Vulnerability Assessment Service Product List and Ranking from 35 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Aug 20, 2025~Sep 16, 2025
This ranking is based on the number of page views on our site.

Vulnerability Assessment Service Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Aug 20, 2025~Sep 16, 2025
This ranking is based on the number of page views on our site.

  1. ranryu Tokyo//Information and Communications
  2. B7 Tokyo//Information and Communications
  3. アイ・エフ・ティ Tokyo//Information and Communications
  4. 未来研究所 Kanagawa//Service Industry
  5. サイファー・テック Tokyo//others

Vulnerability Assessment Service Product ranking

Last Updated: Aggregation Period:Aug 20, 2025~Sep 16, 2025
This ranking is based on the number of page views on our site.

  1. Ministry of Economy, Trade and Industry Certified | Vulnerability Diagnosis Service and Testing Service [Fully Remote] ranryu
  2. 『Trellix Protect』 B7
  3. Ministry of Economy, Trade and Industry Certified | Web Application Vulnerability Assessment Service ranryu
  4. Cybersecurity Vulnerability Assessment Service "Aegis EW" 未来研究所
  5. 4 Platform Vulnerability Assessment Service アイ・エフ・ティ

Vulnerability Assessment Service Product List

46~60 item / All 60 items

Displayed results

Hybrid Web Application Vulnerability Assessment Service

In addition to the automated diagnostic tool, manual diagnostics will be conducted by a technician.

We offer hybrid web application vulnerability assessments. By focusing on vulnerabilities that are difficult to detect with automated diagnostic tools, we provide a more detailed and reliable vulnerability assessment than quick web application diagnostics. Please feel free to contact us if you have any requests. 【Assessment Items】 ■ Vulnerabilities related to input and output ■ Vulnerabilities related to authentication ■ Vulnerabilities related to authorization ■ Session management ■ Vulnerabilities related to web servers ■ Vulnerabilities related to Web 2.0 *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Platform Vulnerability Assessment Service

We will investigate whether there are any vulnerabilities that can be attacked from the outside.

We offer platform vulnerability assessments. By conducting not only web application vulnerability assessments but also platform vulnerability assessments, we can strengthen measures against unauthorized access and provide a safe environment for users of the site. Please feel free to contact us if you have any requests. 【Assessment Items】 ■ Host scanning ■ Vulnerabilities related to authentication ■ Vulnerabilities in network devices ■ Vulnerabilities in web servers ■ Vulnerabilities in various operating systems ■ Malicious software *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Numerous Implementation Results: Targeted Attack Email Response Training Service to Protect the Manufacturing Industry

Improving security awareness comes from training and education. Cybersecurity measures to protect the manufacturing industry from increasingly serious cyber attacks every day!

"Training is conducted every year, but since the content is the same, we want some changes." "We would like to customize the training content to fit our company's circumstances." Are you facing any issues? SCC's "Training Service" allows for training that closely resembles normal operations by varying the content and difficulty of email messages according to job positions. By including training for affiliated and group companies, we aim to enhance the overall understanding of the organization's situation and improve security awareness. Additionally, the educational content can be customized to fit the customer's circumstances. [Features] ■ Diverse email templates ■ Abundant customization options ■ Enhanced educational services *For more details, please refer to the PDF materials or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ray-SOC Service

Supporting safe business operations! A specialized team provides centralized monitoring of all networks.

We would like to introduce our "Ray-SOC Service." This service monitors logs from network devices and security equipment, primarily focusing on firewalls and VPN connection devices, in real-time or at regular intervals. It enables the early detection and response to abnormal communications and trends, such as attempts of intrusion from external sources. Additionally, our standard plan for this service is available from 108,000 yen per month, and we can customize the service content to fit your budget and security policy. 【Monitoring Targets (Partial)】 ■ Network Devices ■ Authentication Servers ■ Antivirus ■ Firewalls *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Dark web exploration service

Investigating the risk of information leakage! Services provided by one of the world's largest groups of white hat hackers.

Our "Dark Web Exploration Service" is a one-stop service that enables early detection of any potential information leaks concerning our clients, thereby strengthening cybersecurity. Our company, which boasts over 320 white-hat hackers, one of the largest groups in the world, conducts investigations on the dark web based on specified keywords to identify the potential risks to our clients' information. Through our customized reports, clients can verify the risks associated with their information. [Service Coverage] ■ Information leaks and information breaches *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Fast Penetration Test

Devices facing the internet, such as firewalls and mail servers!

Our "Fast Penetration Test" utilizes not only commonly used tools but also our proprietary AI tools. It detects advanced attacks such as business logic flaws, DoS, and zero-day attacks. We also attempt attacks that mimic actual hacker techniques and combine multiple vulnerabilities. Thanks to this advanced technology and unique tools, we can conduct tests in a short period and discover vulnerabilities that are generally difficult to find. 【Pricing Features】 ■ Course-based pricing - A tiered pricing structure is set to ensure that smaller systems are more affordable. ■ Fixed pricing - Regardless of the number of pages or requests, we offer a fixed pricing model per "IP address/FQDN/application" to meet our customers' needs. *For more details, please refer to the PDF materials or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『Trellix Protect』

Smart protection with Trellix Protect, strong preparedness, and forward-looking security.

Trellix Protect is a security solution that combines Endpoint Protection (EPP) and Endpoint Detection and Response (EDR) capabilities. It is designed to protect organizations from sophisticated cyber threats using advanced AI and machine learning technologies. With Trellix Protect, you can secure your defenses intelligently, prepare robustly, and anticipate future threats. 【Key Features】 ■ Detects and blocks malware using an advanced AI engine. ■ Continuously monitors and analyzes endpoint behavior. ■ Implements multi-layered defenses against ransomware. ■ Utilizes cloud-based threat intelligence in real-time. ■ Predicts zero-day attacks using machine learning and defends in advance. ■ Automatically scans and identifies endpoint vulnerabilities. *For more details, please refer to the related links or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

System support service

We provide total support from the construction of the infrastructure environment to operation and maintenance.

We offer various system support services. We provide systems tailored to our customers' needs, from requirements definition to design and development. Additionally, we offer services focused on proposals, requirements definition, design and construction, as well as server infrastructure setup and equipment kitting, all while keeping operations in mind. Furthermore, we provide total support services for systems, including project management for information systems departments, support for smooth system operations, and operational management of hardware and software. 【Services】 ■ Design ■ Construction ■ Service Desk ■ Operations *For more details, please download the PDF or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ministry of Economy, Trade and Industry Certified | Vulnerability Diagnosis Service and Testing Service [Fully Remote]

Enhancing web security with vulnerability assessments certified by the Ministry of Economy, Trade and Industry, regardless of industry or size.

Are you ignoring the "invisible risks" of web services? Don't just stop at "discovering" vulnerabilities. We provide actionable support all the way to remediation and improvement. ■ Do you have these concerns? - You think you are taking security measures, but you have never confirmed them from an external perspective. - You want to ensure the safety of your web services or internal systems before their release. - You are being asked by clients or business partners to submit a diagnostic report. - You want to effectively identify security risks within a limited budget. ■ What is ranryu's vulnerability assessment service? Ranryu Co., Ltd. is registered as a compliant business under the Ministry of Economy, Trade and Industry's "Information Security Service Standards." Our engineers, who hold CEH and Information Processing Security Support Specialist certifications, provide vulnerability assessments for web services and business systems. Our distinguishing feature is that we not only conduct assessments but also provide concrete countermeasure support for identified risks and can consistently assist in reviewing security policies. With a wealth of experience in system development and infrastructure construction, we offer technical advice and implementation support to ensure that diagnostic results are not left "as is." We support the strengthening of your security from a realistic perspective.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ministry of Economy, Trade and Industry Certified | Web Application Vulnerability Assessment Service

"Ministry of Economy, Trade and Industry registered services × Expert diagnosis × Ongoing support" Total support for visualizing, improving, and maintaining web application security.

Ranryu's "Web Application Vulnerability Diagnosis Service" is a highly reliable diagnostic service registered on the IPA public list as a service compliant with the Ministry of Economy, Trade and Industry's "Information Security Service Standards." Not limited to mere tool diagnostics, it combines manual diagnostics by security engineers to prevent false positives and oversights. Furthermore, after the diagnosis, it offers improvement proposals, reporting sessions, re-diagnosis, and continuous monitoring, providing effective and reassuring security measures. ■ Features and PR Points - Peace of mind from public certification: Registered service with the Ministry of Economy, Trade and Industry and IPA - Four flexible plans to choose from: Ranging from cost-focused to thorough diagnostics - Detailed reports leading to improvements: Evaluations based on OWASP and IPA standards, along with correction proposals - Site seal provision: Visualizes completed diagnostics to instill trust in clients and customers - Regular diagnostic packages: 2 to 4 diagnostics per year plus re-diagnosis to continuously improve security levels.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cybersecurity Vulnerability Assessment Service "Aegis EW"

Your homepage is being targeted! You can check the diagnosis results in your browser.

"Aegis EW" is a platform diagnostic SaaS application that allows for ASM diagnostics and vulnerability assessments without the need to install any tools. It enables management of all platform diagnostics through a dashboard with a common GUI. Using tools equivalent to those of hackers, it identifies attack surfaces and leaked information. 【Features】 ■ User-friendly GUI for the dashboard ■ Powerful ASM and vulnerability diagnostics ■ Centralized management of all platform diagnostics ■ Reasonably priced *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI Remote Vulnerability Assessment Service

High quality, high speed, efficient! All possible aspects diagnosed by our unique AI tool.

We would like to introduce our "AI Remote Vulnerability Diagnosis." Using a vulnerability scanning tool equipped with an AI engine developed independently by Ray Aegis, we conduct automated tool diagnostics, followed by detailed manual diagnostics performed by experienced assessors for items that cannot be covered by automated tools. The diagnosis is priced per FQDN, allowing for fast and cost-effective use even for web applications with many screens and features, such as media distribution services. 【Other Services】 ■ Platform Diagnosis ■ AI Quick Tool Diagnosis ■ Fast Penetration Test ■ Penetration Test *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Sandbox "CloudCoffer SandSphere"

AI technology to detect zero-day attacks! Conducting inspections through a unique four-phase process.

"CloudCoffer SandSphere" is a service developed by CloudCoffer Inc. for detecting malware. Through its proprietary AI engine, it conducts "surface analysis," "static analysis," "backdoor analysis," and "dynamic analysis" to detect unknown malware and malware that has previously evaded detection in Sandboxes. Additionally, based on customer requests, it offers services that can be conducted as a one-time event, as well as options for installation and use over a certain period. 【Features】 ■ Conducts inspections through a unique four-phase process to discover not only known malware but also variants and new types. ■ Offers flexibility in choosing between one-time services and installation/use over a certain period based on customer requests. ■ There is no need to account for the often high costs of AI Sandboxes as assets. *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Penetration test

Over 1,600 high-quality diagnoses achieved annually! With one year of after-support, re-diagnosis is possible as many times as needed.

Our "penetration testing" complies with PCI DSS v4.0 requirements. We have over 320 qualified security engineers. In addition to PCI DSS requirements, we have a track record of penetration testing and red team operations for financial institutions and government agencies in various countries. Additionally, we utilize not only commonly used tools but also our proprietary AI tools to detect advanced attacks such as business logic flaws, DoS, and zero-day attacks. 【Features】 ■ Complies with PCI DSS v4.0 requirements ■ Over 320 qualified personnel and more than 1,600 high-quality assessments annually ■ Re-assessment available as many times as needed with one year of after-support ■ Clear service plans *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Supply Chain Attack Countermeasures Vulnerability Assessment Service [Helpful Materials Provided]

Cyberattacks targeting the vulnerabilities in the manufacturing supply chain are on the rise! We are offering a document that explains the key points of necessary security measures!

At Ray Aegis Japan, we utilize our proprietary AI tools to provide vulnerability assessments conducted by over 320 highly skilled security engineers worldwide. As attacks exploiting weaknesses in the supply chain of the manufacturing industry are on the rise, what are the comprehensive security measures against cyberattacks? We are offering a document that explains the key points of necessary security measures! What are the world-class security measures? We explain them in an easy-to-understand manner! [Excerpt from the content] - Challenges of cybersecurity in the manufacturing industry - 59% have experienced a security incident? - Supply chain risks - Approaches to solving challenges *For more details, please download the PDF or contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration