Cyber Security
See Also: Cyber, Phishing, Pen Testing, DDoS
-
Product
InfiniStreamNG Platform
-
NETSCOUT’s new InfiniStreamNG™ platform harnesses the power of IP intelligence by mining traffic in real-time to deliver accurate and actionable data for service assurance, cybersecurity and business intelligence applications. The InfiniStreamNG platform fully supports the nGeniusONE® and Iris application suites.
-
Product
Advanced Natural Gas Leak Detection Platform
ABB Ability Series
-
Altogether, the complete ABB Gas Leak Detection Platform makes it possible to find leaks throughout the entire natural gas infrastructure – upstream, midstream, downstream, and from utilities – with far higher reliability and speed than ever before by combining leading-edge, cybersecure measurement technology, with advanced data analytics.
-
Product
Cybersecurity Penetration Testing Assessments
Tripwire Professional Services
-
Organizations do all that they can to protect their critical cyber assets, but they don’t always systematically test their defenses. Penetration tests—otherwise known as pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems. Whether we are testing an application or network environment, Tripwire’s pen testing will not only identify vulnerabilities, but it will also demonstrate them through exploitation—definitively determining if unauthorized access or other malicious activity is possible.
-
Product
Automotive Cybersecurity
-
On the one hand, connectivity functions allow manufacturers to monitor the vehicles’ state and install security updates when necessary. On the other hand, the growing number of communication channels increases the potential of gateways for hackers. To create a secure vehicle, you must consider all the connected elements and take a holistic approach.
-
Product
Network Security
-
PLANET Network Security solution is designed to build a strong and secure network for any commercial and industrial environments. By providing functions like cybersecurity, SPI firewall, VPN, IDP, antispam and antivirus, this collection includes VPN Security Gateway, 5G NR Gateway, Flat-type Smart Router, UTM Content Security Gateway and Wireless VPN Routers. A variety of product lines can satisfy all the demands of enterprises, SMBs, factories, communities and more for the network security including remote management and surveillance of IoT, IIoT and building automation applications.
-
Product
GleanPackets
-
Identifying cyber security risks and solving network performance problems are becoming primary concerns for enterprises and small businesses. Many companies record network traffic and store the PCAP files for security forensics at a later time, but it is excruciatingly difficult to manage PCAP files and dig through mountains of information to find the relevant data. Searching through multiple large PCAP files and opening up each one with an analysis program is like looking for a needle in many haystacks. GleanPackets search is a powerful, affordable, and easy to use packet search engine that exports PCAP files to your favorite 3rd party web and mobile applications and network appliances via our REST API. Our user friendly interface will guide you through your searches, enabling you to find the the data you need quickly and painlessly. GleanPackets Search is available in several forms.
-
Product
Cyber Security Testing Services
-
Cyber security testing is often also referred to as pen testing or penetration testing. Such tests validate the cyber security defences of your applications, network infrastructure and even your team members. Our cyber security testers are highly trained and certified ethical hackers.
-
Product
Cyber Security Training
-
Elbit Systems of America's comprehensive attack scenario library reflects the most recent threat landscape. Our cyber security experts continuously update training scenarios with newly discovered attacks and tactics. Versatile network settings and attack scenarios equip cyber security teams with customized training specific to each team's organization.
-
Product
Cyber Security and Digital Data Protection
-
As security demands evolve, Applied Computer Technologies provides a layered and progressive approach to security. Organizations without a sufficient security footprint are being affected and held ransom, operations disrupted, and business reputations damaged. We've partnered with some amazing and innovative companies to offer our clients the best cyber security and protection available today. Our integrated security products include next generation firewalls; ransomware and crypto malware; secure connectivity; Email, encryption, archiving, and SPAM filtering; Web and content filtering; and data integrity & theft prevention.
-
Product
Cyber Crisis Simulator
-
When responding to a cyber crisis, the C-Suite no longer works in a silo. Executive management continuously collaborates with incident response and SOC teams to make well-informed decisions. But tabletop exercises and conventional crisis simulation platforms do not prepare for this new reality.
-
Product
Secure NFC
-
Mobile security is expanding from the largely deployed SIM technology to the growing NFC, embedded Secure Element (eSE) and embedded SIM (eSIM) technologies in smartphones, tablets, wearables, and laptops. ST provides an exhaustive offer of NFC and eSE/eSIM products to address secure mobile transaction applications such as secure connectivity, payment wireless charging and automotive: from the state-of-the-art ST21NFC to the ST54 integrating the widely deployed ST33.
-
Product
Secure CDN
-
Increase your conversion with our global CDN infrastructure to speed up your website load times and provide the highest streaming quality to your customers. Through improved loading times, it has been shown that conversion rates can be improved up to 2,5 times. You also benefit from the highest possible security and compliance for your content. Secure CDN combines all the benefits in one innovative solution.
-
Product
Aviation Security
-
Aviation is highly regulated, from ICAO Annex 17 to National Security Programs. Due to its high profile and the subsequent multitude of threats, regulation safeguards travel security. Our expertise will support your business, by supplying market leading X-Ray and Metal detection products along with maintenance, that meet the regulator requirements and best fit your business.
-
Product
SQL Secure
-
SQL Secure dramatically reduces the complexity and manual effort required to analyze, audit, and manage SQL Server security. It allows Database Administrators (DBAs) to confidently answer the critical question: “Who has access to what, where, and how?”—across on-premises and cloud-based SQL Server environments.
-
Product
Industrial & Security
D-Matrix
-
The D-Matrix Gamma Ray Imager is a fully integrated, photon-counting, pixilated, 12-bit energy discriminating CZT detector/imager.
-
Product
Industrial & Security
-
Kromek's custom configurations of Cadmium Zinc Telluride (CZT) based detector tiles and linear arrays can be implemented into custom Advanced Imaging platforms for various Industry and Security applications.
-
Product
Security Testing
-
For an application to be successful, it has to ensure the security of the customer’s data, which in turn helps to gain the trust of the customers, avoid legal battles, and enables growth in business.
-
Product
Thermal Security Camera
Elara™ FC-Series O
-
The Elara™ FC-Series O thermal security camera is one of FLIR’s premium thermal security cameras for perimeter protection. The Elara FC-Series O integrates with external video analytics devices, such as FLIR’s TRK or third party solutions, to classify human or vehicular intrusions. The Elara FC-Series O also offers a wide range of high-performance lenses, with a choice of resolutions, offering greater flexibility for tailoring security systems to specific site conditions.
-
Product
Security Testing Services
-
Alphabin Technology Consulting
Fortify your digital defenses and enhance the resilience of your systems to safeguard against cyber threats.
-
Product
Advanced Sensors & Security Systems
-
Applied Research Associates, Inc.
ARA has provided security services since the mid-1980s and today provides tools to maximize physical security that are highly scalable and affordable, offering our government and commercial customers advanced perimeter security, threat pattern analysis, and intrusion detection. We integrate our detection and assessment capabilities to provide a real-time, complete operational picture to keep personnel and assets secure, day and night. Our engineers are experts in design and integration of multiple sensor types and other intrusion detection systems to create customizable, integrated mobile security systems.
-
Product
OT Network Security Appliances
-
Rugged industrial network security appliances with multi-core, fanless, wide temperature and RF options for industrial OT and SD-WAN applications.
-
Product
Portable Security System
Sensor-1
-
The portable security system that fits in the palm of your hand. Sensor-1 detects real-time changes in motion and alerts you when your important items move. Operates independent of the mobile app. Communicates with smartphones, tablets, laptops and desktops.
-
Product
Secure Wearable Solutions
-
From ST31 secure microcontrollers to ST54 solutions integrating NFC controller, secure element and eSIM, ST offers a complete range of solutions for payment, transit and multiple contactless services. ST's technology is ideal for applications that require a card emulation function but are environmentally challenged or have limited space for the antenna.
-
Product
Network Security Appliances
-
With the development and popularization of cloud computing technologies, traditional network security providers are repositioning and moving their development efforts from network security solutions that can only handle single point security issues to a new generation of network security solution that are effective in big data and cloud computing environments. ICT equipment providers in the network security industry need network security servers that have massive DPI parsing power, full support for NFV and SDN, and a powerful big data processing engine. This equipment must also support dynamic capacity expansion and scalable IO extension in order to adapt to a more complicated cloud environment.
-
Product
Security Testing
-
We protect your business from cyber attacksSecure online transactionsPrevent unauthorized accessMinimize the risk of data lossEnhance resistance to DoS attacks
-
Product
Visible Security Cameras - Dome Cameras
-
Teledyne FLIR Visible Security Cameras - Dome Cameras
-
Product
Network Test and Security
-
Ensuring high performance of wired, Wi-Fi, and 3G/4G/LTE and 5G networks in both pre-deployment and real-world environments while enabling dynamic security intelligence to help stay one step ahead of attacks.
-
Product
Kalypso-Military Grade Secure Messaging Application
-
Secure Messenger Application (Code name : Kalypso) is a revolutionary Application designed to provide its users with end-to-end secure communication (Text, Voice and Video) using proprietary robust communication protocol / 256 bit military grade encryption algorithm with an On Premises Server.





























