Vulnerability Assessment Service Product List and Ranking from 36 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Oct 08, 2025~Nov 04, 2025
This ranking is based on the number of page views on our site.

Vulnerability Assessment Service Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Oct 08, 2025~Nov 04, 2025
This ranking is based on the number of page views on our site.

  1. レイ・イージス・ジャパン Tokyo//Information and Communications
  2. M&K Tokyo//Information and Communications
  3. スプライン・ネットワーク Tokyo//others
  4. 4 バルク Tokyo//Information and Communications
  5. 4 ranryu Tokyo//Information and Communications

Vulnerability Assessment Service Product ranking

Last Updated: Aggregation Period:Oct 08, 2025~Nov 04, 2025
This ranking is based on the number of page views on our site.

  1. Vulnerability Assessment Service "Security Blanket Series" M&K
  2. Ministry of Economy, Trade and Industry Certified | Web Application Vulnerability Assessment Service ranryu
  3. WiSAS Vulnerability Assessment スプライン・ネットワーク
  4. Mobile App Diagnosis Essential Edition サイファー・テック
  5. 4 Automated Vulnerability Diagnosis Service "SCT SECURE Cloud Scan" 三和コムテック

Vulnerability Assessment Service Product List

16~30 item / All 62 items

Displayed results

Vulnerability Assessment Service "Security Blanket Series"

Diagnosis can be performed at a fixed rate, regardless of the system scale or the number of screens on the site.

We offer a vulnerability assessment service called 'Security Blanket Series,' which includes manual diagnostics by specialized engineers and diagnostics using SaaS-based tools. By considering and executing various simulated attacks from the perspective of an attacker on your website, we support the operation of a safe and secure IT environment. In addition to vulnerability assessments, we also provide services such as source code reviews and penetration testing. Please feel free to contact us if you have any requests. 【Features】 - Since it is provided as a SaaS model, there is no need for customers to prepare new equipment or devices. - All diagnostics are completed via the internet. - Supports crawling and diagnostics of dynamic sites. - Manual diagnostics by specialized engineers can also be combined. - A dedicated management screen for customers allows for the confirmation of various diagnostic histories and detected vulnerabilities, among other features. *Please note that we do not accept inquiries by phone. *For more details, please download the PDF or feel free to contact us.

  • Company:M&K
  • Price:Other
  • Security Assessment
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

Enhance the security of the website and avoid risks.

Our company offers vulnerability assessment services conducted by skilled engineers who are also well-versed in web application development. We go beyond merely pointing out vulnerabilities and suggesting general countermeasures; we provide examples of vulnerability verification and propose countermeasures tailored to the characteristics of the target site. Additionally, our in-depth explanations, which incorporate insights from security consulting and current security trends, have received positive feedback, as they do not stop at merely reading the report or explaining vulnerabilities. 【Features】 ■ Presentation of specific verification examples and countermeasures ■ High customer satisfaction ■ Supervision by a leading expert in web security *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Risk Analysis "V-sec"

We will visualize the current security measures and create a roadmap for future security measures from the perspective of priority and cost-effectiveness.

CYBERGYM's "V-Sec" analyzes the security status of organizations in accordance with various industry guidelines, in addition to being aimed at the general industry, and develops a roadmap for security measures. It also supports the specific selection, implementation, and operation of each measure. It can be effectively utilized not only for the initial security measures of your own company and for improving security but also for the security management of related companies and the supply chain. V-Sec is listed in the "IPA Information Security Service Standards Compliant Service List." Guidelines adhered to: <V-Sec STandard> for the general industry NIST SP800-171, ISO27001, ISO27002, guidelines for risk assessment against advanced cyber attacks, various guidelines such as the Personal Information Protection Law <V-Sec FActory> for factories Guidelines for cyber-physical security measures in factories, Jidokai/ Bukokai guidelines, etc. <V-Sec HOspital> Ministry of Health, Labour and Welfare guidelines on safety management of medical systems, version 6.0

  • Security Assessment
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

System support service

We provide total support from the construction of the infrastructure environment to operation and maintenance.

We offer various system support services. We provide systems tailored to our customers' needs, from requirements definition to design and development. Additionally, we offer services focused on proposals, requirements definition, design and construction, as well as server infrastructure setup and equipment kitting, all while keeping operations in mind. Furthermore, we provide total support services for systems, including project management for information systems departments, support for smooth system operations, and operational management of hardware and software. 【Services】 ■ Design ■ Construction ■ Service Desk ■ Operations *For more details, please download the PDF or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ministry of Economy, Trade and Industry Certified | Vulnerability Diagnosis Service and Testing Service [Fully Remote]

Enhancing web security with vulnerability assessments certified by the Ministry of Economy, Trade and Industry, regardless of industry or size.

Are you ignoring the "invisible risks" of web services? Don't just stop at "discovering" vulnerabilities. We provide actionable support all the way to remediation and improvement. ■ Do you have these concerns? - You think you are taking security measures, but you have never confirmed them from an external perspective. - You want to ensure the safety of your web services or internal systems before their release. - You are being asked by clients or business partners to submit a diagnostic report. - You want to effectively identify security risks within a limited budget. ■ What is ranryu's vulnerability assessment service? Ranryu Co., Ltd. is registered as a compliant business under the Ministry of Economy, Trade and Industry's "Information Security Service Standards." Our engineers, who hold CEH and Information Processing Security Support Specialist certifications, provide vulnerability assessments for web services and business systems. Our distinguishing feature is that we not only conduct assessments but also provide concrete countermeasure support for identified risks and can consistently assist in reviewing security policies. With a wealth of experience in system development and infrastructure construction, we offer technical advice and implementation support to ensure that diagnostic results are not left "as is." We support the strengthening of your security from a realistic perspective.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ministry of Economy, Trade and Industry Certified | Web Application Vulnerability Assessment Service

"Ministry of Economy, Trade and Industry registered services × Expert diagnosis × Ongoing support" Total support for visualizing, improving, and maintaining web application security.

Ranryu's "Web Application Vulnerability Diagnosis Service" is a highly reliable diagnostic service registered on the IPA public list as a service compliant with the Ministry of Economy, Trade and Industry's "Information Security Service Standards." Not limited to mere tool diagnostics, it combines manual diagnostics by security engineers to prevent false positives and oversights. Furthermore, after the diagnosis, it offers improvement proposals, reporting sessions, re-diagnosis, and continuous monitoring, providing effective and reassuring security measures. ■ Features and PR Points - Peace of mind from public certification: Registered service with the Ministry of Economy, Trade and Industry and IPA - Four flexible plans to choose from: Ranging from cost-focused to thorough diagnostics - Detailed reports leading to improvements: Evaluations based on OWASP and IPA standards, along with correction proposals - Site seal provision: Visualizes completed diagnostics to instill trust in clients and customers - Regular diagnostic packages: 2 to 4 diagnostics per year plus re-diagnosis to continuously improve security levels.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cybersecurity Vulnerability Assessment Service "Aegis EW"

Your homepage is being targeted! You can check the diagnosis results in your browser.

"Aegis EW" is a platform diagnostic SaaS application that allows for ASM diagnostics and vulnerability assessments without the need to install any tools. It enables management of all platform diagnostics through a dashboard with a common GUI. Using tools equivalent to those of hackers, it identifies attack surfaces and leaked information. 【Features】 ■ User-friendly GUI for the dashboard ■ Powerful ASM and vulnerability diagnostics ■ Centralized management of all platform diagnostics ■ Reasonably priced *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Yutaka Integration Network Monitoring Service

We have a thorough system in place to ensure that our customers can use our services with peace of mind, protecting and monitoring their data.

We provide 24/7 monitoring and maintenance of network remote monitoring, as well as operational monitoring of rental servers (including security monitoring), to support the stable operation of our customers' business and network systems.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Monitoring-type diagnostic solution 'SCT SECURE SWAT'

Ideal for continuous vulnerability monitoring of web applications! Annual diagnostic service for monitored web applications.

"SCT SECURE SWAT" is a monitoring-type annual diagnostic service for web applications that thoroughly diagnoses using the characteristics of both automated and manual diagnostics. It balances the comprehensiveness of automated diagnostics with the flexibility of manual diagnostics. Frequent modifications and updates are automatically detected and diagnosed. Additionally, we also offer the "SCT SECURE Mobile App Diagnostic Service," a vulnerability diagnostic service for smartphone applications. 【Features of SCT SECURE SWAT】 ■ Thorough diagnosis of web applications utilizing the characteristics of both automated and manual diagnostics ■ Balances the comprehensiveness of automated diagnostics with the flexibility of manual diagnostics ■ Automatically detects and diagnoses frequent modifications and updates ■ Suitable for continuous vulnerability monitoring of critical web applications ■ Diagnostic results can be checked in real-time from a dedicated portal *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service "gSCAN"

A cloud-based service that can accommodate flexible schedules such as spot diagnoses and regular check-ups.

