Cyber Security
See Also: Cyber, Phishing, Pen Testing, DDoS
-
Product
Network Centric Secure Router
-
The system utilizes a 26-port layer 2/3 Gigabit Ethernet switch with embedded 32-bit CPU.It supports combinations of up to 26 SGMII ports consisting of 12 GbE Cu PHYs, 12 SGMII interfaces, two of which support 1G/2.5G, and up to three QSGMII ports. One of the SGMII ports can be dedicated to the CPU for packet insertion and extraction. The devices meet IEEE 802.3az requirements for green energy efficient Ethernet.
-
Product
Network Security Appliances
-
Full range network appliances for applications such as NGFW, UTM, DPI, IDS/IPS, comes with scalability, modular design, reliability & manageability.
-
Product
Fixed Surveillance System for Perimeter Security
Argus
-
Argus is a fixed, rugged, preconfigured wide area surveillance system. Combining a best-in-class radar and thermal camera with Command and Control software, Argus is designed to detect and track multiple threats both near and far in the most demanding weather conditions 24 /7. When compared to other perimeter security solutions, Argus has the lowest initial cost per kilometer of secured space as well as the lowest lifetime cost.
-
Product
Security & Defence
-
At Kromek we design, develop, produce, and distribute products and solutions for the Security & Defence sectors, including, but not limited to defence, border control, homeland security and emergency services.
-
Product
Cross Domain Security Solutions
-
Stratign’s Cross Domain Security Solutions are highly trusted, government-accredited network security components that control and, if necessary, block the flow of data between two security domains at all layers.
-
Product
Security Testing
-
Security/negative testing is typically conducted during development to highlight how a DUT handles abnormal conditions like very high traffic load, different frame sizes (incl. undersized and oversized frames), framed with different IFG settings, various types of errors and deviation of the signal frequency, as well as various DDoS attacks.
-
Product
Cloud Security Solutions
-
Online threats are constantly changing. Offering protection against the largest and most sophisticated attacks, Akamai helps you safeguard your websites and other Internet-facing applications from the risks of downtime and data theft. Built on the Akamai Intelligent Platform, Akamai Cloud Security Solutions provide the scale to stop the largest Distributed Denial-of-Service (DDoS) and web application attacks without reducing performance, as well as intelligence into the latest threats and the expertise to adapt to shifting tactics and attack vectors.
-
Product
Hybrid Network Security Policy Management
AlgoSec Cloud
-
Across cloud, SDN, on-premises and anything in between - one platform to manage it all.
-
Product
Security Testing Services
-
You're building more-complex software faster than ever before, but does your team have sufficient application security skills and resources to test it for security defects? Synopsys security testing services provide continuous access to security testing experts with the skills, tools, and discipline needed to cost-effectively analyze any application, at any depth, at any time.
-
Product
Security Testing Service
-
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
Product
Secure Flexible and Automated Hybrid Cloud Infrastructure
KnackStack
-
KnackStack introduces flexible and automated hybrid cloud infrastructure as a service for cloud agnostic deployments and automation. It's designed for the U.S. nation's most secure applications to automate data management and security.
-
Product
1U Rackmount Network Appliance With AMD EPYC™ 8004 Series Processor For NFV And SD-WAN. Ideal For High-Performance Network Security.
FWA-5082
Network Appliance
Up to 64 cores for NFV needs with single AMD EPYC™ 8004 Series processorsUp to 12 DDR5 RDIMM memory to boost computing capability4 x NMC with PCIe Gen5 for networking (Compatible with Gen4 & Gen3)High availability system with redundant solutionsManaging system with Advantech in-house IPMI firmware. (Comply with Redfish 1.14.1)
-
Product
Security Labs
-
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
Product
Quantum-Safe Security
CN9000 Series
-
The Centauris CN9000 Series is the first commercially available certified high-assurance 100Gbps Ethernet encryptor that supports the most complex fully meshed topologies – enabling 100% security for Big Data, Cloud and data centre services’ ultra-fast networks.
-
Product
ARINC 615/615A Tablet PC Secure PDL Solution
PDL-615
-
Avionics Interface Technologies
The PDL-615 is a secure rugged, portable, tablet PC based ARINC 615 & ARINC 615A PDL solution.
-
Product
Omnisens Securing Power Cable Integrity
https://www.omnisens.com/uploads/1/2/0/5/120592129/published/omnisens-cobra-logo-white-2014-06-10.png?1546958203
-
In both underground and subsea cables incipient faults often result in temperature events. Using optical fibers integrated into the power cable or laid close by, Distributed Temperature Sensing (DTS) helps detect changes and faults allowing the operator to intervene before the cable fails. It is suitable for deployment in any cable where an optical fiber is present, including HVDC, HVAC, export, inter-array, transmission and distribution.
-
Product
AlgoSec Platform - Secure Application Connectivity
AlgoSec
-
Use automation to speed up and tighten your security policies.
-
Product
Trusted & Secure Servers
-
A part of the EnterpriseSeries™ product line, Mercury’s RES Trust servers employ U.S. designed and manufactured motherboards with embedded Intel® processors and composable BuiltSECURE™ framework to deliver trusted performance for the most security-imperative mission critical applications. RES Trust servers can be configured with a variety of nation-state-level security features. System security features enable customer Foreign Military Sales (FMS) or Direct Commercial Sales (DCS) program success.
-
Product
Security Testing Services
-
By testing the flaws in software, our security testing services seek to remove vulnerabilities before the software is deployed or purchased. By focusing on the different layers of an information system across the database, infrastructure, network, and access channels such as mobile, security testing looks at making the applications free from vulnerabilities. We assist online service providers, website owners, and independent software vendors to manage application security risks. We offer a comprehensive range of white, grey, or black-box model security testing based on your stage in the development cycle.
-
Product
Perimeter Security And Coastal Surveillance Systems
-
These systems comprise of Radars and Cameras and can give early warming to the commanders about any intrusion/breach of perimeter of any restricted area. These can be integrated with jammers to tackle drone threats too.
-
Product
Thermal Analytics Security Camera
ELARA™ FC-Series ID
-
The Elara FC-Series ID is a premium FLIR thermal security camera for perimeter protection. The Elara FC-Series ID includes onboard video analytics capable of classifying human or vehicular intrusions, resulting in fewer false alarms.The Elara FC-Series ID also offers a wide range of high-performance lenses and multiple resolutions, giving greater flexibility in tailoring security systems to specific site conditions.
-
Product
Quantum-Safe Security
CN6000 Series
-
The Centauris CN6000 encryptors may be upgraded to quantum cryptography through the addition of the Cerberis Quantum Key Distribution (QKD) server to ensure that the solutions are quantum-safe for the long-term protection of sensitive data. This also ensures investment-protection of the encryptors. Such quantum cryptography is provably secure, ensures anti-eavesdropping detection and provides long-term forward secrecy against brute force hacking and attacks by quantum computers.
-
Product
Multi-Protocol Wireless Application Networking System with Open, Integrated, Secure & Scalable System for Data Aggregation & Viewing
Ion
-
Jacobs’ vendor agnostic architecture was designed and implemented with the goal of an open Industrial Internet of Things (IoT) solution. ion© adapts and applies technology that enables our customers to gain efficiencies and savings, through connecting our client’s sites then collecting and displaying data in a unified interface. This provides custom insights to our clients, empowering them to ensure safety and respond quickly. The Jacobs ion© solution has been operationally deployed for over a decade and enables innovative approaches for data accuracy, data timeliness, and safety — greatly improving information flow and productivity.
-
Product
Checkpoint Security System
ConneCT
System
The ConneCTTM Checkpoint Security System is an advanced aviation security explosive detection system (EDS) engineered to deliver superior threat detection, dramatically improved passenger throughput, and low total cost of ownership.
-
Product
NETWORK SECURITY
-
Network Critical Solutions Limited
Network Critical gives all your security systems complete, uncompromising visibility into what’s happening on the network. Get better overall ROI by improving performance of existing security systems to keep pace with increasing network speed and complexity, while gaining the insight needed to better detect, contain and recover from breaches fast.
-
Product
1U Rackmount Network Appliance With 4th/5th Generation Intel® Xeon® Scalable Processor For NFV And SD-WAN. Ideal For Enterprise Network Security.
FWA-5072
Network Appliance
Single 4th/5th Gen Intel® Xeon® Scalable Processors, up to 60 Cores16 x DDR5 ECC RDIMM slotsHot-swap system fan and redundant PSU, 2 x Internal 2.5" disk bays, 1 x HH/HL PCIe Gen4 x16 slotIntel® QAT with up to 200G crypto supportIPMI v2.0 compliant with web interface4 x Advantech network module expansions w/ PCIe Gen5 bandwidth
-
Product
Full-HD Mini Dome Security Camera
FLIR ARIEL™ CM-3202
-
The Ariel CM-3202 mini dome camera offers 1080p video and fast frame rates in high-motion, low light scenes. True wide dynamic range (WDR) on the CM-3202 captures sharp video in complex environments, such as critical infrastructure sites, commercial offices, and large campuses. With a strong H.265 built-in motion processing architecture, the Ariel CM-3202 mini dome delivers predictable, efficient streaming and storage, reducing utility costs and total cost of ownership (TCO).
-
Product
API Security Testing
-
In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:
-
Product
Hardware Security For Programmable System Control
Mach-NX
-
*Up to 8.4K LC of user logic, 2669 kbits of user flash memory and dual boot flash feature*Up to 379 programmable I/O supporting 1.2/1.5/1.8/2.5/3.3 I/O voltages*Secure enclave supports 384-bit cryptography, including SHA, HMAC, and ECC*Configuration of PFR and security functions through Lattice Propel simplifies developer experience*Highly reliable. Low power and 3X better SER performance to comparable CMOS technologies





























