Vulnerability Assessment Service Product List and Ranking from 37 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Jan 14, 2026~Feb 10, 2026
This ranking is based on the number of page views on our site.

Vulnerability Assessment Service Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Jan 14, 2026~Feb 10, 2026
This ranking is based on the number of page views on our site.

  1. 株式会社クロスポイントソリューション 株式会社クロスポイントソリューション Tokyo//Information and Communications
  2. テガラ 本社 Shizuoka//Trading company/Wholesale
  3. コンピューターサイエンス Tokyo//Information and Communications
  4. 4 レイ・イージス・ジャパン Tokyo//Information and Communications
  5. 4 M&K Tokyo//Information and Communications

Vulnerability Assessment Service Product ranking

Last Updated: Aggregation Period:Jan 14, 2026~Feb 10, 2026
This ranking is based on the number of page views on our site.

  1. Information Security Management Solution "MCSGLOBAL" 株式会社クロスポイントソリューション 株式会社クロスポイントソリューション
  2. Malware Sandbox "Hatching Triage" テガラ 本社
  3. Vulnerability Assessment Service "Security Blanket Series" M&K
  4. Web Application Vulnerability Assessment Service コンピューターサイエンス
  5. 4 Automated Vulnerability Diagnosis Service "SCT SECURE Cloud Scan" 三和コムテック

Vulnerability Assessment Service Product List

31~60 item / All 63 items

Displayed results

Decarbonization: Risk Analysis of CO2 Leakage

Important for evaluating safety! Analysis of the risk of CO2 leakage to the ground.

The risk analysis of CO2 leakage to the surface during and after CO2 injection is important for evaluating safety. It is necessary to examine the presence of faults and abandoned wells, as well as the appropriate injection pressure, and to conduct simulations that consider the impact not only on the reservoir but also on the cap rock. By coupling rock mechanics models with reservoir simulators, it is possible to perform calculations that take into account the effects of pressure changes on the geomechanical properties of the reservoir. For example, in GEM, a modified Barton-Bandis model is applied to simulate the opening and closing of fractures and calculate CO2 leakage from the cap rock. Our company is primarily investigating and examining the following items, focusing on calculations using the reservoir simulator GEM and literature research. [Investigation and Examination Items] ■ Examination of the workflow for creating simulation input data from experimental, analytical, and literature data. ■ Examination of the workflow for CO2 leakage risk analysis that reflects the uncertainty analysis of input data. ■ Investigation of the workflow for CO2 leakage calculations in various reservoir simulators. *For more details, please feel free to contact us.

  • others
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security solutions various vulnerability assessment services

Leave all kinds of vulnerability assessments to us.

We offer three types of security solutions: network vulnerability assessments, web application vulnerability assessments, and source code assessments. Our technicians have been involved in vulnerability assessments for over a decade since the early days of such services in Japan. We have conducted assessments for more than 800 sites in total, which we take pride in as being among the top level in the country. Additionally, any threats discovered, the assessment of their significance, and recommended countermeasures will be clearly reported by our experienced engineers in a straightforward manner. [Features] ■ Assessments conducted by experienced security professionals ■ We take pride in the high quality of our assessment reports *For more details, please feel free to contact us.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability assessment

To prepare for the increasing risk of information leaks due to cyber attacks! Flexible responses are possible!

"Vulnerability Assessment" refers to the examination of websites and applications to identify various security risks, such as vulnerabilities that could be exploited and hacking attacks aimed at personal information. This assessment aims to accurately evaluate and address the current situation, leading to the safe operation of services. The assessment targets websites, web applications, smartphone apps, etc., and can be flexibly tailored to fit the client's budget and schedule. Companies that feel their IT services have security issues are welcome to consult with us. 【Features】 ■ Assessments conducted by experienced evaluators in accordance with global standards ■ Compliance with information security service standards ■ Easy-to-understand reports *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software
  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security risk analysis service

The risk analysis results are clearer with our original four-level evaluation method!

Our risk analysis support flexibly assists clients who wish to conduct their own analyses. By performing an analysis, it becomes possible to make efficient security investments. Additionally, the standard analysis methods published by the Information-technology Promotion Agency (IPA) come with a guidebook that is 380 pages long, making it recommended for those who want to get started quickly. 【Features】 ■ Fully compliant with IPA's "Security Risk Analysis Guide for Control Systems" ■ Uses our developed risk analysis tools to minimize costs to the extreme ■ Achieves highly effective security risk assessments *For more details, please download the PDF or feel free to contact us.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Targeted attack email response training service for the manufacturing industry.

Improving security awareness comes from training and education. A security training service adopted by 500 companies.

