Vulnerability Assessment Service - メーカー・企業37社の製品一覧とランキング

更新日: 集計期間:Nov 26, 2025~Dec 23, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

Vulnerability Assessment Serviceのメーカー・企業ランキング

更新日: 集計期間:Nov 26, 2025~Dec 23, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. 株式会社クロスポイントソリューション 株式会社クロスポイントソリューション Tokyo//Information and Communications
  2. バルク Tokyo//Information and Communications
  3. レイ・イージス・ジャパン Tokyo//Information and Communications
  4. 4 テガラ 本社 Shizuoka//Trading company/Wholesale
  5. 4 ゲイトウェイ・コンピュータ 東京本社 Tokyo//Information and Communications

Vulnerability Assessment Serviceの製品ランキング

更新日: 集計期間:Nov 26, 2025~Dec 23, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. Information Security Management Solution "MCSGLOBAL" 株式会社クロスポイントソリューション 株式会社クロスポイントソリューション
  2. Malware Sandbox "Hatching Triage" テガラ 本社
  3. AI Vulnerability Diagnosis Service "V-threat" バルク
  4. Security Risk Analysis "V-sec" バルク
  5. 4 Fast Penetration Test レイ・イージス・ジャパン

Vulnerability Assessment Serviceの製品一覧

46~60 件を表示 / 全 63 件

表示件数

Supply Chain Attack Countermeasures Vulnerability Assessment Service [Helpful Materials Provided]

Cyberattacks targeting the vulnerabilities in the manufacturing supply chain are on the rise! We are offering a document that explains the key points of necessary security measures!

At Ray Aegis Japan, we utilize our proprietary AI tools to provide vulnerability assessments conducted by over 320 highly skilled security engineers worldwide. As attacks exploiting weaknesses in the supply chain of the manufacturing industry are on the rise, what are the comprehensive security measures against cyberattacks? We are offering a document that explains the key points of necessary security measures! What are the world-class security measures? We explain them in an easy-to-understand manner! [Excerpt from the content] - Challenges of cybersecurity in the manufacturing industry - 59% have experienced a security incident? - Supply chain risks - Approaches to solving challenges *For more details, please download the PDF or contact us.

  • Security Assessment

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Operational Service "SIV-SOC"

Providing continuous operational services tailored to the customer's environment!

We offer the operational operation service 'SIV-SOC' that can be utilized at a reasonable (appropriate) price. "We want to start a private SOC but can't take the plunge due to costs," or "Even with a large volume, some products are not supported," we will solve the issues your company is facing. Please feel free to contact us first. 【Features】 ■ Achieves continuous operations and flexible operations that are difficult to achieve in-house ■ Reasonable (appropriate) pricing ■ Allows for flexible utilization tailored to each customer and product ■ Enables consistency in operations and cost optimization *For more details, please download the PDF or feel free to contact us.

  • Security Assessment
  • Other Management Services

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Malware Sandbox "Hatching Triage"

A sandbox capable of malware detection and large-scale analysis. It quickly analyzes information about threats and minimizes damage.

A cross-platform (Windows, Android, Linux, and macOS) sandbox capable of malware detection and large-scale analysis. By using a protected area isolated from the areas users typically utilize, it allows for rapid analysis of threat-related information during malware detection or when issues arise from problematic programs, helping to minimize damage. It adopts a unique architecture from Hatching Inc. and is designed as a distributed solution. It achieves high-speed and scalable sandboxing and accelerates malware analysis, enabling an unprecedented 500,000 analyses per day as a sandbox service. It also offers features such as simple scoring, preset analysis settings, real-time viewable analysis results, and clear reports. This allows for quicker and more concise situational judgment and information sharing. Triage is utilized for cybersecurity by large corporations, internal security teams, security service providers, and niche information security experts.

  • Security Assessment

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Vulnerability Assessment Service

Diagnosing system vulnerabilities using tools specifically for vulnerability assessment and manual testing by white hat hackers!

We offer "vulnerability assessments (security assessments)" to diagnose whether there are vulnerabilities in networks, operating systems, middleware, and web applications. By conducting a vulnerability assessment and checking the current security status of networks/servers and web applications, it is possible to prevent risks such as malicious attacks from attackers and information leakage incidents in advance. Please feel free to contact us if you have any requests. 【Assessment Targets】 ■ Web applications, etc. ■ Web servers and databases ■ Network services *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Data protection product "Shadow Desktop"

Comprehensive measures can be taken for information leakage prevention in case of PC loss, BCP measures, and backups!

"Shadow Desktop" is a data-less client product that creates a state where data does not physically exist on the device by simply installing software on an existing PC and storing the data within the PC to external storage such as the cloud. Since it can be used as if the data is local, it significantly enhances security and data protection performance without compromising usability and productivity. 【Features】 ■ Virtualization of data only to the cloud ■ A new form that imposes no burden on either companies or users ■ The secret is a virtual drive *For more details, please download the PDF or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Privacy protection software 'Steganos'

Encrypt and store safely! No ads, complete protection of security and privacy.

"Steganos" is privacy protection software that includes features such as encryption, VPN, and password management. It provides encrypted private access to the internet. Your real IP address is replaced with one randomly selected from the product's IP addresses. This makes it more difficult to track your online activities. Please feel free to contact us for any inquiries. 【Features】 <Steganos VPN Online Shield> ■ Protects your connection ■ Blocks ads ■ Prevents tracking ■ Automatically deletes cookies ■ Anonymizes browser type *For more details, please refer to the related links or feel free to contact us.

  • 企業:B7
  • 価格:Other
  • Other Software

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

EAZ Solution

Offering a series of Windows instant restore products! Featuring options like "Eazy Fix."

"EAZ Solution" provides software that addresses risks related to information security, availability, compliance, and system performance. Our lineup includes "Baseline Shield," which protects computers from unwanted changes, and "EFI System Cloner," a system cloning software. Please feel free to contact us when you need assistance. 【Lineup】 ■Eazy Fix ■Baseline Shield ■Eazy Fix EndPoint Manager ■EFI System Cloner *For more details, please check the related links or feel free to contact us.

  • 企業:B7
  • 価格:Other
  • Other Software

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

VMRay

We will conduct a detailed analysis of the selected samples.

VMRay is a platform that integrates threat information and immediately identifies anything that can clearly be determined as malware. It does so without allowing malware to recognize it as a sandbox, while still possessing high analytical capabilities. You can choose between a cloud version and an on-premises version. In the case of on-premises, we can procure the equipment and carry out the integration. Please feel free to contact us for details on pricing and licensing. 【Product Lineup】 ■VMRay DeepResponse ■VMRay FinalVerdict ■VMRay TotalInsight *For more details, please download the PDF or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Hybrid Web Application Vulnerability Assessment Service

In addition to the automated diagnostic tool, manual diagnostics will be conducted by a technician.

We offer hybrid web application vulnerability assessments. By focusing on vulnerabilities that are difficult to detect with automated diagnostic tools, we provide a more detailed and reliable vulnerability assessment than quick web application diagnostics. Please feel free to contact us if you have any requests. 【Assessment Items】 ■ Vulnerabilities related to input and output ■ Vulnerabilities related to authentication ■ Vulnerabilities related to authorization ■ Session management ■ Vulnerabilities related to web servers ■ Vulnerabilities related to Web 2.0 *For more details, please download the PDF or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Numerous Implementation Results: Targeted Attack Email Response Training Service to Protect the Manufacturing Industry

Improving security awareness comes from training and education. Cybersecurity measures to protect the manufacturing industry from increasingly serious cyber attacks every day!

"Training is conducted every year, but since the content is the same, we want some changes." "We would like to customize the training content to fit our company's circumstances." Are you facing any issues? SCC's "Training Service" allows for training that closely resembles normal operations by varying the content and difficulty of email messages according to job positions. By including training for affiliated and group companies, we aim to enhance the overall understanding of the organization's situation and improve security awareness. Additionally, the educational content can be customized to fit the customer's circumstances. [Features] ■ Diverse email templates ■ Abundant customization options ■ Enhanced educational services *For more details, please refer to the PDF materials or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Vulnerability Assessment Service

High-speed, high-quality vulnerability assessment using AI tools!

We utilize RayAegis' unique AI tools to provide vulnerability assessments conducted by over 250 advanced security engineers worldwide. With our AI × Security approach, which we have practiced since our founding, we can offer comprehensive diagnostic services that maintain quality in a short period, even for the increasing number of systems each year. Please feel free to contact us if you have any requests. 【Features】 ■ A package pricing system based on FQDN units that becomes more cost-effective as the environment scales ■ No need for preliminary narrowing down of diagnostic targets when making a request ■ The information we need to gather in advance is very simple ■ Short duration and high quality *For more details, please download the PDF or contact us.

  • Security Assessment

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Ray-SOC Service

Supporting safe business operations! A specialized team provides centralized monitoring of all networks.

We would like to introduce our "Ray-SOC Service." This service monitors logs from network devices and security equipment, primarily focusing on firewalls and VPN connection devices, in real-time or at regular intervals. It enables the early detection and response to abnormal communications and trends, such as attempts of intrusion from external sources. Additionally, our standard plan for this service is available from 108,000 yen per month, and we can customize the service content to fit your budget and security policy. 【Monitoring Targets (Partial)】 ■ Network Devices ■ Authentication Servers ■ Antivirus ■ Firewalls *For more details, please refer to the PDF document or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Smartphone application vulnerability assessment service

We are conducting static diagnostics using diagnosable source code.

We offer vulnerability assessments for smartphone applications. We check for issues in the code within iOS/Android smartphone applications, whether unauthorized communication occurs, and the risk of content tampering. Please feel free to contact us if you have any requests. 【Assessment Items】 ■Common inspections for Android/iOS apps ■Inspections specific to Android apps ■Inspections specific to iOS apps ■Inspections related to communication with APIs *For more details, please download the PDF or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

WiSAS Vulnerability Assessment

We provide visualization and optimization support for comfortable use of Wi-Fi environments, as well as prevention of information leaks due to unauthorized use and cyber attacks.

By acquiring the radio waves of the wireless network (Wi-Fi) and analyzing them from six security perspectives, we visualize the vulnerabilities and issues lurking in the Wi-Fi environment, preventing threats before they occur. Additionally, it is also possible to eliminate threats using location information analysis (optional). You can understand the dangerous use of Wi-Fi that directly leads to information leakage. By installing WiSAS sensors in the target area and visualizing the Wi-Fi usage, we conduct investigations and analyses from a security standpoint.

  • Security Assessment

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

E-book protection (viewing restrictions, copy prevention) solution

Building and providing eBook sales and subscription services! Protect eBooks with access restrictions and copy prevention.

We want to protect Japanese information with Japanese technology. Driven by this desire, our company has been engaged in product development and continues to provide the uniquely developed DRM solution 'CypherGuard.' 'CypherGuard' protects e-books and prevents unauthorized use by restricting viewers and viewing periods through its "license management function" and by preventing screen duplication such as capture actions. In the business sector, it is used by customers in manufacturing, infrastructure, and government agencies. 【Features】 ■ Protects digital content by restricting viewers and viewing periods and preventing screen duplication such as capture actions through the license management function. ■ Allows the setting of distribution rules such as dates and the number of devices. ■ Provides services tailored to the sales format of books (purchase, unlimited reading) and the implementation environment (user management, license authentication server). *For more details, please refer to the PDF document or feel free to contact us.

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録