Vulnerability Assessment Service Product List and Ranking from 13 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Aug 20, 2025~Sep 16, 2025
This ranking is based on the number of page views on our site.

Vulnerability Assessment Service Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Aug 20, 2025~Sep 16, 2025
This ranking is based on the number of page views on our site.

  1. ranryu Tokyo//Information and Communications
  2. スプライン・ネットワーク Tokyo//others
  3. 三和コムテック Tokyo//Information and Communications
  4. ゲイトウェイ・コンピュータ Tokyo//Information and Communications 東京本社
  5. アイレット Tokyo//Information and Communications 東京本社

Vulnerability Assessment Service Product ranking

Last Updated: Aggregation Period:Aug 20, 2025~Sep 16, 2025
This ranking is based on the number of page views on our site.

  1. Ministry of Economy, Trade and Industry Certified | Vulnerability Diagnosis Service and Testing Service [Fully Remote] ranryu
  2. AI Vulnerability Diagnosis Service "V-threat" バルク
  3. Vulnerability Assessment Service レイ・イージス・ジャパン
  4. Vulnerability Assessment Service i-3c
  5. 4 Vulnerability assessment service コンピュータマネジメント

Vulnerability Assessment Service Product List

1~14 item / All 14 items

Displayed results

AI Vulnerability Diagnosis Service "V-threat"

Achieving an unprecedentedly superior cost performance! The diagnostic speed is also overwhelmingly fast, and the price is overwhelmingly low.

"V-threat" is a third-generation AI & HUMAN vulnerability assessment that can continuously detect advanced vulnerabilities through AI machine learning, enabling a much more accurate vulnerability diagnosis through a hybrid of AI and engineers. This service provides a comprehensive assessment of web applications, web servers, APIs, and SSL, delivering inspection results quickly and at a low cost. [Features] ■ Comprehensive assessment not only for web applications but also for web servers & SSL ■ Diagnosis of mobile applications is also overwhelmingly fast and inexpensive. ■ World-class high quality and proven track record *For more details, please download the PDF or feel free to contact us.

  • Company:バルク
  • Price:1 million yen-5 million yen
  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

High-speed, high-quality vulnerability assessment using AI tools!

We utilize RayAegis' unique AI tools to provide vulnerability assessments conducted by over 250 advanced security engineers worldwide. With our AI × Security approach, which we have practiced since our founding, we can offer comprehensive diagnostic services that maintain quality in a short period, even for the increasing number of systems each year. Please feel free to contact us if you have any requests. 【Features】 ■ A package pricing system based on FQDN units that becomes more cost-effective as the environment scales ■ No need for preliminary narrowing down of diagnostic targets when making a request ■ The information we need to gather in advance is very simple ■ Short duration and high quality *For more details, please download the PDF or contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

Vulnerability assessment service using cloud service infrastructure!

Our company offers a "Vulnerability Assessment Service" to verify whether information systems such as network devices, servers, and client terminals are truly secure. As a general principle, we conduct information exchanges with customers using a reliable cloud service infrastructure (within the scope of ISMS Cloud Security Certification Registration), ensuring a high level of security for data related to the assessment. Please feel free to contact us if you have any requests. [Examples of Threats and Vulnerabilities] ■ Database leaks ■ Password leaks ■ Unauthorized information manipulation ■ Website tampering ■ Service interruptions, etc. *For more details, please download the PDF or contact us.

  • Company:i-3c
  • Price:Other
  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability assessment service

We will continue to strive to reduce even one security incident caused by vulnerabilities in this world.

We provide vulnerability assessment services to proactively prevent the risks of cyber attacks and information leaks, and to strengthen security. Even if you have little expertise in vulnerabilities, we will support you from the ground up in promoting vulnerability management so that you can ultimately operate independently and continuously. We will achieve a manageable, risk-based approach to vulnerability management. Please feel free to contact us if you have any requests. [Support Examples] ■ Learning how to use tools ■ Providing Japanese operation manuals ■ Discussing response policies for identified vulnerabilities *For more details, please download the PDF or contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI Vulnerability Assessment "ImmuniWeb"

Detecting unknown threats! We prevent risks such as information leakage incidents caused by cyber attacks in advance.

"ImmuniWeb" is an AI vulnerability assessment service that can continuously detect new vulnerabilities through machine learning. For pages that cannot be handled by AI (such as shopping carts and contact pages), RPA rules are set to escalate them to security engineers. By accurately dividing the roles between AI and security specialists, we achieve overwhelmingly superior cost performance. 【Features】 ■ Covers various global security guidelines ■ Bulk diagnosis of web servers, SSL diagnosis, and trademark infringement diagnosis ■ Over 40,390,000 web server security test results ■ Over 42,560,000 server SSL/TLS configuration compliance test results ■ Over 915,100,000 domain brand test results *For more details, please refer to the PDF materials or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service "Security Blanket Series"

Diagnosis can be performed at a fixed rate, regardless of the system scale or the number of screens on the site.

We offer a vulnerability assessment service called 'Security Blanket Series,' which includes manual diagnostics by specialized engineers and diagnostics using SaaS-based tools. By considering and executing various simulated attacks from the perspective of an attacker on your website, we support the operation of a safe and secure IT environment. In addition to vulnerability assessments, we also provide services such as source code reviews and penetration testing. Please feel free to contact us if you have any requests. 【Features】 - Since it is provided as a SaaS model, there is no need for customers to prepare new equipment or devices. - All diagnostics are completed via the internet. - Supports crawling and diagnostics of dynamic sites. - Manual diagnostics by specialized engineers can also be combined. - A dedicated management screen for customers allows for the confirmation of various diagnostic histories and detected vulnerabilities, among other features. *Please note that we do not accept inquiries by phone. *For more details, please download the PDF or feel free to contact us.

  • Company:M&K
  • Price:Other
  • Security Assessment
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

Enhance the security of the website and avoid risks.

Our company offers vulnerability assessment services conducted by skilled engineers who are also well-versed in web application development. We go beyond merely pointing out vulnerabilities and suggesting general countermeasures; we provide examples of vulnerability verification and propose countermeasures tailored to the characteristics of the target site. Additionally, our in-depth explanations, which incorporate insights from security consulting and current security trends, have received positive feedback, as they do not stop at merely reading the report or explaining vulnerabilities. 【Features】 ■ Presentation of specific verification examples and countermeasures ■ High customer satisfaction ■ Supervision by a leading expert in web security *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

WiSAS Vulnerability Assessment

We provide visualization and optimization support for comfortable use of Wi-Fi environments, as well as prevention of information leaks due to unauthorized use and cyber attacks.

By acquiring the radio waves of the wireless network (Wi-Fi) and analyzing them from six security perspectives, we visualize the vulnerabilities and issues lurking in the Wi-Fi environment, preventing threats before they occur. Additionally, it is also possible to eliminate threats using location information analysis (optional). You can understand the dangerous use of Wi-Fi that directly leads to information leakage. By installing WiSAS sensors in the target area and visualizing the Wi-Fi usage, we conduct investigations and analyses from a security standpoint.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Monitoring-type diagnostic solution 'SCT SECURE SWAT'

Ideal for continuous vulnerability monitoring of web applications! Annual diagnostic service for monitored web applications.

"SCT SECURE SWAT" is a monitoring-type annual diagnostic service for web applications that thoroughly diagnoses using the characteristics of both automated and manual diagnostics. It balances the comprehensiveness of automated diagnostics with the flexibility of manual diagnostics. Frequent modifications and updates are automatically detected and diagnosed. Additionally, we also offer the "SCT SECURE Mobile App Diagnostic Service," a vulnerability diagnostic service for smartphone applications. 【Features of SCT SECURE SWAT】 ■ Thorough diagnosis of web applications utilizing the characteristics of both automated and manual diagnostics ■ Balances the comprehensiveness of automated diagnostics with the flexibility of manual diagnostics ■ Automatically detects and diagnoses frequent modifications and updates ■ Suitable for continuous vulnerability monitoring of critical web applications ■ Diagnostic results can be checked in real-time from a dedicated portal *For more details, please refer to the PDF document or feel free to contact us.

  • Security Assessment
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service "gSCAN"

A cloud-based service that can accommodate flexible schedules such as spot diagnoses and regular check-ups.

"gSCAN" is a cloud-based vulnerability assessment service that supports both Web SCAN and Network SCAN. It can accommodate flexible schedules such as spot assessments and regular assessments, and it is also capable of handling websites that require login authentication. We offer options for re-assessment after fixes and annual contracts. Additionally, on-site reporting sessions are available as an option. 【Features】 ■ Very affordable ■ Supports both Web SCAN and Network SCAN ■ Flexible scheduling for spot assessments and regular assessments ■ Capable of handling websites that require login authentication ■ Options for re-assessment after fixes and annual contracts available *For more details, please refer to the PDF materials or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service Lite

Providing vulnerability assessments that include manual diagnostics only where necessary, with short turnaround times and low costs.

The "Vulnerability Assessment Service Lite" is a manual and tool-based assessment service that focuses on essential functions to conduct vulnerability assessments, based on the previously well-received "Vulnerability Assessment Service." It is a speedy and cost-effective service optimized to meet customer needs such as "I want a quick assessment while keeping costs down," tailored to the characteristics of the functions to be assessed. For customers who do not have the luxury of time and budget but want to quickly understand the vulnerabilities of their website, we provide a cost-effective vulnerability assessment that maximizes the know-how cultivated by security expert companies. The "Vulnerability Assessment Service Lite" offers two plans: - Function-specific web assessment - Platform assessment Please make use of it as the first step in understanding your company's security issues. * The "Vulnerability Assessment Service Lite" is provided in collaboration with SecureSky Technology.

  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vulnerability Assessment Service

Diagnosing system vulnerabilities using tools specifically for vulnerability assessment and manual testing by white hat hackers!

We offer "vulnerability assessments (security assessments)" to diagnose whether there are vulnerabilities in networks, operating systems, middleware, and web applications. By conducting a vulnerability assessment and checking the current security status of networks/servers and web applications, it is possible to prevent risks such as malicious attacks from attackers and information leakage incidents in advance. Please feel free to contact us if you have any requests. 【Assessment Targets】 ■ Web applications, etc. ■ Web servers and databases ■ Network services *For more details, please download the PDF or feel free to contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ministry of Economy, Trade and Industry Certified | Vulnerability Diagnosis Service and Testing Service [Fully Remote]

Enhancing web security with vulnerability assessments certified by the Ministry of Economy, Trade and Industry, regardless of industry or size.

Are you ignoring the "invisible risks" of web services? Don't just stop at "discovering" vulnerabilities. We provide actionable support all the way to remediation and improvement. ■ Do you have these concerns? - You think you are taking security measures, but you have never confirmed them from an external perspective. - You want to ensure the safety of your web services or internal systems before their release. - You are being asked by clients or business partners to submit a diagnostic report. - You want to effectively identify security risks within a limited budget. ■ What is ranryu's vulnerability assessment service? Ranryu Co., Ltd. is registered as a compliant business under the Ministry of Economy, Trade and Industry's "Information Security Service Standards." Our engineers, who hold CEH and Information Processing Security Support Specialist certifications, provide vulnerability assessments for web services and business systems. Our distinguishing feature is that we not only conduct assessments but also provide concrete countermeasure support for identified risks and can consistently assist in reviewing security policies. With a wealth of experience in system development and infrastructure construction, we offer technical advice and implementation support to ensure that diagnostic results are not left "as is." We support the strengthening of your security from a realistic perspective.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Supply Chain Attack Countermeasures Vulnerability Assessment Service [Helpful Materials Provided]

Cyberattacks targeting the vulnerabilities in the manufacturing supply chain are on the rise! We are offering a document that explains the key points of necessary security measures!

At Ray Aegis Japan, we utilize our proprietary AI tools to provide vulnerability assessments conducted by over 320 highly skilled security engineers worldwide. As attacks exploiting weaknesses in the supply chain of the manufacturing industry are on the rise, what are the comprehensive security measures against cyberattacks? We are offering a document that explains the key points of necessary security measures! What are the world-class security measures? We explain them in an easy-to-understand manner! [Excerpt from the content] - Challenges of cybersecurity in the manufacturing industry - 59% have experienced a security incident? - Supply chain risks - Approaches to solving challenges *For more details, please download the PDF or contact us.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration