Application Security
vulnerabilities identification and remediation software.
-
Product
Thermal Security Camera
Elara™ FC-Series O
-
The Elara™ FC-Series O thermal security camera is one of FLIR’s premium thermal security cameras for perimeter protection. The Elara FC-Series O integrates with external video analytics devices, such as FLIR’s TRK or third party solutions, to classify human or vehicular intrusions. The Elara FC-Series O also offers a wide range of high-performance lenses, with a choice of resolutions, offering greater flexibility for tailoring security systems to specific site conditions.
-
Product
Multi-Mode And Single-Mode Applications
Expanded Beam Size 5 and 12 Contacts
-
Expanded Beam Fiber Optic Contact technology is specifically designed to fit into standard size 12 cavities of MIL-DTL-38999 Series I, III and IV connectors. The size 12 contact provides a robust fiber optic interconnection with low susceptibility to contamination and fits a variety of cable types with diameters from 1.6 to 2.2 mm with additional versions available upon request. The contacts are rear release/rear removable with standard size 12 removal tool.
-
Product
Network Security Appliances
-
Full range network appliances for applications such as NGFW, UTM, DPI, IDS/IPS, comes with scalability, modular design, reliability & manageability.
-
Product
Android Application Testing
-
As Android apps have become a valuable tool to target more audiences and boost sales, it is vital to have an application that is robust, engaging, and works efficiently with maximum capacity. We at QACraft test all the essential parameters of your android app to ensure that the application is up to the standards and works well to serve the purpose. Our detailed report and several test reports have made us the number one choice in android app testing services in the USA. We have also helped many clients globally to test their android applications for a better business and an improved experience for all the users. Our team makes sure that the app works with high speed without any bugs delivering the topnotch user experience.
-
Product
Ethernet Switch & Secure Router
VPX3-685
-
Curtiss-Wright Defense Solutions
The VPX3-685 is a fully-featured Layer-2/Layer-3 managed Ethernet router with a highly integrated security subsystem. Enabling the vision of Network Centric connectivity, the VPX3-685 Secure Ethernet Network Router provides an accelerated path to secure network-ready architectures that can interoperate seamlessly within the Global Information Grid (GIG).
-
Product
Mobile Application Testing
-
UpDoer Technology has the most innovative test automation tools and skilled experts to ensure your application is ideally tested as a certified mobile app testing organization. We are one of India's best Mobile app Testing companies that offer full-cycle testing from the planning to the post-launch phase.
-
Product
BGAN Application Tester
BAT
-
Square Peg Communications Inc.
While the BNE is tailored to the terminal development process, the BGAN Application Tester (BAT), is tailored towards application developers and provides a graphical user interface designed to simplify BGAN application testing.
-
Product
Special Application Products
-
Special applications from APPA. Browse our special applications from voltage testers to thermometers and other products.
-
Product
Security Labs Community Edition
-
*Hack and Patch Real Applications- Get hands-on experience with top vulnerabilities and see the fix impact in a live app, in real-time.*Level-Up Your Coding Approach- Add secure coding to your list of skills by fixing issues that you face regularly, in the languages you’re most comfortable with. *Complete Labs in Minutes- With labs under 10 minutes, you can learn fast and gauge your progress in real-time for quick feedback.
-
Product
Network Centric Secure Router
-
The system utilizes a 26-port layer 2/3 Gigabit Ethernet switch with embedded 32-bit CPU.It supports combinations of up to 26 SGMII ports consisting of 12 GbE Cu PHYs, 12 SGMII interfaces, two of which support 1G/2.5G, and up to three QSGMII ports. One of the SGMII ports can be dedicated to the CPU for packet insertion and extraction. The devices meet IEEE 802.3az requirements for green energy efficient Ethernet.
-
Product
Security intelligence & analytics
-
Detect and prioritize threats that pose the greatest risk. dentify high-risk threats with near real-time correlation and behavioral anomaly detection. Detect vulnerabilities, manage risks and identify high-priority incidents among billions of data points.Gain full visibility into network, application and user activity.
-
Product
Security Gateways
-
Schweitzer Engineering Laboratories, Inc.
Security gateways combine cybersecurity capabilities to create secure access paths through security perimeters.
-
Product
Communication Security
-
Shoghi Communications design and development specific Military Grade Crypto System , Shoghi provids end-to-end communication Security (COMSEC) and secure information transfer. Shoghi has strong experience in creating customer specific Algorithms and Key management schemes. All the hardware, inspite of all the complexities can be loaded by the customer themselves with their own algorithm, to enhance the whole security environment.We are known for our open source designs and crypto validated equipment supply to our military customers. In case of any specific design or development, please feel free to get in touch with our team
-
Product
Web Application Testing
-
UpDoer offers comprehensive, scalable testing solutions for critical web application projects through its unique business model. We understand the complex nature of such apps, whether they are created for enterprise users or mobile applications tailored to Android or iOS-based devices.
-
Product
Cloud Security
-
Cloud Security Assessment is the most critical phase before the product is finally deployed and Product is finally ready to handle real-world cyber security threats.
-
Product
Thermal Security Camera with Onboard Analytics
Triton™ F-Series ID
-
The FLIR Triton™ F-Series ID thermal security cameras set the new standard of perimeter protection for critical infrastructure. The Triton F-Series ID features best-in-class thermal imaging detail and high-performance onboard analytics for classifying human or vehicular intrusions. FLIR’s premium line offers five models with full 640 × 480 thermal resolution, longer detection ranges, and better analytics performance than ever before.
-
Product
Security and Traffic Monitoring System
-
Information System Technologies Inc.
ISTI’s versatile sensor nodes can support multiple sensing types including acoustic, seismic, visible/IR, and scanning laser. Several eye-safe scanning lasers form a distributed wireless sensor network and can continuously and accurately track as well as monitor ground vehicles and personnel in a surveillance area. This system provides super-fine angular and range resolution to precisely locate moving targets. Among other key benefits are: day/night operational capability, continuous monitoring and surveillance without blind spots, 360 degrees field-of-view, large coverage area, multiple closely spaced target tracking, threat classification, and automatic alarm generation. The system can be used in applications such as traffic monitoring, intrusion detection, border control, airport runway collision and incursion avoidance, and perimeter security.
-
Product
API Security Testing
-
In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:
-
Product
Security Testing Services
-
Alphabin Technology Consulting
Fortify your digital defenses and enhance the resilience of your systems to safeguard against cyber threats.
-
Product
Intelligent Application and Service monitoring
Datadog
-
With turn-key integrations, Datadog seamlessly aggregates metrics and events across the full devops stack.*SaaS and Cloud providers*Automation tools*Monitoring and instrumentation*Source control and bug tracking*Databases and common server components*All listed integrations are supported by Datadog
-
Product
ESPI Analysis Application
TP601010
-
First released by Intel in June 2013, the Enhanced Serial Peripheral Interface (“eSPI”) is designed as a replacement for the Low Pin Count (“LPC”) bus. eSPI supports communication between Embedded Controller (EC), Baseboard Management Controller (BMC), Super-I/O (SIO) and Port-80 debug cards. eSPI was available in the Sky Lake chipset (2015) and is available in the Kaby Lake [current] chipset. Cannonlake will support eSPI and is slated for release the second half of 2017. Icelake is scheduled for release in 2019 and it will mark the first chipset when eSPI becomes mandatory.
-
Product
Application Performance Testing
-
An important part of application performance testing is to conduct such tests in conditions that realistically reflect the environment in which the application is ultimately expected to operate.
-
Product
Cyber Security/Network Security Training
-
Stratign’s Cyber Security/Network Security Training provides cybersecurity professionals with foundational, intermediate, and advanced security skills imparted through experts in the field.
-
Product
Deep Dive Application Monitoring
-
Application performance management (APM) is critical to business success today. Dynatrace automatically sees and analyzes every single user transaction, all the time. All relevant metrics, environment changes, and application deployments are shown in real-time.
-
Product
Security Labs
-
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
Product
Applications Services
-
DXC is your trusted partner to help you simplify, modernize, and accelerate mission-critical applications that support business agility and growth. Take advantage of the latest digital platforms with both custom and packaged applications, ensure resiliency, launch new products and enter new markets with minimal disruption.
-
Product
Sequence Application Manager
AMFAX SAM
-
We have been building test systems for many years, as a result we find that many of the requirements our customers are looking for are very similar. This may be how a user logs in to the test system or the generation of test reports for example.
-
Product
Application Specific LC Systems
Method Scouting System
-
Method Scouting System is a method development system based on Shimadzu’s UHPLC technology. The combination with Method Scouting Solution dedicated control software achieves a fast and accurate method scouting workflow, offering excellent support for method development.





