"gSCAN" is a cloud-based vulnerability assessment service that supports both Web SCAN and Network SCAN. It can accommodate flexible schedules such as spot assessments and regular assessments, and it is also capable of handling websites that require login authentication. We offer options for re-assessment after fixes and annual contracts. Additionally, on-site reporting sessions are available as an option. 【Features】 ■ Very affordable ■ Supports both Web SCAN and Network SCAN ■ Flexible scheduling for spot assessments and regular assessments ■ Capable of handling websites that require login authentication ■ Options for re-assessment after fixes and annual contracts available *For more details, please refer to the PDF materials or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security Management Solution "MCSGLOBAL"

Unified management of PCs worldwide on a common platform! Global information security management solution.

"MCSGLOBAL" is a management solution created to meet the needs of global security measures, not only within Japan but also including overseas locations. It allows for the management of control and operation log information for each leakage route on a common platform across countries, achieving comprehensive security measures. In addition to significantly reducing the management workload of information systems through asset management functions and remote support capabilities, it also enhances information security through device control functions. 【Features】 ■ Support for four languages: Japanese, English, Chinese, and Korean ■ Collects information from internal PCs to visualize security ■ Standardizes the security level of internal PCs ■ Monitors and controls unauthorized use of PCs *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software
  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Explained in Manga: Understandable! How to Protect Your Company's Device Integration App

Introducing the security solution product "CrackProof" that protects applications from unauthorized attacks in a manga format!

Recently, collaboration between apps and devices has been advancing in various fields. While there are many benefits, such as increased convenience for users, there are also security risks associated with distributing apps that connect to proprietary devices, such as the sale of tampered apps or the analysis of proprietary technology from the apps. This document explains the necessary security measures for apps that connect to proprietary devices in an easy-to-understand manga format. Please feel free to download and take a look. 【Recommended for the following individuals】 ■ Those considering developing apps that connect proprietary devices with smartphones or PCs ■ Those considering measures to prevent the leakage of proprietary technology from apps that operate proprietary devices ■ Those considering developing apps for operating and maintaining proprietary devices ■ Those who want to prevent unauthorized changes to the settings of proprietary devices through apps *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web application vulnerability assessment tool 'Vex'

More advanced, more convenient! Products of professional quality recognized by security experts.

"Vulnerability EXplorer (Vex)" is a web application vulnerability scanning tool that continues to evolve while having a track record of diagnostics across thousands of sites. It has gained a reputation for its high accuracy in vulnerability assessments, starting with its adoption by financial institutions that require robust security. Its high detection capability is due to features such as "provision of inspection signatures" and "highly flexible scenario creation," allowing for meticulous configuration that enables high-quality inspections. [Features] ■ Powerful scenario creation support ■ Comprehensive inspection functions ■ Abundant vulnerability inspection items ■ Support for the latest vulnerabilities ■ Regular addition of new features *For more details, please refer to the PDF materials or feel free to contact us.

  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Webアプリケーション脆弱性自動検査ツール『Vex Cloud』

機械学習やJavaScript動的解析などの技術により、高い巡回・診断性能を実現!

『Vex Cloud』は、検査用のシナリオ(疑似攻撃リクエスト)も自動生成 でき、設定や操作も簡単なWebアプリケーション脆弱性自動検査ツールです。 開発者様やサイト運用担当者様の「気軽に脆弱性診断を行いたい」 「開発工程にあわせて随時検査したい」といったニーズにお応え。 また、お客様の保有するWebサイトを自動巡回し、すべてのWebサイトを リストアップ、それらをWebサイト単位で管理します。 【特長】 ■自動クローラーで面倒なシナリオ作成が不要 ■ログイン認証が必要なサイトも問題なし ■SPA(Single Page Application)にも対応 ※詳しくはPDF資料をご覧いただくか、お気軽にお問い合わせ下さい。

  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

OSS Management Solution "WhiteSource"

Timely provision of OSS vulnerability information! You can maintain the security level of your system.

"WhiteSource" is an OSS security and compliance management solution that automatically identifies and points out risks and issues by database-ing OSS information from around the world and matching it. Software developers can easily utilize appropriate and suitable OSS, contributing to increased development productivity. Additionally, business owners can proactively avoid troubles caused by license violations and vulnerabilities. 【Features】 ■ Accurate database and matching ■ Support for diverse programming environments ■ Integrated support for many tools and system environments ■ Suitable for continuous operation. Ongoing monitoring and reporting after release ■ Cross-team support. Fully covers the system development lifecycle, etc. *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration