Application Security
vulnerabilities identification and remediation software.
-
Product
Special Application
-
Columbia Research Laboratories
This group of Piezoelectric Accelerometers have been specifically designed to meet Columbia Research Labs customers "special" needs. Whether it be our model 876 designed for use in extremely cold temperatures (-400°F) or our model 378-HT-1XP, designed with an extremely rugged housing for prolonged use in adverse industrial environments of shock, vibration, temperature, humidity and excessive oil, that can withstand temperatures of 700°F. We would be happy to see this list of sensors grow to meet your needs. Please call us so we can make something "special" for you.
-
Product
Condenser for General Applications
PECA2
-
Lifasa - International Capacitors, SA
These capacitors are designed for use in circuits where they are subjected to non-sinusoidal voltages and pulsed currents, such as switching and damping circuits. They can also be used as discharge and filtering capacitors, as well as for any DC application. This capacitor is especially suitable for applications where a high life expectancy and a high RMS current are required.
-
Product
API Security Testing
-
In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:
-
Product
Cross Domain Security Solutions
-
Stratign’s Cross Domain Security Solutions are highly trusted, government-accredited network security components that control and, if necessary, block the flow of data between two security domains at all layers.
-
Product
Trusted & Secure Servers
-
A part of the EnterpriseSeries™ product line, Mercury’s RES Trust servers employ U.S. designed and manufactured motherboards with embedded Intel® processors and composable BuiltSECURE™ framework to deliver trusted performance for the most security-imperative mission critical applications. RES Trust servers can be configured with a variety of nation-state-level security features. System security features enable customer Foreign Military Sales (FMS) or Direct Commercial Sales (DCS) program success.
-
Product
Network and Application Monitoring
IxChariot
-
Instant performance assessment of complex networks from pre- to post-deployment
-
Product
Dynatrace Application Monitoring
-
Start Dynatracing your applications in minutes with easy deployment and zero-configuration.Auto-discover and map all applications and transaction-flows in your distributed environment.Leverage self-learning baselines with alerts, out-of-the-box dashboards and auto-correlated system monitoring.Find problems before your users notice them with smart, early production error detection.Configure, manage and update easily with a centralized configuration consoleeven for thousands systems.Enable easy access for everyone who needs it. Provide one system valuable to all stakeholders by de-coupling system access and performance analysis.
-
Product
Application Specific Solutions
-
Circuit Check Application Specific Solutions for automotive, military & aerospace, medical, industrial, and computer networking applications.
-
Product
Spectroscopy Applications
-
Anadis Instruments Benelux b.v.
Spectroscopy has become a powerful tool leading to a broad range of applications, as can be seen in the map below. From the lesser known FT-IR analysis of lipid structures in skin (of interest when applying medicines to the skin as well as in studying the effects of skin aging) to the widely used measurement of additives and the octane number (RON, MON) in fuels. Using spectroscopic techniques has many advantages. The technique is non-destructive; almost any sample can be studied in virtually any state. The techniques are applicable off-line, in-line, at-line or on-line. Identification als well as quantification is possible. Check the map with applications, it will be regularly updated and expanded.
-
Product
Sequence Application Manager
AMFAX SAM
-
We have been building test systems for many years, as a result we find that many of the requirements our customers are looking for are very similar. This may be how a user logs in to the test system or the generation of test reports for example.
-
Product
Web Application Firewall
WAF
-
Your website security solution needs to keep up with the changing cyber threat. Protect your website with Cloudbric’s cloud WAF to block unknown and modified attacks.
-
Product
Security Testing
-
As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.
-
Product
Security Labs
-
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
Product
Network Security
TrustMonitor™
-
TrustMonitor™ provides continuous monitoring of the trust network by:*(Analyzing content & constraints for validity of credentials*Monitoring that certificate authorities are available to support validation*Easily scaling to incorporate new certificate authorities (no agent required)
-
Product
AI Application Board
MIO-5379
Single Board Computer
Intel Core Ultra Processors (Code Name: Arrow Lake, Meteor Lake). Intel Core Ultra Processors, up to 14 Cores, TDP 28W/15W. Dual Channel DDR5-6400 up to 96GB, with IBECC support.
-
Product
Thermal Analytics Security Camera
Elara™ FB-Series ID
-
The FLIR Elara™ FB-Series ID thermal security camera uses onboard analytics to classify human or vehicular intrusions, making it ideal for perimeter intrusion detection and sterile-zone monitoring. The Elara™ FB-Series ID can also hand off classified intrusions to FLIR PTZ cameras for autonomous tracking of intruders. Easy to set up, Elara™ FB-Series provide reliable detection with low false alarm rates in challenging environments, bad weather, and complete darkness.
-
Product
Cloud Security Testing
-
Using a cloud infrastructure is no more a new phenomenon in the digital world. Businesses use it as a basic practice now a days due to numerous benefits associated with it. Hence, it should be a top most priority for the businesses to secure their cloud infrastructure as that’s the nucleus of their business from all aspects. In cloud security testing, the cloud infrastructure is screened to identify security risks and the areas which can be exploited by the attackers. Cloud security testing is mainly performed to ensure that cloud infrastructure can protect the confidential information of an organization. QA Mentor adopts three different approaches during the cloud security testing process:
-
Product
Security Testing
-
For an application to be successful, it has to ensure the security of the customer’s data, which in turn helps to gain the trust of the customers, avoid legal battles, and enables growth in business.
-
Product
Security Testing Consultancy
-
QA Mentor provides an End-to-End security testing services through the array of preventive measures, proven methodology and framework, use of best tools identified through POCs (proof of concepts) and an excellent infrastructure which is using evolving technologies. The backbone of all of these are the industry and project experience QA Mentor and its highly qualified & certified Security Testing Consultants. Our consultants closely work with our customers to assess their system, conduct POC to identify the relevant preventive measure and tools to be used and guide the IT teams of the businesses with a clearly defined roadmap to be followed to secure their systems.
-
Product
Application Specific LC Systems
Nexera MX
-
Higher throughput is of the utmost importance to laboratory efficiency and profitability. Nexera MX processes twice the number of samples as conventional LCMS systems in the same amount of time.
-
Product
Application Software
-
Radiant's application software packages are used in conjunction with ProMetric® Imaging Colorimeters and Photometers to provide complete solutions for accomplishing specialized testing and calibration tasks in R&D, production lines, or in the field.
-
Product
Security and Traffic Monitoring System
-
Information System Technologies Inc.
ISTI’s versatile sensor nodes can support multiple sensing types including acoustic, seismic, visible/IR, and scanning laser. Several eye-safe scanning lasers form a distributed wireless sensor network and can continuously and accurately track as well as monitor ground vehicles and personnel in a surveillance area. This system provides super-fine angular and range resolution to precisely locate moving targets. Among other key benefits are: day/night operational capability, continuous monitoring and surveillance without blind spots, 360 degrees field-of-view, large coverage area, multiple closely spaced target tracking, threat classification, and automatic alarm generation. The system can be used in applications such as traffic monitoring, intrusion detection, border control, airport runway collision and incursion avoidance, and perimeter security.
-
Product
Mobile Application Testing
-
Mobile Application testing involves the testing of applications in mobile devices. The applications are tested for functionality, performance, usability, etc.
-
Product
Network Security Validation Platform
FireDrill
-
AttackIQ FireDrill is a game changing platform that seamlessly integrates into any existing network, delivering immediate visibility into your security program so you can mitigate risk, and maximize security ROI.
-
Product
Cyber Security Testing Services
-
Cyber security testing is often also referred to as pen testing or penetration testing. Such tests validate the cyber security defences of your applications, network infrastructure and even your team members. Our cyber security testers are highly trained and certified ethical hackers.
-
Product
LabVIEW Communications Application Frameworks
-
The Application Frameworks are software reference designs that provide a rich set of high performance FPGA IP for prototyping real-time wireless communication systems. When combined with NI’s line of software defined radios, the Application Frameworks form a complete hardware and software prototyping platform that enables researchers to accelerate their prototyping efforts and achieve results quickly.
-
Product
Secure Hardened Android Phone
-
Shoghi has designed a totally Secure Hardened Android phone, which comes with a Specialized Operating system to prevent Hackers from remotely compromising your device , from all major vulnerabilities and exploits including protection from zero-days.
-
Product
In-Circuit Test Applications
-
With decades of experience developing test fixtures, we are the recognized industry leaders for solid and reliable quality as well as our outstanding customer service. We fully support our products locally and worldwide for maintenance, repair, and ECO work. Also, 100% wiring verification is part of our Quality Control process, by utilizing automated verification machines for GenRad/Teradyne and HP/Agilent fixture.





























