Application Security
vulnerabilities identification and remediation software.
-
Product
Application Security Testing Solution
CxIAST
-
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.
-
Product
100GbE Application and Security Load Module
PerfectStorm 100GE 1-Port Load Module
-
Keysight Network Applications and Security
PerfectStorm is a highly modular hardware test platform enabling equipment providers, service providers and enterprises the ability to create real-world, high-stress conditions and user behavior to push new equipment and networks to their limits.
-
Product
Security Testing Service
-
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
Product
Agile Application Performance & Security Resilience Test Tool
Developer
-
Keysight Network Applications and Security
Ixia Developer is an agile application performance and security resilience test tool that helps developers find bugs early in the development cycle. Ixia Developer features an integrated debugger that helps locate the primary source of defects. An easy-to-use, fast, and responsive web-based user interface significantly reduces the time it takes to move from test configuration to actual packets on the network. And by leveraging a robust ATI engine, Ixia Developer always includes the most up-to-date apps and security strikes.
-
Product
High-Performance Application and Security Load Module
PerfectStorm 10/1GE Load Module
-
Keysight Network Applications and Security
Equipped with powerful multi-core, multi-threaded network processors, PerfectStorm 10/1GbE is designed to satisfy the testing needs of manufacturers needing speed flexibility in their testing resources. Networking equipment manufacturers building new equipment or service providers and large enterprises integrating this them benefit from testing and verifying performance and functionality prior to deployment.
-
Product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 1GE/10GE Appliance
-
Keysight Network Applications and Security
PerfectStorm ONE facilitates network and security proof-of-concepts (POCs) and assessments, all in a compact device. This POC-in-a-box enables enterprises and service providers to select optimal devices and right-size data centers, as well as providing device vendors with a platform to fully showcase their product’s performance, resiliency, and throughput under realworld traffic loads.
-
Product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 10GE/40GE Appliance
-
Keysight Network Applications and Security
Building upon the terabit-scale PerfectStorm platform, PerfectStorm ONE™ appliances offers enterprises, service providers, and technology vendors a revolutionary solution for generating stateful applications and malicious traffic, simulating millions of real-world end-user environments to test and validate infrastructure, a single device, or an entire system.
-
Product
100GE Application & Security Test Load Module
CloudStorm
-
Keysight Network Applications and Security
Ixia's CloudStormTM is an industry-first 2.4 terabit application and security test solution that not only meets today’s need, but that of the future. CloudStorm delivers 3X-application and 4X-SSL-emulation scale over any other test system. It helps NEMs shortening their development cycles, and enterprises and data center operators find the right balance between mitigating security risks and delivering high end-user application performance. Emulate multi-terabit DDoS and botnet attacks to future-proof security solutions
-
Product
Application Security Platform
Sentinel
-
WhiteHat Sentinel is a Software-as-a-Service (SaaS) platform that enables your business to quickly deploy a scalable application security program across the entire software development lifecycle (SDLC). Combining advanced scanning technology with the world’s largest application security research team, we accurately identify your vulnerabilities and scale to meet any demand without slowing you down.
-
Product
Enterprise-Wide Application and Security Testing
PerfectStorm ONE
-
Keysight Network Applications and Security
Enterprises and government organizations are making major investments in consolidating and rebuilding data centers and enterprise -wide networks. The stakes have never been so high to get it right the first time.
-
Product
Digital Spectroscopy
-
CAEN SyS is the new Systems & Spectroscopy Division of CAEN Spa. Such Division relies upon an extremely strong foundational knowledge of nuclear measurement instrumentation in developing Radiation Measurements Systems and Spectroscopy Solutions. These systems and solutions are perfectly suited to operations involving Nuclear Fuel Facilities, Nuclear Power Plants, Measurements Laboratories, and Security Applications.
-
Product
Cybersecurity and Compliance Solution
Application Audit
-
Application Audit, Compuware's mainframe cybersecurity and compliance solution, enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Using Application Audit, security staff can: Deter insider threats by capturing and analyzing start-to-finish user session activity. Integrate user behavior intelligence with popular SIEM engines to analyze the overall application environment. Support criminal/legal investigations with complete and credible forensics. Fulfill compliance mandates regarding protection of sensitive data. The Value of Application Audit. Provides deep insight into user behavior including data viewed, by whom and which applications were used to access it. Enables immediate analysis through the automatic delivery of data to SIEM platforms such as Splunk and QRadar, either directly or in combination with CorreLog zDefenderTM for z/OS or Syncsort Ironstream. Delivers granular intelligence and reporting capabilities needed to comply with regulations such as HIPAA and GDPR as well as security policies. Eliminates dependency on specialized mainframe knowledge. Separates the system administrator's duties from mainframe-inexperienced auditor's responsibilities with a web UI, so that no single person is in a position to engage in malicious activities without detection.
-
Product
Embedded Security
-
Efficient, reliable, and intuitive: The world-leading end-to-end embedded security builder.
-
Product
Security Vehicles
-
When you need to set up robust security operations in a temporary or outdoor location, our security vehicles can provide a tried and tested solution. For use at festivals, public ceremonies, sports events and other outdoor functions, our mobile check point and scan truck will help keep your guests or members of the public safe from security threats.
-
Product
Secure CDN
-
Increase your conversion with our global CDN infrastructure to speed up your website load times and provide the highest streaming quality to your customers. Through improved loading times, it has been shown that conversion rates can be improved up to 2,5 times. You also benefit from the highest possible security and compliance for your content. Secure CDN combines all the benefits in one innovative solution.
-
Product
Security Gateways
-
Schweitzer Engineering Laboratories, Inc.
Security gateways combine cybersecurity capabilities to create secure access paths through security perimeters.
-
Product
Security Testing
-
We protect your business from cyber attacksSecure online transactionsPrevent unauthorized accessMinimize the risk of data lossEnhance resistance to DoS attacks
-
Product
Application Software
-
Application software is a key element of a premium measurement system. Applying this software approach to a broad range of radiation detector hardware and data acquisition systems, ORTEC software offers comprehensive nuclear measurement solutions that provide integrated hardware control, analysis, and display in a single, easy-to-use package.
-
Product
Network Security
TrustMonitor™
-
TrustMonitor™ provides continuous monitoring of the trust network by:*(Analyzing content & constraints for validity of credentials*Monitoring that certificate authorities are available to support validation*Easily scaling to incorporate new certificate authorities (no agent required)
-
Product
ALD Applications
-
Atomic Layer Deposition (ALD) has the potential to optimize product design across a wide array of applications from making silicon chips run faster, to increasing the efficiency of solar panels, to improving the safety of medical implants.
-
Product
Secure NFC
-
Mobile security is expanding from the largely deployed SIM technology to the growing NFC, embedded Secure Element (eSE) and embedded SIM (eSIM) technologies in smartphones, tablets, wearables, and laptops. ST provides an exhaustive offer of NFC and eSE/eSIM products to address secure mobile transaction applications such as secure connectivity, payment wireless charging and automotive: from the state-of-the-art ST21NFC to the ST54 integrating the widely deployed ST33.
-
Product
Application Software
-
Application software offers power and flexibility to expedite your applications. This high performing software tool manages numeric, waveform, and harmonic data measure. It allows data to be tranferred to and configured on your personal computer for maximum flexibility and support.
-
Product
Hipot & Security Tester
-
Safety testers (also called hipot testers) ensure the safe use of test items in different working environments and under different operating conditions. There are a variety of solutions, depending on the tests required to meet the relevant industry standards. Many test units offer a combination of functionality and performance.
-
Product
Desktop Application
-
Desktop application testing refers to the testing of standalone software that can perform without a network, on a desktop, or on a laptop. Desktop applications are not affected by network downtime.
-
Product
Security Testing
-
Security/negative testing is typically conducted during development to highlight how a DUT handles abnormal conditions like very high traffic load, different frame sizes (incl. undersized and oversized frames), framed with different IFG settings, various types of errors and deviation of the signal frequency, as well as various DDoS attacks.
-
Product
Security Consulting
-
Our Managed Security Services can dramatically improve your ongoing security posture through more frequent, cost effective security assessments, helping you to identify, assess and manage risk.
-
Product
Application Performance Testing
-
An important part of application performance testing is to conduct such tests in conditions that realistically reflect the environment in which the application is ultimately expected to operate.
-
Product
API Security Testing
-
Nowadays, APIs are frequently used for communication between two applications. In this communication, lots of sensitive data is transferred between devices and the server.In order to be protected in the event of a data loss or attack, we must secure our API.
-
Product
Application Testing
-
Applications have become a critical component of our daily work and personal lives. From office productivity software to mobile and other consumer applications that enrich our lives, we have become increasingly dependent on their on-demand availability. Creating and deploying a robust application architecture requires extensive planning and testing.





























