Vulnerability Assessment Service Product List and Ranking from 35 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Aug 20, 2025~Sep 16, 2025
This ranking is based on the number of page views on our site.

Vulnerability Assessment Service Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Aug 20, 2025~Sep 16, 2025
This ranking is based on the number of page views on our site.

  1. ranryu Tokyo//Information and Communications
  2. B7 Tokyo//Information and Communications
  3. アイ・エフ・ティ Tokyo//Information and Communications
  4. 未来研究所 Kanagawa//Service Industry
  5. サイファー・テック Tokyo//others

Vulnerability Assessment Service Product ranking

Last Updated: Aggregation Period:Aug 20, 2025~Sep 16, 2025
This ranking is based on the number of page views on our site.

  1. Ministry of Economy, Trade and Industry Certified | Vulnerability Diagnosis Service and Testing Service [Fully Remote] ranryu
  2. 『Trellix Protect』 B7
  3. Ministry of Economy, Trade and Industry Certified | Web Application Vulnerability Assessment Service ranryu
  4. Cybersecurity Vulnerability Assessment Service "Aegis EW" 未来研究所
  5. 4 Platform Vulnerability Assessment Service アイ・エフ・ティ

Vulnerability Assessment Service Product List

31~45 item / All 60 items

Displayed results

How to Protect Important Data in Your Workplace Explained in Manga

We solve your concerns regarding industry-specific backup for schools, hospitals, manufacturing, and more!

This document explains easy and reliable data protection achieved with the "Arcserve series" through manga. It includes a school edition set in a certain school, as well as editions for hospitals, manufacturing, construction, government agencies, and property insurance companies. We solve backup-related concerns specific to each industry. [Contents] ■ School Edition ■ Hospital Edition ■ Manufacturing Edition ■ Construction Edition ■ Government Agency Edition ■ Property Insurance Company Edition *Please be sure to check it out by downloading the PDF below!

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Happy Corporation

Practicing system protection operations while managing the main business! A case that eliminated the risk of time lag.

We would like to introduce the case study of "Arcserve High Availability / Arcserve D2D" implemented at Happy Co., Ltd. The company has garnered significant attention with its "Care Maintenance" service, which cleans clothes by simultaneously treating both water-based and oil-based stains while protecting the fabric. They are also focusing on IT utilization by thoroughly managing the entrusted garments with an "electronic medical record system." To further strengthen the protection of such critical systems, they implemented "Arcserve High Availability" for data replication and "Arcserve D2D" for image backup. As a result, they achieved a high level of business continuity improvement while completing operations with in-house staff. [Case Study] - Industry: Clothing Reproduction Processing - Company Name: Happy Co., Ltd. *For more details, please refer to the PDF document or feel free to contact us.*

  • Data Backup

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] Public Interest Incorporated Association National Health Insurance Central Association

Real-time data sharing over long distances! A case study demonstrating cost reduction achieved.

We would like to introduce a case study of the implementation of "ARCserve Replication" that our company handles. At the National Health Insurance Central Association, one of their businesses involves a system for processing claims and payments for comprehensive support for persons with disabilities. This system was experiencing operational costs and management burdens at the 47 prefectural health insurance associations that serve as the implementing bodies. Therefore, our product was introduced. As a result, without changing the business flow, it has been possible to reduce the costs borne by the health insurance associations, and it is expected that the long-awaited remote backup system can be established. [Case Study] - Industry: National Health Insurance Business, Long-term Care Insurance Business, Comprehensive Support for Persons with Disabilities - Organization Name: National Health Insurance Central Association - Challenges: System operational costs and management burdens *For more details, please refer to the PDF document or feel free to contact us.

  • Data Backup

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] SoftBank Technology Corporation (2)

Expanding as an in-house service is also in sight! A case study of achieving a replacement without stopping operations.

We would like to introduce a case study of the implementation of "Arcserve Replication r16.5 for Windows" at SoftBank Technology Corp. The company faced the challenge of migrating their file server to a larger capacity without interrupting business operations. To address this issue, they implemented our product. As a result, they successfully replicated approximately 6 million files and 3.5TB of large data to a clustered environment of Windows Server 2012 located remotely, all within a very short period. [Case Study] - Industry: Information and Communication - Company Name: SoftBank Technology Corp. - Challenge: Keeping up with the increasing data demands as the company continues to grow rapidly. *For more details, please refer to the PDF document or feel free to contact us.

  • Data Backup

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Seclore Rights Management

You can easily define and remotely control detailed usage policies.

Our company offers 'Seclore Rights Management', which can protect confidential information regardless of device or location. Files are stored across a wide range of media, including servers, emails, and mobile devices, but unauthorized users cannot access the information. Additionally, since the usage policy remains effective once granted to a file, it enables the safe use of cloud services, BYOD, and external collaboration. 【Features】 ■ Policy Federation ■ Bulk Update ■ Protection of Various Files *For more details, please download the PDF or feel free to contact us.

  • Company:CIC
  • Price:Other
  • Database
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security Services

For matters related to information security, please contact our company.

Our company provides information security services. We effectively combine our long-standing expertise in the development and operation of information systems with our knowledge of information security to propose appropriate and efficient support that meets our customers' needs. Please feel free to contact us if you have any requests. 【Service Contents】 ■ Consulting / Audit Support ■ Vulnerability Assessment / Risk Assessment Support ■ Education / Training Support ■ Information System Development Support *For more details, please download the PDF or feel free to contact us.

  • Company:CIC
  • Price:Other
  • Security Assessment
  • WAF

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Targeted Attack Email Response Training Service

We offer various training on security.

