Vulnerability Assessment Service Product List and Ranking from 36 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Oct 08, 2025~Nov 04, 2025
This ranking is based on the number of page views on our site.

Vulnerability Assessment Service Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Oct 08, 2025~Nov 04, 2025
This ranking is based on the number of page views on our site.

  1. レイ・イージス・ジャパン Tokyo//Information and Communications
  2. M&K Tokyo//Information and Communications
  3. スプライン・ネットワーク Tokyo//others
  4. 4 バルク Tokyo//Information and Communications
  5. 4 ranryu Tokyo//Information and Communications

Vulnerability Assessment Service Product ranking

Last Updated: Aggregation Period:Oct 08, 2025~Nov 04, 2025
This ranking is based on the number of page views on our site.

  1. Vulnerability Assessment Service "Security Blanket Series" M&K
  2. Ministry of Economy, Trade and Industry Certified | Web Application Vulnerability Assessment Service ranryu
  3. WiSAS Vulnerability Assessment スプライン・ネットワーク
  4. Mobile App Diagnosis Essential Edition サイファー・テック
  5. 4 Automated Vulnerability Diagnosis Service "SCT SECURE Cloud Scan" 三和コムテック

Vulnerability Assessment Service Product List

31~45 item / All 62 items

Displayed results

Decarbonization: Risk Analysis of CO2 Leakage

Important for evaluating safety! Analysis of the risk of CO2 leakage to the ground.

The risk analysis of CO2 leakage to the surface during and after CO2 injection is important for evaluating safety. It is necessary to examine the presence of faults and abandoned wells, as well as the appropriate injection pressure, and to conduct simulations that consider the impact not only on the reservoir but also on the cap rock. By coupling rock mechanics models with reservoir simulators, it is possible to perform calculations that take into account the effects of pressure changes on the geomechanical properties of the reservoir. For example, in GEM, a modified Barton-Bandis model is applied to simulate the opening and closing of fractures and calculate CO2 leakage from the cap rock. Our company is primarily investigating and examining the following items, focusing on calculations using the reservoir simulator GEM and literature research. [Investigation and Examination Items] ■ Examination of the workflow for creating simulation input data from experimental, analytical, and literature data. ■ Examination of the workflow for CO2 leakage risk analysis that reflects the uncertainty analysis of input data. ■ Investigation of the workflow for CO2 leakage calculations in various reservoir simulators. *For more details, please feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability assessment

To prepare for the increasing risk of information leaks due to cyber attacks! Flexible responses are possible!

"Vulnerability Assessment" refers to the examination of websites and applications to identify various security risks, such as vulnerabilities that could be exploited and hacking attacks aimed at personal information. This assessment aims to accurately evaluate and address the current situation, leading to the safe operation of services. The assessment targets websites, web applications, smartphone apps, etc., and can be flexibly tailored to fit the client's budget and schedule. Companies that feel their IT services have security issues are welcome to consult with us. 【Features】 ■ Assessments conducted by experienced evaluators in accordance with global standards ■ Compliance with information security service standards ■ Easy-to-understand reports *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software
  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security risk analysis service

The risk analysis results are clearer with our original four-level evaluation method!

Our risk analysis support flexibly assists clients who wish to conduct their own analyses. By performing an analysis, it becomes possible to make efficient security investments. Additionally, the standard analysis methods published by the Information-technology Promotion Agency (IPA) come with a guidebook that is 380 pages long, making it recommended for those who want to get started quickly. 【Features】 ■ Fully compliant with IPA's "Security Risk Analysis Guide for Control Systems" ■ Uses our developed risk analysis tools to minimize costs to the extreme ■ Achieves highly effective security risk assessments *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Targeted attack email response training service for the manufacturing industry.

Improving security awareness comes from training and education. A security training service adopted by 500 companies.

"Training is conducted every year, but since the content is the same, we want some changes." "We would like to customize the training content to fit our company's circumstances." Do you have any concerns? SCC's "Training Service" allows for training that closely resembles normal conditions by varying the content and difficulty of email templates according to job positions. By including training for affiliated and group companies, we aim to understand the overall organizational situation and improve security awareness. Additionally, the educational content can be customized to fit the customer's circumstances. [Features] ■ Diverse email templates ■ Abundant customization options ■ Enhanced educational services *For more details, please refer to the PDF materials or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service Lite

Providing vulnerability assessments that include manual diagnostics only where necessary, with short turnaround times and low costs.

