Vulnerability Assessment Service Product List and Ranking from 36 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Oct 08, 2025~Nov 04, 2025
This ranking is based on the number of page views on our site.

Vulnerability Assessment Service Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Oct 08, 2025~Nov 04, 2025
This ranking is based on the number of page views on our site.

  1. レイ・イージス・ジャパン Tokyo//Information and Communications
  2. M&K Tokyo//Information and Communications
  3. スプライン・ネットワーク Tokyo//others
  4. 4 バルク Tokyo//Information and Communications
  5. 4 ranryu Tokyo//Information and Communications

Vulnerability Assessment Service Product ranking

Last Updated: Aggregation Period:Oct 08, 2025~Nov 04, 2025
This ranking is based on the number of page views on our site.

  1. Vulnerability Assessment Service "Security Blanket Series" M&K
  2. Ministry of Economy, Trade and Industry Certified | Web Application Vulnerability Assessment Service ranryu
  3. WiSAS Vulnerability Assessment スプライン・ネットワーク
  4. Mobile App Diagnosis Essential Edition サイファー・テック
  5. 4 Automated Vulnerability Diagnosis Service "SCT SECURE Cloud Scan" 三和コムテック

Vulnerability Assessment Service Product List

46~60 item / All 62 items

Displayed results

Operational Service "SIV-SOC"

Providing continuous operational services tailored to the customer's environment!

We offer the operational operation service 'SIV-SOC' that can be utilized at a reasonable (appropriate) price. "We want to start a private SOC but can't take the plunge due to costs," or "Even with a large volume, some products are not supported," we will solve the issues your company is facing. Please feel free to contact us first. 【Features】 ■ Achieves continuous operations and flexible operations that are difficult to achieve in-house ■ Reasonable (appropriate) pricing ■ Allows for flexible utilization tailored to each customer and product ■ Enables consistency in operations and cost optimization *For more details, please download the PDF or feel free to contact us.

  • Security Assessment
  • Other Management Services

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Malware Sandbox "Hatching Triage"

A sandbox capable of malware detection and large-scale analysis. It quickly analyzes information about threats and minimizes damage.

A cross-platform (Windows, Android, Linux, and macOS) sandbox capable of malware detection and large-scale analysis. By using a protected area isolated from the areas users typically utilize, it allows for rapid analysis of threat-related information during malware detection or when issues arise from problematic programs, helping to minimize damage. It adopts a unique architecture from Hatching Inc. and is designed as a distributed solution. It achieves high-speed and scalable sandboxing and accelerates malware analysis, enabling an unprecedented 500,000 analyses per day as a sandbox service. It also offers features such as simple scoring, preset analysis settings, real-time viewable analysis results, and clear reports. This allows for quicker and more concise situational judgment and information sharing. Triage is utilized for cybersecurity by large corporations, internal security teams, security service providers, and niche information security experts.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

Diagnosing system vulnerabilities using tools specifically for vulnerability assessment and manual testing by white hat hackers!

We offer "vulnerability assessments (security assessments)" to diagnose whether there are vulnerabilities in networks, operating systems, middleware, and web applications. By conducting a vulnerability assessment and checking the current security status of networks/servers and web applications, it is possible to prevent risks such as malicious attacks from attackers and information leakage incidents in advance. Please feel free to contact us if you have any requests. 【Assessment Targets】 ■ Web applications, etc. ■ Web servers and databases ■ Network services *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Data protection product "Shadow Desktop"

Comprehensive measures can be taken for information leakage prevention in case of PC loss, BCP measures, and backups!

"Shadow Desktop" is a data-less client product that creates a state where data does not physically exist on the device by simply installing software on an existing PC and storing the data within the PC to external storage such as the cloud. Since it can be used as if the data is local, it significantly enhances security and data protection performance without compromising usability and productivity. 【Features】 ■ Virtualization of data only to the cloud ■ A new form that imposes no burden on either companies or users ■ The secret is a virtual drive *For more details, please download the PDF or feel free to contact us.

  • Data Backup

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Privacy protection software 'Steganos'

Encrypt and store safely! No ads, complete protection of security and privacy.

"Steganos" is privacy protection software that includes features such as encryption, VPN, and password management. It provides encrypted private access to the internet. Your real IP address is replaced with one randomly selected from the product's IP addresses. This makes it more difficult to track your online activities. Please feel free to contact us for any inquiries. 【Features】 <Steganos VPN Online Shield> ■ Protects your connection ■ Blocks ads ■ Prevents tracking ■ Automatically deletes cookies ■ Anonymizes browser type *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

EAZ Solution

Offering a series of Windows instant restore products! Featuring options like "Eazy Fix."

"EAZ Solution" provides software that addresses risks related to information security, availability, compliance, and system performance. Our lineup includes "Baseline Shield," which protects computers from unwanted changes, and "EFI System Cloner," a system cloning software. Please feel free to contact us when you need assistance. 【Lineup】 ■Eazy Fix ■Baseline Shield ■Eazy Fix EndPoint Manager ■EFI System Cloner *For more details, please check the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

VMRay

We will conduct a detailed analysis of the selected samples.

VMRay is a platform that integrates threat information and immediately identifies anything that can clearly be determined as malware. It does so without allowing malware to recognize it as a sandbox, while still possessing high analytical capabilities. You can choose between a cloud version and an on-premises version. In the case of on-premises, we can procure the equipment and carry out the integration. Please feel free to contact us for details on pricing and licensing. 【Product Lineup】 ■VMRay DeepResponse ■VMRay FinalVerdict ■VMRay TotalInsight *For more details, please download the PDF or feel free to contact us.

  • Analysis and prediction system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Hybrid Web Application Vulnerability Assessment Service

In addition to the automated diagnostic tool, manual diagnostics will be conducted by a technician.

We offer hybrid web application vulnerability assessments. By focusing on vulnerabilities that are difficult to detect with automated diagnostic tools, we provide a more detailed and reliable vulnerability assessment than quick web application diagnostics. Please feel free to contact us if you have any requests. 【Assessment Items】 ■ Vulnerabilities related to input and output ■ Vulnerabilities related to authentication ■ Vulnerabilities related to authorization ■ Session management ■ Vulnerabilities related to web servers ■ Vulnerabilities related to Web 2.0 *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Numerous Implementation Results: Targeted Attack Email Response Training Service to Protect the Manufacturing Industry

Improving security awareness comes from training and education. Cybersecurity measures to protect the manufacturing industry from increasingly serious cyber attacks every day!

"Training is conducted every year, but since the content is the same, we want some changes." "We would like to customize the training content to fit our company's circumstances." Are you facing any issues? SCC's "Training Service" allows for training that closely resembles normal operations by varying the content and difficulty of email messages according to job positions. By including training for affiliated and group companies, we aim to enhance the overall understanding of the organization's situation and improve security awareness. Additionally, the educational content can be customized to fit the customer's circumstances. [Features] ■ Diverse email templates ■ Abundant customization options ■ Enhanced educational services *For more details, please refer to the PDF materials or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

High-speed, high-quality vulnerability assessment using AI tools!

We utilize RayAegis' unique AI tools to provide vulnerability assessments conducted by over 250 advanced security engineers worldwide. With our AI × Security approach, which we have practiced since our founding, we can offer comprehensive diagnostic services that maintain quality in a short period, even for the increasing number of systems each year. Please feel free to contact us if you have any requests. 【Features】 ■ A package pricing system based on FQDN units that becomes more cost-effective as the environment scales ■ No need for preliminary narrowing down of diagnostic targets when making a request ■ The information we need to gather in advance is very simple ■ Short duration and high quality *For more details, please download the PDF or contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ray-SOC Service

Supporting safe business operations! A specialized team provides centralized monitoring of all networks.

We would like to introduce our "Ray-SOC Service." This service monitors logs from network devices and security equipment, primarily focusing on firewalls and VPN connection devices, in real-time or at regular intervals. It enables the early detection and response to abnormal communications and trends, such as attempts of intrusion from external sources. Additionally, our standard plan for this service is available from 108,000 yen per month, and we can customize the service content to fit your budget and security policy. 【Monitoring Targets (Partial)】 ■ Network Devices ■ Authentication Servers ■ Antivirus ■ Firewalls *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Smartphone application vulnerability assessment service

We are conducting static diagnostics using diagnosable source code.

We offer vulnerability assessments for smartphone applications. We check for issues in the code within iOS/Android smartphone applications, whether unauthorized communication occurs, and the risk of content tampering. Please feel free to contact us if you have any requests. 【Assessment Items】 ■Common inspections for Android/iOS apps ■Inspections specific to Android apps ■Inspections specific to iOS apps ■Inspections related to communication with APIs *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

WiSAS Vulnerability Assessment

We provide visualization and optimization support for comfortable use of Wi-Fi environments, as well as prevention of information leaks due to unauthorized use and cyber attacks.

By acquiring the radio waves of the wireless network (Wi-Fi) and analyzing them from six security perspectives, we visualize the vulnerabilities and issues lurking in the Wi-Fi environment, preventing threats before they occur. Additionally, it is also possible to eliminate threats using location information analysis (optional). You can understand the dangerous use of Wi-Fi that directly leads to information leakage. By installing WiSAS sensors in the target area and visualizing the Wi-Fi usage, we conduct investigations and analyses from a security standpoint.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

E-book protection (viewing restrictions, copy prevention) solution

Building and providing eBook sales and subscription services! Protect eBooks with access restrictions and copy prevention.

We want to protect Japanese information with Japanese technology. Driven by this desire, our company has been engaged in product development and continues to provide the uniquely developed DRM solution 'CypherGuard.' 'CypherGuard' protects e-books and prevents unauthorized use by restricting viewers and viewing periods through its "license management function" and by preventing screen duplication such as capture actions. In the business sector, it is used by customers in manufacturing, infrastructure, and government agencies. 【Features】 ■ Protects digital content by restricting viewers and viewing periods and preventing screen duplication such as capture actions through the license management function. ■ Allows the setting of distribution rules such as dates and the number of devices. ■ Provides services tailored to the sales format of books (purchase, unlimited reading) and the implementation environment (user management, license authentication server). *For more details, please refer to the PDF document or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Targeted Attack Email Response Training Service

We offer various training on security.

We provide training for responding to targeted phishing emails. Targeted phishing emails are cleverly disguised and are characterized by appearing to be legitimate. It is effective to regularly conduct training to firmly establish the points to check in emails and to make this a habit. Please feel free to contact us if you have any requests. 【Flow of Targeted Phishing Email Response Training】 1. Pre-training 2. Sending targeted phishing emails (within the scope of our service) 3. Detection of response errors (within the scope of our service) 4. Reporting detection results (within the scope of our service) 5. Post-training 6. Survey *For more details, please download the PDF or feel free to contact us.

  • Company:CIC
  • Price:Other
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration