Net Security
-
Product
Secure Hardened Android Phone
-
Shoghi has designed a totally Secure Hardened Android phone, which comes with a Specialized Operating system to prevent Hackers from remotely compromising your device , from all major vulnerabilities and exploits including protection from zero-days.
-
Product
Quantum-Safe Security
CN6000 Series
-
The Centauris CN6000 encryptors may be upgraded to quantum cryptography through the addition of the Cerberis Quantum Key Distribution (QKD) server to ensure that the solutions are quantum-safe for the long-term protection of sensitive data. This also ensures investment-protection of the encryptors. Such quantum cryptography is provably secure, ensures anti-eavesdropping detection and provides long-term forward secrecy against brute force hacking and attacks by quantum computers.
-
Product
Voice Systems for Safe, Secure, & Efficient Communications
-
Rohde & Schwarz offers flexible and cost-effective communications system solutions that meet all scalability and reliability requirements for civil and defense use cases regardless of the application domain - in the air, on the ground or at sea Multi-redundant, IP based voice communications systems ensure safe, secure and efficient voice communication, combining state-of-the-art, flexible and resilient IP based architecture with strong security mechanisms.
-
Product
Thermal Security Camera
Elara™ FC-Series O
-
The Elara™ FC-Series O thermal security camera is one of FLIR’s premium thermal security cameras for perimeter protection. The Elara FC-Series O integrates with external video analytics devices, such as FLIR’s TRK or third party solutions, to classify human or vehicular intrusions. The Elara FC-Series O also offers a wide range of high-performance lenses, with a choice of resolutions, offering greater flexibility for tailoring security systems to specific site conditions.
-
Product
Network Centric Secure Router
-
The system utilizes a 26-port layer 2/3 Gigabit Ethernet switch with embedded 32-bit CPU.It supports combinations of up to 26 SGMII ports consisting of 12 GbE Cu PHYs, 12 SGMII interfaces, two of which support 1G/2.5G, and up to three QSGMII ports. One of the SGMII ports can be dedicated to the CPU for packet insertion and extraction. The devices meet IEEE 802.3az requirements for green energy efficient Ethernet.
-
Product
API Security Testing
-
In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:
-
Product
Secure Flexible and Automated Hybrid Cloud Infrastructure
KnackStack
-
KnackStack introduces flexible and automated hybrid cloud infrastructure as a service for cloud agnostic deployments and automation. It's designed for the U.S. nation's most secure applications to automate data management and security.
-
Product
Security & Search Systems
-
Discreet and robust gamma radiation detector, specifically designed for law enforcement and first responders to interdict nuclear and radioactive materials.
-
Product
Enterprise-Wide Application and Security Testing
PerfectStorm ONE
-
Keysight Network Applications and Security
Enterprises and government organizations are making major investments in consolidating and rebuilding data centers and enterprise -wide networks. The stakes have never been so high to get it right the first time.
-
Product
Security Vehicles
-
When you need to set up robust security operations in a temporary or outdoor location, our security vehicles can provide a tried and tested solution. For use at festivals, public ceremonies, sports events and other outdoor functions, our mobile check point and scan truck will help keep your guests or members of the public safe from security threats.
-
Product
Trusted & Secure Servers
-
A part of the EnterpriseSeries™ product line, Mercury’s RES Trust servers employ U.S. designed and manufactured motherboards with embedded Intel® processors and composable BuiltSECURE™ framework to deliver trusted performance for the most security-imperative mission critical applications. RES Trust servers can be configured with a variety of nation-state-level security features. System security features enable customer Foreign Military Sales (FMS) or Direct Commercial Sales (DCS) program success.
-
Product
Visible Security Cameras - Bullet Cameras
-
Teledyne FLIR Visible Security Cameras, Bullet Cameras
-
Product
Security Gateways
-
Schweitzer Engineering Laboratories, Inc.
Security gateways combine cybersecurity capabilities to create secure access paths through security perimeters.
-
Product
Quantum-Safe Security
CN8000 Series
-
The CN8000 harnesses the power of quantum mechanics to help ensure secure communications – the encryption keys are generated by IDQ’s Quantum Random Number Generator to guarantee inherent and provable randomness. The CN8000 can also be upgraded to be quantum-safe via the Cerberis QKD Blade (quantum cryptography) to ensure long-term protection of the data in transit.
-
Product
Virtualized Security Resilience Testing
BreakingPoint VE
-
Keysight Network Applications and Security
Ixia BreakingPoint Virtual Edition (VE) provides real-world application and threat simulation for complete performance and security testing, and its elastic deployment model allows you to achieve security resilience without sacrificing scalability or flexibility.
-
Product
Enhance Secure Control Applications
MachXO3D
-
*Simplifies implementation of hardware security by integrating Root-of-Trust in your platform’s first on, last off device*Supports security throughout the product lifecycle including device manufacturing and transport, platform manufacturing, installation, operation and decommissioning
-
Product
API Security Testing
-
Nowadays, APIs are frequently used for communication between two applications. In this communication, lots of sensitive data is transferred between devices and the server.In order to be protected in the event of a data loss or attack, we must secure our API.
-
Product
Control, Monitor, Security and Power Management for ATEs
-
Subset of 6TL's FastATE modules designed for the control, monitoring, security, and power management of ATEs (automated test equipment).
-
Product
1U Rackmount Network Appliance With AMD EPYC™ 8004 Series Processor For NFV And SD-WAN. Ideal For High-Performance Network Security.
FWA-5082
Network Appliance
Up to 64 cores for NFV needs with single AMD EPYC™ 8004 Series processorsUp to 12 DDR5 RDIMM memory to boost computing capability4 x NMC with PCIe Gen5 for networking (Compatible with Gen4 & Gen3)High availability system with redundant solutionsManaging system with Advantech in-house IPMI firmware. (Comply with Redfish 1.14.1)
-
Product
Net Pyrradiometer
CN1-R
-
The Middleton CN1-R Net Pyrradiometer measures the net total radiation flux (solar, terrestrial, and atmospheric) downward and upward through a horizontal surface. It is suitable for solar energy studies in agriculture and meteorology.
-
Product
Defense & Security
-
Protecting populations from nuclear risk. Our instruments precisely detect and monitor radiation in the most critical and challenging situations, empowering military and civil defense teams to keep populations safe.
-
Product
Security Testing
-
Security/negative testing is typically conducted during development to highlight how a DUT handles abnormal conditions like very high traffic load, different frame sizes (incl. undersized and oversized frames), framed with different IFG settings, various types of errors and deviation of the signal frequency, as well as various DDoS attacks.
-
Product
Security Testing
-
As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.
-
Product
Visible PTZ Security Cameras
Quasar™ 4K IR PTZ Cameras
-
With crisp 4K video resolution, on-board long-range IR illumination, and 22x or 31x optical zoom options, FLIR Quasar™4K IR PTZ cameras deliver critical situational awareness. Exceptional field of view gives operators the ability to seamlessly monitor key details throughout large areas. The combination of high-performance optics and sensors, exceptional low light visible imaging, and effortless integration with all major third-party VMS and FLIR United VMS makes Quasar 4K IR PTZ cameras an ideal solution for critical infrastructure sites and remote facilities that require close monitoring.
-
Product
Security & Defence
-
At Kromek we design, develop, produce, and distribute products and solutions for the Security & Defence sectors, including, but not limited to defence, border control, homeland security and emergency services.
-
Product
Security Labs Community Edition
-
*Hack and Patch Real Applications- Get hands-on experience with top vulnerabilities and see the fix impact in a live app, in real-time.*Level-Up Your Coding Approach- Add secure coding to your list of skills by fixing issues that you face regularly, in the languages you’re most comfortable with. *Complete Labs in Minutes- With labs under 10 minutes, you can learn fast and gauge your progress in real-time for quick feedback.
-
Product
Net Irradiance Meter
LPNET07
-
LPNET07 measures the net radiation across a surface, from near ultraviolet to far infrared.
-
Product
Cloud Security Testing
-
RedWolf is the premium cloud-DDoS testing provider globally. We offer an easy-to-use testing system that is either self-serve or guided by RedWolf experts with years of experience helping secure the worlds largest and most complex enterprise networks.





