The "Vulnerability Assessment Service Lite" is a manual and tool-based assessment service that focuses on essential functions to conduct vulnerability assessments, based on the previously well-received "Vulnerability Assessment Service." It is a speedy and cost-effective service optimized to meet customer needs such as "I want a quick assessment while keeping costs down," tailored to the characteristics of the functions to be assessed. For customers who do not have the luxury of time and budget but want to quickly understand the vulnerabilities of their website, we provide a cost-effective vulnerability assessment that maximizes the know-how cultivated by security expert companies. The "Vulnerability Assessment Service Lite" offers two plans: - Function-specific web assessment - Platform assessment Please make use of it as the first step in understanding your company's security issues. * The "Vulnerability Assessment Service Lite" is provided in collaboration with SecureSky Technology.

  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

How to Protect Important Data in Your Workplace Explained in Manga

We solve your concerns regarding industry-specific backup for schools, hospitals, manufacturing, and more!

This document explains easy and reliable data protection achieved with the "Arcserve series" through manga. It includes a school edition set in a certain school, as well as editions for hospitals, manufacturing, construction, government agencies, and property insurance companies. We solve backup-related concerns specific to each industry. [Contents] ■ School Edition ■ Hospital Edition ■ Manufacturing Edition ■ Construction Edition ■ Government Agency Edition ■ Property Insurance Company Edition *Please be sure to check it out by downloading the PDF below!

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Happy Corporation

Practicing system protection operations while managing the main business! A case that eliminated the risk of time lag.

We would like to introduce the case study of "Arcserve High Availability / Arcserve D2D" implemented at Happy Co., Ltd. The company has garnered significant attention with its "Care Maintenance" service, which cleans clothes by simultaneously treating both water-based and oil-based stains while protecting the fabric. They are also focusing on IT utilization by thoroughly managing the entrusted garments with an "electronic medical record system." To further strengthen the protection of such critical systems, they implemented "Arcserve High Availability" for data replication and "Arcserve D2D" for image backup. As a result, they achieved a high level of business continuity improvement while completing operations with in-house staff. [Case Study] - Industry: Clothing Reproduction Processing - Company Name: Happy Co., Ltd. *For more details, please refer to the PDF document or feel free to contact us.*

  • Data Backup

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Public Interest Incorporated Association National Health Insurance Central Association

Real-time data sharing over long distances! A case study demonstrating cost reduction achieved.

We would like to introduce a case study of the implementation of "ARCserve Replication" that our company handles. At the National Health Insurance Central Association, one of their businesses involves a system for processing claims and payments for comprehensive support for persons with disabilities. This system was experiencing operational costs and management burdens at the 47 prefectural health insurance associations that serve as the implementing bodies. Therefore, our product was introduced. As a result, without changing the business flow, it has been possible to reduce the costs borne by the health insurance associations, and it is expected that the long-awaited remote backup system can be established. [Case Study] - Industry: National Health Insurance Business, Long-term Care Insurance Business, Comprehensive Support for Persons with Disabilities - Organization Name: National Health Insurance Central Association - Challenges: System operational costs and management burdens *For more details, please refer to the PDF document or feel free to contact us.

  • Data Backup

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] SoftBank Technology Corporation (2)

Expanding as an in-house service is also in sight! A case study of achieving a replacement without stopping operations.

We would like to introduce a case study of the implementation of "Arcserve Replication r16.5 for Windows" at SoftBank Technology Corp. The company faced the challenge of migrating their file server to a larger capacity without interrupting business operations. To address this issue, they implemented our product. As a result, they successfully replicated approximately 6 million files and 3.5TB of large data to a clustered environment of Windows Server 2012 located remotely, all within a very short period. [Case Study] - Industry: Information and Communication - Company Name: SoftBank Technology Corp. - Challenge: Keeping up with the increasing data demands as the company continues to grow rapidly. *For more details, please refer to the PDF document or feel free to contact us.

  • Data Backup

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Seclore Rights Management

You can easily define and remotely control detailed usage policies.