We provide training for responding to targeted phishing emails. Targeted phishing emails are cleverly disguised and are characterized by appearing to be legitimate. It is effective to regularly conduct training to firmly establish the points to check in emails and to make this a habit. Please feel free to contact us if you have any requests. 【Flow of Targeted Phishing Email Response Training】 1. Pre-training 2. Sending targeted phishing emails (within the scope of our service) 3. Detection of response errors (within the scope of our service) 4. Reporting detection results (within the scope of our service) 5. Post-training 6. Survey *For more details, please download the PDF or feel free to contact us.

  • Company:CIC
  • Price:Other
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web Application Vulnerability Assessment Service

Investigating major vulnerabilities that are easily exploited and have a significant impact!

We offer a "Web Application Vulnerability Diagnosis Service" to assess vulnerabilities in web applications and mobile apps. We provide a "Light Plan" that diagnoses major vulnerabilities through black box testing, a "Premium Plan" that uses CyberGym Japan's "ImmuniWeb" for vulnerability diagnosis, and a "Free Plan" that allows customization of tools and target sites. Please feel free to contact us if you have any requests. 【Features】 ■ Premium - Diagnosis using CyberGym Japan's "ImmuniWeb." Advanced vulnerabilities detected through AI machine learning. - Covers domestic and international security guidelines and advanced attack methods. ■ Light - Diagnosis for major vulnerabilities. - Can also diagnose web applications in the production environment during the operational phase. - A report summarizing the diagnosis results and countermeasures will be provided, along with a results presentation meeting. *For more details, please download the PDF or contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Operational Service "SIV-SOC"

Providing continuous operational services tailored to the customer's environment!

We offer the operational operation service 'SIV-SOC' that can be utilized at a reasonable (appropriate) price. "We want to start a private SOC but can't take the plunge due to costs," or "Even with a large volume, some products are not supported," we will solve the issues your company is facing. Please feel free to contact us first. 【Features】 ■ Achieves continuous operations and flexible operations that are difficult to achieve in-house ■ Reasonable (appropriate) pricing ■ Allows for flexible utilization tailored to each customer and product ■ Enables consistency in operations and cost optimization *For more details, please download the PDF or feel free to contact us.

  • Security Assessment
  • Other Management Services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Malware Sandbox "Hatching Triage"

A sandbox capable of malware detection and large-scale analysis. It quickly analyzes information about threats and minimizes damage.

A cross-platform (Windows, Android, Linux, and macOS) sandbox capable of malware detection and large-scale analysis. By using a protected area isolated from the areas users typically utilize, it allows for rapid analysis of threat-related information during malware detection or when issues arise from problematic programs, helping to minimize damage. It adopts a unique architecture from Hatching Inc. and is designed as a distributed solution. It achieves high-speed and scalable sandboxing and accelerates malware analysis, enabling an unprecedented 500,000 analyses per day as a sandbox service. It also offers features such as simple scoring, preset analysis settings, real-time viewable analysis results, and clear reports. This allows for quicker and more concise situational judgment and information sharing. Triage is utilized for cybersecurity by large corporations, internal security teams, security service providers, and niche information security experts.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

Diagnosing system vulnerabilities using tools specifically for vulnerability assessment and manual testing by white hat hackers!

We offer "vulnerability assessments (security assessments)" to diagnose whether there are vulnerabilities in networks, operating systems, middleware, and web applications. By conducting a vulnerability assessment and checking the current security status of networks/servers and web applications, it is possible to prevent risks such as malicious attacks from attackers and information leakage incidents in advance. Please feel free to contact us if you have any requests. 【Assessment Targets】 ■ Web applications, etc. ■ Web servers and databases ■ Network services *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Data protection product "Shadow Desktop"

Comprehensive measures can be taken for information leakage prevention in case of PC loss, BCP measures, and backups!

"Shadow Desktop" is a data-less client product that creates a state where data does not physically exist on the device by simply installing software on an existing PC and storing the data within the PC to external storage such as the cloud. Since it can be used as if the data is local, it significantly enhances security and data protection performance without compromising usability and productivity. 【Features】 ■ Virtualization of data only to the cloud ■ A new form that imposes no burden on either companies or users ■ The secret is a virtual drive *For more details, please download the PDF or feel free to contact us.

  • Data Backup

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Privacy protection software 'Steganos'

Encrypt and store safely! No ads, complete protection of security and privacy.

"Steganos" is privacy protection software that includes features such as encryption, VPN, and password management. It provides encrypted private access to the internet. Your real IP address is replaced with one randomly selected from the product's IP addresses. This makes it more difficult to track your online activities. Please feel free to contact us for any inquiries. 【Features】 <Steganos VPN Online Shield> ■ Protects your connection ■ Blocks ads ■ Prevents tracking ■ Automatically deletes cookies ■ Anonymizes browser type *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

EAZ Solution

Offering a series of Windows instant restore products! Featuring options like "Eazy Fix."

"EAZ Solution" provides software that addresses risks related to information security, availability, compliance, and system performance. Our lineup includes "Baseline Shield," which protects computers from unwanted changes, and "EFI System Cloner," a system cloning software. Please feel free to contact us when you need assistance. 【Lineup】 ■Eazy Fix ■Baseline Shield ■Eazy Fix EndPoint Manager ■EFI System Cloner *For more details, please check the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

VMRay

We will conduct a detailed analysis of the selected samples.

VMRay is a platform that integrates threat information and immediately identifies anything that can clearly be determined as malware. It does so without allowing malware to recognize it as a sandbox, while still possessing high analytical capabilities. You can choose between a cloud version and an on-premises version. In the case of on-premises, we can procure the equipment and carry out the integration. Please feel free to contact us for details on pricing and licensing. 【Product Lineup】 ■VMRay DeepResponse ■VMRay FinalVerdict ■VMRay TotalInsight *For more details, please download the PDF or feel free to contact us.

  • Analysis and prediction system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration