AI type/manual type security diagnosis service “RayAegis”

About RayAegis

AI type/manual type security diagnosis service “RayAegis”

RayAegis is a group of over 250 highly skilled white hat hackers and security engineers worldwide who provide security consulting services to government agencies, financial institutions, major manufacturers, transportation systems, and other systems

RayAegis' technical team is made up of highly skilled security engineers, including those with master's and doctoral degrees in computer and information security from Carnegie Mellon University, Purdue University in the United States, and the Department of Electrical and Information Science at National Taiwan University, as well as experts with various information security qualifications such as CISSP, CISM, and CEH

With years of experience, we have in-depth knowledge of how hacker methods, techniques, and management methods work together to protect your company's confidential information, including preventing it from being illegally obtained by hackers or employees

Combining the world's most advanced security and AI technologies, RayAegis' "RayScanner" and "RayInvader" use a database containing proprietary information synchronized with the US government to efficiently check whether websites and applications have been hacked, as well as for unknown vulnerabilities such as zero-day exploits, providing security services that meet the strictest international standards

RayAegis service features

As technology advances, malicious hackers are now using more advanced programs and attack tools to attack corporate systems and steal data. As for attack methods overall, rather than attacks that exploit a single vulnerability, multi-vector attacks are becoming more common, focusing on effective methods such as combining multiple vulnerabilities depending on the effect and situation, and attacking weak points in the entire system

To address these various security challenges, RayAegis utilizes industry-leading technologies, including AI, combined with deep security knowledge to offer security assessment service plans that are "easier, shorter, cheaper, and more advanced."

Diagnosis target ・Web applications
・Software
・Hosts
・OS/Platforms
・Mobile devices
・IoT devices
・Network devices
Diagnosis ・Web security
・System denial of service (DoS)
・Data leakage
・Authentication management
・DB security
・Other customized diagnostic items
Diagnostic Tools ・Uses different tools for each stage from over 50 different tools
・Proprietary automation plug-ins for various general-purpose tools
・Manual diagnostic tests by security engineers
・Proprietary AI tools "RayScanner" and "RayInvader"
International Standards ・NIST SP800-115
・OWASP TOP10
・OWASP IoT TOP10
・OSSTMM
・PCI DSS Compliance

Security diagnostic service plan

Both services are provided in a way that is different from other companies, with a simple pricing structure based on a subdomain (FQDN) basis, regardless of the number of pages or requests, making them highly cost-effective services

AI Quick Tool Vulnerability Assessment AI remote vulnerability diagnosis penetration test Mobile App Diagnostics
Features Advanced automated vulnerability assessment using various proprietary tools Advanced and comprehensive vulnerability assessment using various proprietary tools Advanced penetration testing (including vulnerability assessment) that utilizes AI tools capable of automatically generating exploits and combines zero-day attacks High-speed tool diagnostics for individual mobile app packages (server-side authentication and authorization systems are supported with the API diagnostics option)
Diagnosis target Platform + Web Application Web applications, intranets, etc Mobile apps and app connection APIs
Diagnostic items 45 items 68 items to 99 items 100 items OWASP TOP10 Mobile Risk Standard
Diagnostic methods Remote diagnostics including AI tools AI tools + manual remote diagnosis by security engineers Package diagnosis using AI tools (API diagnosis includes manual diagnosis)
Diagnosis period 1 business day 3 to 5 business days 1 to 3 weeks App only: 1 business day
API: 3 to 5 business days
Pricing Flat rate per subdomain/FQDN (Penetration testing is charged per IP/host except for web servers) Flat rate per application package/API server
Report format Report reviewed by security engineers Reviewed report by security engineers + debriefing session Report reviewed by security engineers
After-sales support Re-diagnosis included
(within one month of the initial diagnosis)
Re-diagnosis included
(within 3 months of initial diagnosis)
・Q&A regarding detailed repair procedures
・Re-diagnosis included
(within one year of the initial diagnosis)
・App re-assessment: Optional
・API re-assessment: Included in options

Security diagnostic service inspection items

Each security assessment service performs assessments based on test items that comply with standards such as OWASP. The main diagnostic test items are as follows:

Main inspection items Overview of test items
Information gathering Collecting platform information such as each server application in the target environment
Settings and configuration management inspection Vulnerabilities related to allowed methods and network and application configurations
Identity Management Examination Vulnerabilities related to account management, such as user registration and role settings
Authentication inspection Vulnerabilities related to authentication, such as secure transfer of authentication information and password policies
Checking authorization Vulnerabilities related to authorization bypass, etc
Session Management Inspection Vulnerabilities such as bypassing the session management scheme
Data Validation Check Data validation vulnerabilities such as SQL injection and cross-site scripting
Error control checks Vulnerabilities related to error handling, such as returned error codes
Encryption Check Vulnerabilities such as poor encryption and padding oracle attacks
Business Logic Inspection Vulnerabilities related to business logic such as application processes
Client-side inspection Client-side vulnerabilities such as HTML and CSS injection and JavaScript exceptions
Contact us/Download materials