Diagnosis Results

Diagnosis Date: 2026/02/25 16:40

Method: Detailed Diagnosis

Basic Detailed Run Diagnosis
C

Number of Reports

16

This Site
Average
A B C D
2/22
2/23
2/24
0
0
1
1
14

Questionnaire Results

Last Update:

This Site
Average
Web Application System Mgmt Surveillance Incident Resp. Public Cloud

Website Vulnerability Checker (ASM)

By GMO Cybersecurity by Ierae, Inc.

ASM is Myanmar's first premium cloud-based security solution. It empowers organizations to proactively identify and manage external IT assets—including websites and networks—to neutralize vulnerabilities before they can be exploited.

Manage your complete asset inventory
Automated alerts on newly detected vulnerabilities
Expert support for prioritization & remediation
40,000 MMK / Month
No.1 in the World - Biggest Security Event in the World
No.1 in Japan - Biggest Security Contest in Japan
No.1 in Japan - Over 150 White Hat Hackers

Do any of these sound familiar?

These are common security headaches — and our solution fixes all of them.

Shadow IT & Unknown Assets

Shadow IT & Unknown Assets

Risk of forgotten or "ghost" websites and servers operating online without IT team monitoring.

Rapidly Expanding Digital Footprint

Rapidly Expanding Digital Footprint

Managing a fast-growing environment where new subdomains, cloud instances, and IP addresses are constantly added.

Delayed Vulnerability Detection

Delayed Vulnerability Detection

Inadequate security scan frequency (e.g., annual scans) leading to critical bugs remaining undetected for months.

Third-Party & Supply Chain Risks

Third-Party & Supply Chain Risks

Uncertainty regarding whether external vendors or partners maintaining network connections adhere to required security standards.

Human Error in Configuration

Human Error in Configuration

Potential for accidental exposure of databases or ports to the public internet due to configuration mistakes.

Compliance & Regulatory Pressure

Compliance & Regulatory Pressure

Requirement to provide auditors or stakeholders with proof of continuous visibility and control over the entire external network.

Lack of an Attacker's View

Lack of an "Attacker's View"

Insufficient insight into how the network appears to a hacker, despite having internal security checks in place.

Want to know where you stand? Get a diagnosis online.

Every organization has digital assets that could be at risk — and most don't even realize it. The good news? You can find out in minutes, not months.

Domains & IPs

Just by registering a domain or spinning up a server, your organization already has an attack surface — whether you manage it or not.

Websites & Network Equipment

Setting up a website or connecting network devices is easy. But without proper oversight, these assets can quickly become vulnerable entry points.

We Can Diagnose It

Even if your infrastructure feels fragile or exposed, our platform identifies every weakness — so you can fix what matters before attackers find it.

You don't need a dedicated security team to get started. Register your domains and IPs, and our system handles the rest — scanning, analyzing, and delivering clear, actionable insights you can act on right away.

ASM Price & Plan

Choose the plan that fits your organization's security needs.

ASM-XS

For Individual Use

40,000 MMK /month
  • Up to 1 Domain
  • Assessment Items: 189
  • Unlimited Scan
  • Network Assessment
  • Web App Assessment
  • Export PDF

ASM-S

For small teams getting started.

360,000 MMK /month
  • Up to 10 Domains
  • Assessment Items: 189
  • Unlimited Scan
  • Network Assessment
  • Web App Assessment
  • Export PDF

ASM-M

For growing businesses.

1,000,000 MMK /month
  • Up to 30 Domains
  • Assessment Items: 189
  • Unlimited Scan
  • Network Assessment
  • Web App Assessment
  • Export PDF

ASM-L

For teams needing full coverage.

1,520,000 MMK /month
  • Up to 50 Domains
  • Assessment Items: 189
  • Unlimited Scan
  • Network Assessment
  • Web App Assessment
  • Export PDF

ASM-XL

For large organizations.

2,820,000 MMK /month
  • Up to 100 Domains
  • Assessment Items: 189
  • Unlimited Scan
  • Network Assessment
  • Web App Assessment
  • Export PDF

Comprehensive Security Features

Advanced tools and capabilities designed to identify, assess, and mitigate cyber threats across your entire digital ecosystem.

Inventory of IT Assets

Discover and catalog all publicly accessible IT assets across your entire organization.

Dark Web Monitoring

Monitor for leaked IDs and passwords on the dark web to prevent unauthorized access.

Passive Scanning

Scan the range of remote access without affecting the target systems or infrastructure.

Active Scan

Active scanning without affecting the target for thorough vulnerability identification.

Centralized Management

Manage your list of devices and vulnerabilities from a single centralized dashboard.

Advisory Services

Expert consultation and recommendations to strengthen your overall security posture.

Report Issuance

Comprehensive security reports generated on a regular basis with actionable insights.

Risk Management

Systematic risk assessment and management to keep your organization protected.

Alert Email

Instant email notifications when critical vulnerabilities or threats are detected.

ASM Operational Flow

A systematic approach to managing your attack surface from discovery to response.

01

Discovering the attack surface

GMO Cybersecurity by Ierae's white hat hackers will identify your company's exposed IT assets (shadow IT) from an attacker's perspective.

02

Gathering attack surface information

Automated weekly scans identify vulnerabilities. On-demand scans are also available.

04

Follow the instructions in the tool. If you have any questions, our security consultants will assist you!

Responding to risks

03

The tool automatically ranks vulnerabilities based on their impact, and security consultants provide advice on prioritization.

Assessing risk

Discovering the
attack surface
01
Gathering
attack surface
information
02
04 Responding to
risks
03 Assessing risk

Why Attack Surface Management is Essential Today

Cyber threats are growing rapidly. Proactive management of your attack surface is no longer optional.

40,303
Vulnerabilities in 2024
+15%
Year-over-Year Growth
24/7
Monitoring Required

Key Risk Factors

Expanding Attack Surface

Internal IT assets can become externally exposed due to misconfiguration or cloud deployment, creating unknown entry points.

Public-Facing Systems at Risk

Publicly accessible systems like VPNs, websites, and routers are top targets for cyberattackers seeking unauthorized access.

Growing Vulnerabilities

System modifications and updates continuously introduce new vulnerabilities, requiring regular checkups and proactive management.

Vulnerability Trend

Registered vulnerabilities are increasing year by year, making continuous monitoring critical.

CVE Vulnerability Growth Statistics Chart

Main Diagnostic Range

Attack surface management tools and consulting — anyone can easily achieve ASM.

Web Application Assessment

Web Applications Assessment

Comprehensive security testing to identify SQL injection, XSS, CSRF, and other OWASP Top 10 threats.

  • Automated & manual testing
  • OWASP Top 10 coverage
  • Remediation guidance
Network Diagnostics

Network Diagnostics

Deep analysis to detect misconfigurations, open ports, vulnerable services, and potential entry points.

  • Port & service scanning
  • Configuration auditing
  • Network topology mapping
CMS Diagnosis

CMS Diagnosis

Specialized scanning for WordPress, Drupal, and Joomla to identify plugin vulnerabilities and misconfigurations.

  • Plugin vulnerability detection
  • Version & patch analysis
  • Security hardening checks

Detailed Assessment Reports

Comprehensive security reports with clear risk grading, vulnerability breakdowns, and actionable remediation guidance for every domain.

asm.z.com/assessment/example-domain.com
ASM Console

example-domain.com

Last scan: March 14, 2026 at 19:10

Scan Complete
C
Grade
Fair
100
Pages
10
Findings
2 3 1 1 3
By Level

Recent Alerts

SQL Injection detected in /login.php Critical
XSS vulnerability in search form High
Outdated TLS version detected Medium
Content-Security-Policy header missing Info

* This is a simulated interface for illustration purposes. Actual reports may vary in layout and detail.

Why Choose Z.com ASM Service?

White Hat Hackers

Powered by the world's leading white hat hackers with decades of combined security expertise.

Total Cyber Solution

A complete, end-to-end solution for cyberattack prevention, detection, and response.

Flexible for All Users

Flexibly designed for all types of users — from small businesses to large enterprises.

Our Achievements

Bringing simple, easy-to-use security to everyone.

3.6M
Total Diagnostics
95%
Satisfaction Rate
21yrs
Experience
230+
Security Experts

Our ASM tool was developed to ensure that anyone can use it easily with just a few steps.

Frequently Asked Questions

Everything you need to know about our Attack Surface Management solution.

Attack Surface Management is the process of discovering, analyzing, and assessing all externally exposed digital assets such as domains, IPs, web applications, and network equipment. It helps organizations identify vulnerabilities and security gaps before attackers can exploit them.

The main difference is the number of domains you can assess. ASM-S supports up to 10 domains, ASM-M up to 30, ASM-L up to 50, and ASM-XL up to 100 domains. All plans include the same core features: 189 assessment items, unlimited scans, network assessment, web app assessment, and PDF report export.

Every plan includes 189 individual security checks that cover a wide range of vulnerabilities and misconfigurations. These items span across network infrastructure, web application security, SSL/TLS configuration, DNS settings, open ports, outdated software, and more — giving you a thorough diagnosis of your attack surface.

All plans come with unlimited scans, meaning you can run as many assessments as you need throughout your subscription period. There are no caps or extra charges per scan — run them whenever you want to check for new vulnerabilities or verify that issues have been resolved.

Network Assessment scans your infrastructure for open ports, vulnerable services, misconfigurations, and potential entry points. Web App Assessment checks your web applications for common threats like SQL injection, XSS, CSRF, and other OWASP Top 10 vulnerabilities. Both are included in every plan.

Yes. Every plan includes PDF report export so you can download and share your assessment results with your team, management, or auditors. Reports include detailed findings, risk ratings, and remediation recommendations in a clear, professional format.

Simply count how many domains your organization needs to assess. If you have up to 10 domains, ASM-S is a great fit. For 30 domains, go with ASM-M. Larger organizations with up to 50 or 100 domains should choose ASM-L or ASM-XL respectively. Not sure? Contact us and we'll help you find the right plan.

Getting started is simple. Choose the plan that matches your domain count, click "Contact Us," and fill in your details. Our team will reach out within 3 business days and provide you with your account information so you can log in and start assessing your attack surface.