Our company offers 'Seclore Rights Management', which can protect confidential information regardless of device or location. Files are stored across a wide range of media, including servers, emails, and mobile devices, but unauthorized users cannot access the information. Additionally, since the usage policy remains effective once granted to a file, it enables the safe use of cloud services, BYOD, and external collaboration. 【Features】 ■ Policy Federation ■ Bulk Update ■ Protection of Various Files *For more details, please download the PDF or feel free to contact us.

  • Company:CIC
  • Price:Other
  • Database
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security Services

For matters related to information security, please contact our company.

Our company provides information security services. We effectively combine our long-standing expertise in the development and operation of information systems with our knowledge of information security to propose appropriate and efficient support that meets our customers' needs. Please feel free to contact us if you have any requests. 【Service Contents】 ■ Consulting / Audit Support ■ Vulnerability Assessment / Risk Assessment Support ■ Education / Training Support ■ Information System Development Support *For more details, please download the PDF or feel free to contact us.

  • Company:CIC
  • Price:Other
  • Security Assessment
  • WAF

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web Application Vulnerability Assessment Service

Investigating major vulnerabilities that are easily exploited and have a significant impact!

We offer a "Web Application Vulnerability Diagnosis Service" to assess vulnerabilities in web applications and mobile apps. We provide a "Light Plan" that diagnoses major vulnerabilities through black box testing, a "Premium Plan" that uses CyberGym Japan's "ImmuniWeb" for vulnerability diagnosis, and a "Free Plan" that allows customization of tools and target sites. Please feel free to contact us if you have any requests. 【Features】 ■ Premium - Diagnosis using CyberGym Japan's "ImmuniWeb." Advanced vulnerabilities detected through AI machine learning. - Covers domestic and international security guidelines and advanced attack methods. ■ Light - Diagnosis for major vulnerabilities. - Can also diagnose web applications in the production environment during the operational phase. - A report summarizing the diagnosis results and countermeasures will be provided, along with a results presentation meeting. *For more details, please download the PDF or contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI Remote Vulnerability Assessment Service

High quality, high speed, efficient! All possible aspects diagnosed by our unique AI tool.

We would like to introduce our "AI Remote Vulnerability Diagnosis." Using a vulnerability scanning tool equipped with an AI engine developed independently by Ray Aegis, we conduct automated tool diagnostics, followed by detailed manual diagnostics performed by experienced assessors for items that cannot be covered by automated tools. The diagnosis is priced per FQDN, allowing for fast and cost-effective use even for web applications with many screens and features, such as media distribution services. 【Other Services】 ■ Platform Diagnosis ■ AI Quick Tool Diagnosis ■ Fast Penetration Test ■ Penetration Test *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Sandbox "CloudCoffer SandSphere"

AI technology to detect zero-day attacks! Conducting inspections through a unique four-phase process.

"CloudCoffer SandSphere" is a service developed by CloudCoffer Inc. for detecting malware. Through its proprietary AI engine, it conducts "surface analysis," "static analysis," "backdoor analysis," and "dynamic analysis" to detect unknown malware and malware that has previously evaded detection in Sandboxes. Additionally, based on customer requests, it offers services that can be conducted as a one-time event, as well as options for installation and use over a certain period. 【Features】 ■ Conducts inspections through a unique four-phase process to discover not only known malware but also variants and new types. ■ Offers flexibility in choosing between one-time services and installation/use over a certain period based on customer requests. ■ There is no need to account for the often high costs of AI Sandboxes as assets. *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Supply Chain Attack Countermeasures Vulnerability Assessment Service [Helpful Materials Provided]

Cyberattacks targeting the vulnerabilities in the manufacturing supply chain are on the rise! We are offering a document that explains the key points of necessary security measures!

At Ray Aegis Japan, we utilize our proprietary AI tools to provide vulnerability assessments conducted by over 320 highly skilled security engineers worldwide. As attacks exploiting weaknesses in the supply chain of the manufacturing industry are on the rise, what are the comprehensive security measures against cyberattacks? We are offering a document that explains the key points of necessary security measures! What are the world-class security measures? We explain them in an easy-to-understand manner! [Excerpt from the content] - Challenges of cybersecurity in the manufacturing industry - 59% have experienced a security incident? - Supply chain risks - Approaches to solving challenges *For more details, please download the PDF or contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration