Security Assessment Services

Assessment to protect the customer's systems and applications

PKT's security assessment is a diagnostic service that inspects and analyzes the customer's systems and applications to identify vulnerabilities (security holes), which are one of the causes of cyberattacks.

Experienced Security Engineering Team

Research and development experience recognized at top security conferences
・Development team for our proprietary security product "MUSHIKAGO"

Discovering Vulnerabilities with Unique Know-How

At PKT, our assessments utilize proprietary know-how to discover vulnerabilities that cannot be detected by dedicated tools alone.
Additionally, the assessment results are reported in a clear format, including recommendations for addressing the discovered vulnerabilities.

Customized Assessment Based on Customer’s Situation

We offer tailored assessments to suit the customer’s specific situation, environment, and requirements. Whether you have a large-scale system or need a flexible approach, PKT’s security assessments can meet your needs.

Security Assessment Lineup

Web Application Vulnerability Assessment

A Web Application Vulnerability Assessment is a service that detects vulnerabilities in websites or web applications owned and operated by the customer.

Especially for websites and web applications published on the internet, they are constantly exposed to the threat of cyberattacks. Proper detection and resolution of vulnerabilities is crucial. Our assessment includes "① Assessment → ② Report → ③ Reassessment (Optional)" and we support the customer until they can operate their system with confidence.

Platform Vulnerability Assessment

A Platform Vulnerability Assessment is a service that checks for vulnerabilities or configuration issues in network devices, servers, operating systems, middleware, etc.

For example, vulnerabilities in network devices like VPN equipment, web servers using Apache or Nginx, databases like MySQL or PostgreSQL, and email servers like Postfix can be diagnosed.

These devices, systems, and middleware are used globally, and vulnerabilities are continuously discovered. Proper version management and addressing vulnerabilities are necessary. Our assessment includes "① Assessment → ② Report → ③ Reassessment (Optional)" to ensure that the customer can operate their system with confidence.

Reassessment Service (Optional)

Reassessment services are also available after the initial diagnosis.
We believe it is important to confirm that appropriate actions have been taken to address any discovered vulnerabilities.
With the reassessment service, we ensure that the identified vulnerabilities have been resolved.

Reassessment Service (Optional)

Reassessment services are also available after the initial diagnosis.
We believe it is important to confirm that appropriate actions have been taken to address any discovered vulnerabilities.
With the reassessment service, we ensure that the identified vulnerabilities have been resolved.

Inquiries About the Service

Feel free to contact us with any questions about the service.