"Training is conducted every year, but since the content is the same, we want some changes." "We would like to customize the training content to fit our company's circumstances." Do you have any concerns? SCC's "Training Service" allows for training that closely resembles normal conditions by varying the content and difficulty of email templates according to job positions. By including training for affiliated and group companies, we aim to understand the overall organizational situation and improve security awareness. Additionally, the educational content can be customized to fit the customer's circumstances. [Features] ■ Diverse email templates ■ Abundant customization options ■ Enhanced educational services *For more details, please refer to the PDF materials or feel free to contact us.

  • Other Software
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service Lite

Providing vulnerability assessments that include manual diagnostics only where necessary, with short turnaround times and low costs.

The "Vulnerability Assessment Service Lite" is a manual and tool-based assessment service that focuses on essential functions to conduct vulnerability assessments, based on the previously well-received "Vulnerability Assessment Service." It is a speedy and cost-effective service optimized to meet customer needs such as "I want a quick assessment while keeping costs down," tailored to the characteristics of the functions to be assessed. For customers who do not have the luxury of time and budget but want to quickly understand the vulnerabilities of their website, we provide a cost-effective vulnerability assessment that maximizes the know-how cultivated by security expert companies. The "Vulnerability Assessment Service Lite" offers two plans: - Function-specific web assessment - Platform assessment Please make use of it as the first step in understanding your company's security issues. * The "Vulnerability Assessment Service Lite" is provided in collaboration with SecureSky Technology.

  • Firewall
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

How to Protect Important Data in Your Workplace Explained in Manga

We solve your concerns regarding industry-specific backup for schools, hospitals, manufacturing, and more!

This document explains easy and reliable data protection achieved with the "Arcserve series" through manga. It includes a school edition set in a certain school, as well as editions for hospitals, manufacturing, construction, government agencies, and property insurance companies. We solve backup-related concerns specific to each industry. [Contents] ■ School Edition ■ Hospital Edition ■ Manufacturing Edition ■ Construction Edition ■ Government Agency Edition ■ Property Insurance Company Edition *Please be sure to check it out by downloading the PDF below!

  • others
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Happy Corporation

Practicing system protection operations while managing the main business! A case that eliminated the risk of time lag.

We would like to introduce the case study of "Arcserve High Availability / Arcserve D2D" implemented at Happy Co., Ltd. The company has garnered significant attention with its "Care Maintenance" service, which cleans clothes by simultaneously treating both water-based and oil-based stains while protecting the fabric. They are also focusing on IT utilization by thoroughly managing the entrusted garments with an "electronic medical record system." To further strengthen the protection of such critical systems, they implemented "Arcserve High Availability" for data replication and "Arcserve D2D" for image backup. As a result, they achieved a high level of business continuity improvement while completing operations with in-house staff. [Case Study] - Industry: Clothing Reproduction Processing - Company Name: Happy Co., Ltd. *For more details, please refer to the PDF document or feel free to contact us.*

  • Data Backup
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Public Interest Incorporated Association National Health Insurance Central Association

Real-time data sharing over long distances! A case study demonstrating cost reduction achieved.

We would like to introduce a case study of the implementation of "ARCserve Replication" that our company handles. At the National Health Insurance Central Association, one of their businesses involves a system for processing claims and payments for comprehensive support for persons with disabilities. This system was experiencing operational costs and management burdens at the 47 prefectural health insurance associations that serve as the implementing bodies. Therefore, our product was introduced. As a result, without changing the business flow, it has been possible to reduce the costs borne by the health insurance associations, and it is expected that the long-awaited remote backup system can be established. [Case Study] - Industry: National Health Insurance Business, Long-term Care Insurance Business, Comprehensive Support for Persons with Disabilities - Organization Name: National Health Insurance Central Association - Challenges: System operational costs and management burdens *For more details, please refer to the PDF document or feel free to contact us.

  • Data Backup
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] SoftBank Technology Corporation (2)

Expanding as an in-house service is also in sight! A case study of achieving a replacement without stopping operations.

We would like to introduce a case study of the implementation of "Arcserve Replication r16.5 for Windows" at SoftBank Technology Corp. The company faced the challenge of migrating their file server to a larger capacity without interrupting business operations. To address this issue, they implemented our product. As a result, they successfully replicated approximately 6 million files and 3.5TB of large data to a clustered environment of Windows Server 2012 located remotely, all within a very short period. [Case Study] - Industry: Information and Communication - Company Name: SoftBank Technology Corp. - Challenge: Keeping up with the increasing data demands as the company continues to grow rapidly. *For more details, please refer to the PDF document or feel free to contact us.

  • Data Backup
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Seclore Rights Management

You can easily define and remotely control detailed usage policies.

Our company offers 'Seclore Rights Management', which can protect confidential information regardless of device or location. Files are stored across a wide range of media, including servers, emails, and mobile devices, but unauthorized users cannot access the information. Additionally, since the usage policy remains effective once granted to a file, it enables the safe use of cloud services, BYOD, and external collaboration. 【Features】 ■ Policy Federation ■ Bulk Update ■ Protection of Various Files *For more details, please download the PDF or feel free to contact us.

  • Company:CIC
  • Price:Other
  • Database
  • Other Software
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security Services

For matters related to information security, please contact our company.

Our company provides information security services. We effectively combine our long-standing expertise in the development and operation of information systems with our knowledge of information security to propose appropriate and efficient support that meets our customers' needs. Please feel free to contact us if you have any requests. 【Service Contents】 ■ Consulting / Audit Support ■ Vulnerability Assessment / Risk Assessment Support ■ Education / Training Support ■ Information System Development Support *For more details, please download the PDF or feel free to contact us.

  • Company:CIC
  • Price:Other
  • Security Assessment
  • WAF
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web Application Vulnerability Assessment Service

Investigating major vulnerabilities that are easily exploited and have a significant impact!

We offer a "Web Application Vulnerability Diagnosis Service" to assess vulnerabilities in web applications and mobile apps. We provide a "Light Plan" that diagnoses major vulnerabilities through black box testing, a "Premium Plan" that uses CyberGym Japan's "ImmuniWeb" for vulnerability diagnosis, and a "Free Plan" that allows customization of tools and target sites. Please feel free to contact us if you have any requests. 【Features】 ■ Premium - Diagnosis using CyberGym Japan's "ImmuniWeb." Advanced vulnerabilities detected through AI machine learning. - Covers domestic and international security guidelines and advanced attack methods. ■ Light - Diagnosis for major vulnerabilities. - Can also diagnose web applications in the production environment during the operational phase. - A report summarizing the diagnosis results and countermeasures will be provided, along with a results presentation meeting. *For more details, please download the PDF or contact us.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI Remote Vulnerability Assessment Service

High quality, high speed, efficient! All possible aspects diagnosed by our unique AI tool.

We would like to introduce our "AI Remote Vulnerability Diagnosis." Using a vulnerability scanning tool equipped with an AI engine developed independently by Ray Aegis, we conduct automated tool diagnostics, followed by detailed manual diagnostics performed by experienced assessors for items that cannot be covered by automated tools. The diagnosis is priced per FQDN, allowing for fast and cost-effective use even for web applications with many screens and features, such as media distribution services. 【Other Services】 ■ Platform Diagnosis ■ AI Quick Tool Diagnosis ■ Fast Penetration Test ■ Penetration Test *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Sandbox "CloudCoffer SandSphere"

AI technology to detect zero-day attacks! Conducting inspections through a unique four-phase process.

"CloudCoffer SandSphere" is a service developed by CloudCoffer Inc. for detecting malware. Through its proprietary AI engine, it conducts "surface analysis," "static analysis," "backdoor analysis," and "dynamic analysis" to detect unknown malware and malware that has previously evaded detection in Sandboxes. Additionally, based on customer requests, it offers services that can be conducted as a one-time event, as well as options for installation and use over a certain period. 【Features】 ■ Conducts inspections through a unique four-phase process to discover not only known malware but also variants and new types. ■ Offers flexibility in choosing between one-time services and installation/use over a certain period based on customer requests. ■ There is no need to account for the often high costs of AI Sandboxes as assets. *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Supply Chain Attack Countermeasures Vulnerability Assessment Service [Helpful Materials Provided]

Cyberattacks targeting the vulnerabilities in the manufacturing supply chain are on the rise! We are offering a document that explains the key points of necessary security measures!

At Ray Aegis Japan, we utilize our proprietary AI tools to provide vulnerability assessments conducted by over 320 highly skilled security engineers worldwide. As attacks exploiting weaknesses in the supply chain of the manufacturing industry are on the rise, what are the comprehensive security measures against cyberattacks? We are offering a document that explains the key points of necessary security measures! What are the world-class security measures? We explain them in an easy-to-understand manner! [Excerpt from the content] - Challenges of cybersecurity in the manufacturing industry - 59% have experienced a security incident? - Supply chain risks - Approaches to solving challenges *For more details, please download the PDF or contact us.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Operational Service "SIV-SOC"

Providing continuous operational services tailored to the customer's environment!

We offer the operational operation service 'SIV-SOC' that can be utilized at a reasonable (appropriate) price. "We want to start a private SOC but can't take the plunge due to costs," or "Even with a large volume, some products are not supported," we will solve the issues your company is facing. Please feel free to contact us first. 【Features】 ■ Achieves continuous operations and flexible operations that are difficult to achieve in-house ■ Reasonable (appropriate) pricing ■ Allows for flexible utilization tailored to each customer and product ■ Enables consistency in operations and cost optimization *For more details, please download the PDF or feel free to contact us.

  • Security Assessment
  • Other Management Services
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Malware Sandbox "Hatching Triage"

A sandbox capable of malware detection and large-scale analysis. It quickly analyzes information about threats and minimizes damage.

A cross-platform (Windows, Android, Linux, and macOS) sandbox capable of malware detection and large-scale analysis. By using a protected area isolated from the areas users typically utilize, it allows for rapid analysis of threat-related information during malware detection or when issues arise from problematic programs, helping to minimize damage. It adopts a unique architecture from Hatching Inc. and is designed as a distributed solution. It achieves high-speed and scalable sandboxing and accelerates malware analysis, enabling an unprecedented 500,000 analyses per day as a sandbox service. It also offers features such as simple scoring, preset analysis settings, real-time viewable analysis results, and clear reports. This allows for quicker and more concise situational judgment and information sharing. Triage is utilized for cybersecurity by large corporations, internal security teams, security service providers, and niche information security experts.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

Diagnosing system vulnerabilities using tools specifically for vulnerability assessment and manual testing by white hat hackers!

We offer "vulnerability assessments (security assessments)" to diagnose whether there are vulnerabilities in networks, operating systems, middleware, and web applications. By conducting a vulnerability assessment and checking the current security status of networks/servers and web applications, it is possible to prevent risks such as malicious attacks from attackers and information leakage incidents in advance. Please feel free to contact us if you have any requests. 【Assessment Targets】 ■ Web applications, etc. ■ Web servers and databases ■ Network services *For more details, please download the PDF or feel free to contact us.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Data protection product "Shadow Desktop"

Comprehensive measures can be taken for information leakage prevention in case of PC loss, BCP measures, and backups!

"Shadow Desktop" is a data-less client product that creates a state where data does not physically exist on the device by simply installing software on an existing PC and storing the data within the PC to external storage such as the cloud. Since it can be used as if the data is local, it significantly enhances security and data protection performance without compromising usability and productivity. 【Features】 ■ Virtualization of data only to the cloud ■ A new form that imposes no burden on either companies or users ■ The secret is a virtual drive *For more details, please download the PDF or feel free to contact us.

  • Data Backup
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Privacy protection software 'Steganos'

Encrypt and store safely! No ads, complete protection of security and privacy.

"Steganos" is privacy protection software that includes features such as encryption, VPN, and password management. It provides encrypted private access to the internet. Your real IP address is replaced with one randomly selected from the product's IP addresses. This makes it more difficult to track your online activities. Please feel free to contact us for any inquiries. 【Features】 <Steganos VPN Online Shield> ■ Protects your connection ■ Blocks ads ■ Prevents tracking ■ Automatically deletes cookies ■ Anonymizes browser type *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other Software
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

EAZ Solution

Offering a series of Windows instant restore products! Featuring options like "Eazy Fix."

"EAZ Solution" provides software that addresses risks related to information security, availability, compliance, and system performance. Our lineup includes "Baseline Shield," which protects computers from unwanted changes, and "EFI System Cloner," a system cloning software. Please feel free to contact us when you need assistance. 【Lineup】 ■Eazy Fix ■Baseline Shield ■Eazy Fix EndPoint Manager ■EFI System Cloner *For more details, please check the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other Software
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

VMRay

We will conduct a detailed analysis of the selected samples.

VMRay is a platform that integrates threat information and immediately identifies anything that can clearly be determined as malware. It does so without allowing malware to recognize it as a sandbox, while still possessing high analytical capabilities. You can choose between a cloud version and an on-premises version. In the case of on-premises, we can procure the equipment and carry out the integration. Please feel free to contact us for details on pricing and licensing. 【Product Lineup】 ■VMRay DeepResponse ■VMRay FinalVerdict ■VMRay TotalInsight *For more details, please download the PDF or feel free to contact us.

  • Analysis and prediction system
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Hybrid Web Application Vulnerability Assessment Service

In addition to the automated diagnostic tool, manual diagnostics will be conducted by a technician.

We offer hybrid web application vulnerability assessments. By focusing on vulnerabilities that are difficult to detect with automated diagnostic tools, we provide a more detailed and reliable vulnerability assessment than quick web application diagnostics. Please feel free to contact us if you have any requests. 【Assessment Items】 ■ Vulnerabilities related to input and output ■ Vulnerabilities related to authentication ■ Vulnerabilities related to authorization ■ Session management ■ Vulnerabilities related to web servers ■ Vulnerabilities related to Web 2.0 *For more details, please download the PDF or feel free to contact us.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Numerous Implementation Results: Targeted Attack Email Response Training Service to Protect the Manufacturing Industry

Improving security awareness comes from training and education. Cybersecurity measures to protect the manufacturing industry from increasingly serious cyber attacks every day!

"Training is conducted every year, but since the content is the same, we want some changes." "We would like to customize the training content to fit our company's circumstances." Are you facing any issues? SCC's "Training Service" allows for training that closely resembles normal operations by varying the content and difficulty of email messages according to job positions. By including training for affiliated and group companies, we aim to enhance the overall understanding of the organization's situation and improve security awareness. Additionally, the educational content can be customized to fit the customer's circumstances. [Features] ■ Diverse email templates ■ Abundant customization options ■ Enhanced educational services *For more details, please refer to the PDF materials or feel free to contact us.

  • Other Software
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

High-speed, high-quality vulnerability assessment using AI tools!

We utilize RayAegis' unique AI tools to provide vulnerability assessments conducted by over 250 advanced security engineers worldwide. With our AI × Security approach, which we have practiced since our founding, we can offer comprehensive diagnostic services that maintain quality in a short period, even for the increasing number of systems each year. Please feel free to contact us if you have any requests. 【Features】 ■ A package pricing system based on FQDN units that becomes more cost-effective as the environment scales ■ No need for preliminary narrowing down of diagnostic targets when making a request ■ The information we need to gather in advance is very simple ■ Short duration and high quality *For more details, please download the PDF or contact us.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ray-SOC Service

Supporting safe business operations! A specialized team provides centralized monitoring of all networks.

We would like to introduce our "Ray-SOC Service." This service monitors logs from network devices and security equipment, primarily focusing on firewalls and VPN connection devices, in real-time or at regular intervals. It enables the early detection and response to abnormal communications and trends, such as attempts of intrusion from external sources. Additionally, our standard plan for this service is available from 108,000 yen per month, and we can customize the service content to fit your budget and security policy. 【Monitoring Targets (Partial)】 ■ Network Devices ■ Authentication Servers ■ Antivirus ■ Firewalls *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Smartphone application vulnerability assessment service

We are conducting static diagnostics using diagnosable source code.

We offer vulnerability assessments for smartphone applications. We check for issues in the code within iOS/Android smartphone applications, whether unauthorized communication occurs, and the risk of content tampering. Please feel free to contact us if you have any requests. 【Assessment Items】 ■Common inspections for Android/iOS apps ■Inspections specific to Android apps ■Inspections specific to iOS apps ■Inspections related to communication with APIs *For more details, please download the PDF or feel free to contact us.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

WiSAS Vulnerability Assessment

We provide visualization and optimization support for comfortable use of Wi-Fi environments, as well as prevention of information leaks due to unauthorized use and cyber attacks.

By acquiring the radio waves of the wireless network (Wi-Fi) and analyzing them from six security perspectives, we visualize the vulnerabilities and issues lurking in the Wi-Fi environment, preventing threats before they occur. Additionally, it is also possible to eliminate threats using location information analysis (optional). You can understand the dangerous use of Wi-Fi that directly leads to information leakage. By installing WiSAS sensors in the target area and visualizing the Wi-Fi usage, we conduct investigations and analyses from a security standpoint.

  • Security Assessment
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

E-book protection (viewing restrictions, copy prevention) solution

Building and providing eBook sales and subscription services! Protect eBooks with access restrictions and copy prevention.

We want to protect Japanese information with Japanese technology. Driven by this desire, our company has been engaged in product development and continues to provide the uniquely developed DRM solution 'CypherGuard.' 'CypherGuard' protects e-books and prevents unauthorized use by restricting viewers and viewing periods through its "license management function" and by preventing screen duplication such as capture actions. In the business sector, it is used by customers in manufacturing, infrastructure, and government agencies. 【Features】 ■ Protects digital content by restricting viewers and viewing periods and preventing screen duplication such as capture actions through the license management function. ■ Allows the setting of distribution rules such as dates and the number of devices. ■ Provides services tailored to the sales format of books (purchase, unlimited reading) and the implementation environment (user management, license authentication server). *For more details, please refer to the PDF document or feel free to contact us.

  • others
  • Vulnerability Assessment Service

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration