top of page
マスクグループ 4.webp

Matrix Inspect

Security diagnosis service by security engineers


Understand vulnerabilities and
take appropriate measures

 Finding and fixing vulnerabilities before they are attacked is essential for system operation. In addition, when vulnerabilities are detected, you can protect your system from cyber attacks by responding quickly and appropriately.

 However, finding vulnerabilities requires a high degree of expertise, so inspections cannot be carried out easily. Matrix Inspect is a service that supports you in responding appropriately when an engineer with expertise in cyberattacks inspects and detects vulnerabilities.


Service overview

Matrix Inspect is a service that performs security inspections on system resources that make up websites. Scan web pages, APIs, mobile apps (iOS/Android) and cloud resources for vulnerabilities and threats.

Inspection approach

Matrix Inspect is a service that can be selected according to the inspection content and target of security inspection. The inspection contents consist of vulnerability inspection, manual inspection, and intrusion inspection.

Vulnerability assessment

 We perform inspections using vulnerability scanners and tools developed by our company. Scanning is performed with a scanner for network inspection and a scanner for web inspection. The network inspection scanner scans IP addresses and domains published on the Internet to identify operating services, identify known vulnerabilities, and test whether firewall bypasses are possible. The web inspection scanner inspects web content and applications. It focuses on security configuration issues, vulnerabilities related to input/output validation that lead to injection attacks. After the scan is performed, the detected results are carefully examined to determine false positives and risks.

Manual inspection

Manual inspection detects vulnerabilities due to flaws in application logic that are difficult to detect with vulnerability scanners, and vulnerabilities related to authentication, authorization, and session management. Understand the above characteristics and carry out the inspection.

Penetration test

Vulnerability scanners, manual inspection results are comprehensively captured to check for security threats by circumventing security controls on websites and applications. For example, if there is a cross-site scripting vulnerability, use the vulnerability to steal session information, impersonate the user in the stolen session, and check whether the information can be accessed by accessing the website or application. Checks whether a certain vulnerability causes a security threat such as information leakage or falsification.



  • Vulnerability Assessment


¥600,000 ~
  • Vulnerability Assessment

  • Manual Inspection (10 location)

  • Optional services​


¥900,000 ~
  • Vulnerability Assessment

  • Manual Inspection (10 location

  • Penetration test

  • Optional services

Optional services


If a vulnerability is detected in the security inspection, we will re-inspect whether the vulnerability is not detected after repair. Re-inspection will be carried out by selecting the locations that you wish to re-inspect from the vulnerability locations described in the report. A fee will be charged for each location, and the re-inspection will be valid within 60 days from the date of submission of the report.

iOS App

An optional fee will be charged if the inspection target provides an iOS application.

Android App

An optional fee will be charged if the inspection target provides an Android application.

Additional manual inspection

If the number of manual inspections exceeds the number of manual inspections included in the basic fee, additional charges will be incurred from the 11th location.

Online debriefing session

An optional fee will be charged when conducting a debriefing session online remotely.

bottom of page