-
product
Autonomous PNT Performance and Vulnerability Test Suite
PANACEA
PANACEA is an autonomous GNSS performance and threat environment simulator system designed to control simulation hardware and collect data from up to 32 GNSS receivers simultaneously.
-
product
Vulnerability Assessment And Penetration Testing
VA&PT
If new web applications are installed into your organization’s network, you have shifted your business physically to another network, or if your site requires IT governance and regulatory compliance, you should opt for Penetration Testing.
-
product
Web Application Penetration Testing
Web Application Penetration Testing – to identify, analyze, and report vulnerabilities in a given web application. LGMS adopts a robust technology and process-based approach supported by a well-documented methodology to identify potential security flaws in the web application and the underlying environment.
-
product
Processor IP
Security
Security IP designed to protect against a variety of different vulnerabilities.
-
product
Website Penetration Testing
The vulnerabilities in a website need to be proactively fixed before the weaknesses are exploited by hackers, which in turn may lead to loss in customer’s confidence. We at Precise Testing Solution provide extensive planning to conduct website penetration. We check for holes in CRM, extranets, and internal network applications.
-
product
Application Security Testing Solution
CxIAST
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.
-
product
Multi-frequency, Multi-GNSS Simulator
GSS7000
The GSS7000 offers exceptional accuracy, fidelity and authentic GNSS signal emulation, ensuring true performance at every test stage. Advance features include embedded multipath, interference, and spoofing capabilities that deliver comprehensive vulnerabilities testing.
-
product
Application Penetration Testing:
Penetration testing (or pen testing) is a simulated security exercise in which ethical hackers attempts to exploit the vulnerabilities of an application system (web or mobile). The objective of this exercise is to identify any possible loopholes present in the system’s defence mechanism which the real hackers could take advantage of. QA Mentor practices the following stages while exercising this:
-
product
SWIR Imagers
SWIR imagers (short wavelength infrared) are an important group of surveillance electro-optical imagers due several reasons. First, advances in InGaAs technology enabled design of relatively low cost SWIR imagers. Second, InGaAs imagers are very sensitive and can generate images of observed scenery even at dark nights. Third, SWIR imagers are less vulnerable to bad atmospheric conditions than TV/LLLTV cameras working in visible/near infrared band. Fourth, SWIR imagers can generate hi-res images even if they are built using much smaller optics than used for design of thermal imagers.
-
product
FLy-Away Kits
Complete Solutions for Cyber Operations,Transportable Private Cloud, Edge Computing A Fly-Away Kit (FAK) or Expeditionary Kit is a self-contained suite of equipment (hardware and software) for DoD and federal civilian Cyber Protection Teams (CPTs) and forward operations to operate both in tactical (field-deployed) and back-office environments. The FAK suite of cyber tools or cloud/server applications include tools to conduct vulnerability analysis, incident response, and other cyber-analytic functions, and are suitable for operation on both classified and unclassified networks.
-
product
WordPress Vulnerability Scanner
WPScan
WPScan is a free, for non-commercial use, black box WordPress vulnerability scanner written for security professionals and blog maintainers to test the security of their sites.
-
product
Penetration Testing Services
All web and mobile applications are vulnerable to attack. You are going to get hacked – it's not "if", it's "when." Before it happens, you want to make sure you have a mature security system in place. Our specialists in software security testing have a background in IT and software development, know different types of exploits, and have experience in performing thousands of pen tests. We get hired to hack into systems and determine weaknesses.
-
product
Expert-Level Vulnerability Assessments
Vanguard Analyzer
Vanguard Integrity Professionals
Vanguard Analyzer™ provides Vanguard expertise on z/OS Security Server. Analyzer delivers expert-level vulnerability assessments of z/OS Security Server configuration controls and security settings with the ability to produce audit results in minutes. Vanguard Analyzer™ provides risk analysis and mitigation requirements in easy to read panels. System auditors can review Analyzer findings in order of priority and mitigate accordingly. Do you have access to expert-level assessment based on severity and vulnerabilities? Are your security analyst armed with invaluable interpretation of assessment findings? Can you provide your company with a detailed explanation, easy to understand risk statements and corrective actions that need to be followed step-by-step?
-
product
3D AOI with Revolutionary New 3D Measurement
Zenith
The Zenith 3D AOI system measures the true profilometricshape of components, solder joints, patterns and even foreignmaterial on assembled PCBs with true 3 dimensional measurement, overcoming the shortcomings and vulnerabilities of 2D AOI.
-
product
Static Code Analysis Tool
Klockwork
Klocwork integrates seamlessly into desktop IDEs, build systems, continuous integration tools, and any team's natural workflow. Mirroring how code is developed at any stage, Klocwork prevents defects and finds vulnerabilities on-the-fly, as code is being written.
-
product
IoT Devices Penetration Testing
There is a rising concern that IoT devices are being developed rapidly without appropriate consideration of the profound security challenges involved, as demonstrated by the various IoT devices hacked in recent years— automobiles, cameras, children's toys, thermostats, and medical devices.With more than a decade of specialized cyber security testing experience combined with our extensive research and development, we can assess and identify both common and complex security vulnerabilities that may be residing within your whole IoT ecosystem.
-
product
Platform Compatibility Testing
Technology advancements and emerging platforms in web & mobile space have created a nightmare for software development teams. Issues arise primarily due to lack of experience and unavailability of test environments. This leaves you vulnerable to a poor user experience, resulting in lost sales and bad repute.
-
product
Static Analysis Tool
CodeSonar
Automated static analysis designed for zero-tolerance defect environments. CodeSonar, GrammaTech''s flagship static analysis software, identifies programming bugs that can result in system crashes, memory corruption, leaks, data races, and security vulnerabilities. By analyzing both source code and binaries, CodeSonar empowers developers to eliminate the most costly and hard-to-find defects early in the application development lifecycle.
-
product
Node.js® platform
N|Solid™
N|Solid is a fully compatible Node.js runtime that has been enhanced to address the needs of the enterprise. Rapidly resolve performance problems. Protect customer data from vulnerable packages and unauthorized code. Drive performance and operational efficiency at scale.
-
product
Secure Hardened Android Phone
Shoghi has designed a totally Secure Hardened Android phone, which comes with a Specialized Operating system to prevent Hackers from remotely compromising your device , from all major vulnerabilities and exploits including protection from zero-days.
-
product
AI-Powered Thermal Traffic Sensor
TrafiSense AI
Designed to reliably detect and classify road users, TrafiSense AI is an intelligent thermal imaging sensor for traffic monitoring in complex urban environments. Featuring AI algorithms built on 25+ years of traffic detection and best-in-class thermal imaging, TrafiSense AI delivers continuous vision and data collection for safer, more efficient cities. Capable of tracking multiple objects in any lighting condition, the advanced edge-based AI technology effectively controls intersections, helps protect vulnerable road users, and gathers detailed traffic data for better city planning decisions.
-
product
P1 Vulnerability Knowledge Base
VKB
With more than 1800 identified & listed vulnerabilities P1 Security Vulnerability Knowledge Base (VKB) is a unique telecom-dedicated Vulnerability Database, with absolutely no other equivalent on the market. It is the result of years of expertise and vulnerability assessments successfully led by our engineers on the Core & Radio Networks & Network Elements of many of the biggest Telecom operators in the World.
-
product
Network Security Testing
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
product
P1 Vulnerability Knowledge Base
VKB
With more than 1800 identified & listed vulnerabilities P1 Security Vulnerability Knowledge Base (VKB) is a unique telecom-dedicated Vulnerability Database, with absolutely no other equivalent on the market. It is the result of years of expertise and vulnerability assessments successfully led by our engineers on the Core & Radio Networks & Network Elements of many of the biggest Telecom operators in the World.
-
product
Crypto Libraries Test Suite open source
Project Wycheproof
A set of security tests for identifying cryptographic vulnerabilities. Project Wycheproof tests crypto libraries against known attacks.
-
product
Security Labs
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
product
Static Analyzer
Julia
Julia Static Analyzer is best in class for finding defects and security vulnerabilies in C#, Java and Android applications (for C and C++ languages, please have a look to GrammaTech CodeSonar). By using Julia Static Analyzer, you reduce development and maintenance costs and eliminate risks related to security vulnerabilities and privacy leaks. The powerful analysis technology ensures a maximum precision of results. With advanced dashboarding you can flexibly transform the data into useful information for the different stakeholders.
-
product
Wideband True RMS AC Voltmeter
323
The Ballantine 323 True RMS analog ac voltmeter uses advanced true rms circuitry to achieve square law response from rugged, fast responding silicon diode detectors with no thermal lag and overload vulnerability inherent in thermocouple devices.
-
product
Application Security Platform
Sentinel
WhiteHat Sentinel is a Software-as-a-Service (SaaS) platform that enables your business to quickly deploy a scalable application security program across the entire software development lifecycle (SDLC). Combining advanced scanning technology with the world’s largest application security research team, we accurately identify your vulnerabilities and scale to meet any demand without slowing you down.
-
product
Veracode ELearning
When it comes to software, developers are the only ones who can really fix the vulnerabilities in their code. But many lack the requisite skills to identify and remediate vulnerabilities. Existing training materials are often lengthy, irrelevant to the organization’s preferred coding languages, or just plain unengaging.





























