide visualization and optimization support for comfortable use of Wi-Fi environments, as well as prevention of information leaks due to unauthorized use and cyber attacks.

By acquiring the radio waves of the wireless network (Wi-Fi) and analyzing them from six security perspectives, we visualize the vulnerabilities and issues lurking in the Wi-Fi environment, preventing threats before they occur. Additionally, it is also possible to eliminate threats using location information analysis (optional). You can understand the dangerous use of Wi-Fi that directly leads to information leakage. By installing WiSAS sensors in the target area and visualizing the Wi-Fi usage, we conduct investigations and analyses from a security standpoint.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

E-book protection (viewing restrictions, copy prevention) solution

Building and providing eBook sales and subscription services! Protect eBooks with access restrictions and copy prevention.

We want to protect Japanese information with Japanese technology. Driven by this desire, our company has been engaged in product development and continues to provide the uniquely developed DRM solution 'CypherGuard.' 'CypherGuard' protects e-books and prevents unauthorized use by restricting viewers and viewing periods through its "license management function" and by preventing screen duplication such as capture actions. In the business sector, it is used by customers in manufacturing, infrastructure, and government agencies. 【Features】 ■ Protects digital content by restricting viewers and viewing periods and preventing screen duplication such as capture actions through the license management function. ■ Allows the setting of distribution rules such as dates and the number of devices. ■ Provides services tailored to the sales format of books (purchase, unlimited reading) and the implementation environment (user management, license authentication server). *For more details, please refer to the PDF document or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Yutaka Integration Network Monitoring Service

We have a thorough system in place to ensure that our customers can use our services with peace of mind, protecting and monitoring their data.

We provide 24/7 monitoring and maintenance of network remote monitoring, as well as operational monitoring of rental servers (including security monitoring), to support the stable operation of our customers' business and network systems.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Monitoring-type diagnostic solution 'SCT SECURE SWAT'

Ideal for continuous vulnerability monitoring of web applications! Annual diagnostic service for monitored web applications.

"SCT SECURE SWAT" is a monitoring-type annual diagnostic service for web applications that thoroughly diagnoses using the characteristics of both automated and manual diagnostics. It balances the comprehensiveness of automated diagnostics with the flexibility of manual diagnostics. Frequent modifications and updates are automatically detected and diagnosed. Additionally, we also offer the "SCT SECURE Mobile App Diagnostic Service," a vulnerability diagnostic service for smartphone applications. 【Features of SCT SECURE SWAT】 ■ Thorough diagnosis of web applications utilizing the characteristics of both automated and manual diagnostics ■ Balances the comprehensiveness of automated diagnostics with the flexibility of manual diagnostics ■ Automatically detects and diagnoses frequent modifications and updates ■ Suitable for continuous vulnerability monitoring of critical web applications ■ Diagnostic results can be checked in real-time from a dedicated portal *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service "gSCAN"

A cloud-based service that can accommodate flexible schedules such as spot diagnoses and regular check-ups.

"gSCAN" is a cloud-based vulnerability assessment service that supports both Web SCAN and Network SCAN. It can accommodate flexible schedules such as spot assessments and regular assessments, and it is also capable of handling websites that require login authentication. We offer options for re-assessment after fixes and annual contracts. Additionally, on-site reporting sessions are available as an option. 【Features】 ■ Very affordable ■ Supports both Web SCAN and Network SCAN ■ Flexible scheduling for spot assessments and regular assessments ■ Capable of handling websites that require login authentication ■ Options for re-assessment after fixes and annual contracts available *For more details, please refer to the PDF materials or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security Management Solution "MCSGLOBAL"

Unified management of PCs worldwide on a common platform! Global information security management solution.

"MCSGLOBAL" is a management solution created to meet the needs of global security measures, not only within Japan but also including overseas locations. It allows for the management of control and operation log information for each leakage route on a common platform across countries, achieving comprehensive security measures. In addition to significantly reducing the management workload of information systems through asset management functions and remote support capabilities, it also enhances information security through device control functions. 【Features】 ■ Support for four languages: Japanese, English, Chinese, and Korean ■ Collects information from internal PCs to visualize security ■ Standardizes the security level of internal PCs ■ Monitors and controls unauthorized use of PCs *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software
  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Explained in Manga: Understandable! How to Protect Your Company's Device Integration App

Introducing the security solution product "CrackProof" that protects applications from unauthorized attacks in a manga format!

Recently, collaboration between apps and devices has been advancing in various fields. While there are many benefits, such as increased convenience for users, there are also security risks associated with distributing apps that connect to proprietary devices, such as the sale of tampered apps or the analysis of proprietary technology from the apps. This document explains the necessary security measures for apps that connect to proprietary devices in an easy-to-understand manga format. Please feel free to download and take a look. 【Recommended for the following individuals】 ■ Those considering developing apps that connect proprietary devices with smartphones or PCs ■ Those considering measures to prevent the leakage of proprietary technology from apps that operate proprietary devices ■ Those considering developing apps for operating and maintaining proprietary devices ■ Those who want to prevent unauthorized changes to the settings of proprietary devices through apps *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web application vulnerability assessment tool 'Vex'

More advanced, more convenient! Products of professional quality recognized by security experts.

"Vulnerability EXplorer (Vex)" is a web application vulnerability scanning tool that continues to evolve while having a track record of diagnostics across thousands of sites. It has gained a reputation for its high accuracy in vulnerability assessments, starting with its adoption by financial institutions that require robust security. Its high detection capability is due to features such as "provision of inspection signatures" and "highly flexible scenario creation," allowing for meticulous configuration that enables high-quality inspections. [Features] ■ Powerful scenario creation support ■ Comprehensive inspection functions ■ Abundant vulnerability inspection items ■ Support for the latest vulnerabilities ■ Regular addition of new features *For more details, please refer to the PDF materials or feel free to contact us.

  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Webアプリケーション脆弱性自動検査ツール『Vex Cloud』

機械学習やJavaScript動的解析などの技術により、高い巡回・診断性能を実現!

『Vex Cloud』は、検査用のシナリオ(疑似攻撃リクエスト)も自動生成 でき、設定や操作も簡単なWebアプリケーション脆弱性自動検査ツールです。 開発者様やサイト運用担当者様の「気軽に脆弱性診断を行いたい」 「開発工程にあわせて随時検査したい」といったニーズにお応え。 また、お客様の保有するWebサイトを自動巡回し、すべてのWebサイトを リストアップ、それらをWebサイト単位で管理します。 【特長】 ■自動クローラーで面倒なシナリオ作成が不要 ■ログイン認証が必要なサイトも問題なし ■SPA(Single Page Application)にも対応 ※詳しくはPDF資料をご覧いただくか、お気軽にお問い合わせ下さい。

  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

OSS Management Solution "WhiteSource"

Timely provision of OSS vulnerability information! You can maintain the security level of your system.

"WhiteSource" is an OSS security and compliance management solution that automatically identifies and points out risks and issues by database-ing OSS information from around the world and matching it. Software developers can easily utilize appropriate and suitable OSS, contributing to increased development productivity. Additionally, business owners can proactively avoid troubles caused by license violations and vulnerabilities. 【Features】 ■ Accurate database and matching ■ Support for diverse programming environments ■ Integrated support for many tools and system environments ■ Suitable for continuous operation. Ongoing monitoring and reporting after release ■ Cross-team support. Fully covers the system development lifecycle, etc. *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Decarbonization: Risk Analysis of CO2 Leakage

Important for evaluating safety! Analysis of the risk of CO2 leakage to the ground.

The risk analysis of CO2 leakage to the surface during and after CO2 injection is important for evaluating safety. It is necessary to examine the presence of faults and abandoned wells, as well as the appropriate injection pressure, and to conduct simulations that consider the impact not only on the reservoir but also on the cap rock. By coupling rock mechanics models with reservoir simulators, it is possible to perform calculations that take into account the effects of pressure changes on the geomechanical properties of the reservoir. For example, in GEM, a modified Barton-Bandis model is applied to simulate the opening and closing of fractures and calculate CO2 leakage from the cap rock. Our company is primarily investigating and examining the following items, focusing on calculations using the reservoir simulator GEM and literature research. [Investigation and Examination Items] ■ Examination of the workflow for creating simulation input data from experimental, analytical, and literature data. ■ Examination of the workflow for CO2 leakage risk analysis that reflects the uncertainty analysis of input data. ■ Investigation of the workflow for CO2 leakage calculations in various reservoir simulators. *For more details, please feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security solutions various vulnerability assessment services

Leave all kinds of vulnerability assessments to us.

We offer three types of security solutions: network vulnerability assessments, web application vulnerability assessments, and source code assessments. Our technicians have been involved in vulnerability assessments for over a decade since the early days of such services in Japan. We have conducted assessments for more than 800 sites in total, which we take pride in as being among the top level in the country. Additionally, any threats discovered, the assessment of their significance, and recommended countermeasures will be clearly reported by our experienced engineers in a straightforward manner. [Features] ■ Assessments conducted by experienced security professionals ■ We take pride in the high quality of our assessment reports *For more details, please feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security risk analysis service

The risk analysis results are clearer with our original four-level evaluation method!

Our risk analysis support flexibly assists clients who wish to conduct their own analyses. By performing an analysis, it becomes possible to make efficient security investments. Additionally, the standard analysis methods published by the Information-technology Promotion Agency (IPA) come with a guidebook that is 380 pages long, making it recommended for those who want to get started quickly. 【Features】 ■ Fully compliant with IPA's "Security Risk Analysis Guide for Control Systems" ■ Uses our developed risk analysis tools to minimize costs to the extreme ■ Achieves highly effective security risk assessments *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Targeted attack email response training service for the manufacturing industry.

Improving security awareness comes from training and education. A security training service adopted by 500 companies.

"Training is conducted every year, but since the content is the same, we want some changes." "We would like to customize the training content to fit our company's circumstances." Do you have any concerns? SCC's "Training Service" allows for training that closely resembles normal conditions by varying the content and difficulty of email templates according to job positions. By including training for affiliated and group companies, we aim to understand the overall organizational situation and improve security awareness. Additionally, the educational content can be customized to fit the customer's circumstances. [Features] ■ Diverse email templates ■ Abundant customization options ■ Enhanced educational services *For more details, please refer to the PDF materials or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service Lite

Providing vulnerability assessments that include manual diagnostics only where necessary, with short turnaround times and low costs.

The "Vulnerability Assessment Service Lite" is a manual and tool-based assessment service that focuses on essential functions to conduct vulnerability assessments, based on the previously well-received "Vulnerability Assessment Service." It is a speedy and cost-effective service optimized to meet customer needs such as "I want a quick assessment while keeping costs down," tailored to the characteristics of the functions to be assessed. For customers who do not have the luxury of time and budget but want to quickly understand the vulnerabilities of their website, we provide a cost-effective vulnerability assessment that maximizes the know-how cultivated by security expert companies. The "Vulnerability Assessment Service Lite" offers two plans: - Function-specific web assessment - Platform assessment Please make use of it as the first step in understanding your company's security issues. * The "Vulnerability Assessment Service Lite" is provided in collaboration with SecureSky Technology.

  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration