Cyber Security
See Also: Cyber, Phishing, Pen Testing, DDoS
-
product
Enhance Secure Control Applications
MachXO3D
*Simplifies implementation of hardware security by integrating Root-of-Trust in your platform’s first on, last off device*Supports security throughout the product lifecycle including device manufacturing and transport, platform manufacturing, installation, operation and decommissioning
-
product
Kalypso-Military Grade Secure Messaging Application
Secure Messenger Application (Code name : Kalypso) is a revolutionary Application designed to provide its users with end-to-end secure communication (Text, Voice and Video) using proprietary robust communication protocol / 256 bit military grade encryption algorithm with an On Premises Server.
-
product
Thermal Analytics Security Camera
Elara™ FB-Series ID
The FLIR Elara™ FB-Series ID thermal security camera uses onboard analytics to classify human or vehicular intrusions, making it ideal for perimeter intrusion detection and sterile-zone monitoring. The Elara™ FB-Series ID can also hand off classified intrusions to FLIR PTZ cameras for autonomous tracking of intruders. Easy to set up, Elara™ FB-Series provide reliable detection with low false alarm rates in challenging environments, bad weather, and complete darkness.
-
product
Cross Domain Security Solutions
Stratign’s Cross Domain Security Solutions are highly trusted, government-accredited network security components that control and, if necessary, block the flow of data between two security domains at all layers.
-
product
SST Security Assessment
Self-Service Terminal (SST) penetration testing is an activity which identifies vulnerabilities in SST that may potentially exist due to the lack of physical security measures, technical configuration or process controls.
-
product
Secure Access
Schweitzer Engineering Laboratories, Inc.
Devices with secure access authenticate users, control privileges, and create audit trails.
-
product
Secure Flexible and Automated Hybrid Cloud Infrastructure
KnackStack
KnackStack introduces flexible and automated hybrid cloud infrastructure as a service for cloud agnostic deployments and automation. It's designed for the U.S. nation's most secure applications to automate data management and security.
-
product
ARINC 615/615A Tablet PC Secure PDL Solution
PDL-615
Avionics Interface Technologies
The PDL-615 is a secure rugged, portable, tablet PC based ARINC 615 & ARINC 615A PDL solution.
-
product
Modernized Navstar Security Algorithm (MNSA) M-code Testing
SimMNSA
The M-code signal is part of the security architecture that all new Military GPS User Equipment (MGUE) has been required to use since 2017. Until recently, testing with non-classified AES-encryption and replay of M-code Satellite Data Sets (SDS) have been the only methods authorized for GPS M-code receiver testing using a constellation simulator.
-
product
Application Security Testing Solution
CxIAST
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.
-
product
Thermal Security Camera with Onboard Analytics
Triton™ F-Series ID
The FLIR Triton™ F-Series ID thermal security cameras set the new standard of perimeter protection for critical infrastructure. The Triton F-Series ID features best-in-class thermal imaging detail and high-performance onboard analytics for classifying human or vehicular intrusions. FLIR’s premium line offers five models with full 640 × 480 thermal resolution, longer detection ranges, and better analytics performance than ever before.
-
product
Intelligent Chatbot for Network Security Policy Management
AlgoBot
AlgoBot, is an intelligent chatbot that handles network security policy management tasks for you. AlgoBot answers your questions, submitted in plain English, and personally assists with security policy change management processes – without requiring manual inputs or additional research.
-
product
E2E Security Connector
The E2E Security Connector is a cloud solution for enhancing the security level of your system. It provides secure generation and management of confidential data during the pre-personalization process of your connected devices as well as different protection schemes for its application and data transportation layer.
-
product
Thermal Analytics Security Camera
ELARA™ FC-Series ID
The Elara FC-Series ID is a premium FLIR thermal security camera for perimeter protection. The Elara FC-Series ID includes onboard video analytics capable of classifying human or vehicular intrusions, resulting in fewer false alarms.The Elara FC-Series ID also offers a wide range of high-performance lenses and multiple resolutions, giving greater flexibility in tailoring security systems to specific site conditions.
-
product
Security Labs Community Edition
*Hack and Patch Real Applications- Get hands-on experience with top vulnerabilities and see the fix impact in a live app, in real-time.*Level-Up Your Coding Approach- Add secure coding to your list of skills by fixing issues that you face regularly, in the languages you’re most comfortable with. *Complete Labs in Minutes- With labs under 10 minutes, you can learn fast and gauge your progress in real-time for quick feedback.
-
product
Security Consulting
Our Managed Security Services can dramatically improve your ongoing security posture through more frequent, cost effective security assessments, helping you to identify, assess and manage risk.
-
product
Security Devices
Schweitzer Engineering Laboratories, Inc.
Security devices protect perimeters and secure communications within LANs.
-
product
Cyber
General Dynamics Global Imaging Technologies
The Cyber Domain crosses and integrates with all domains - Land, Sea, Air and Space. We’re designing, building and delivering data protection products and solutions, and web-based SaaS to rapidly strengthen the mission and help our customers successfully navigate the cyber domain.
-
product
Security Testing
We protect your business from cyber attacksSecure online transactionsPrevent unauthorized accessMinimize the risk of data lossEnhance resistance to DoS attacks
-
product
Network Security Appliances
Full range network appliances for applications such as NGFW, UTM, DPI, IDS/IPS, comes with scalability, modular design, reliability & manageability.
-
product
High-Performance Application and Security Load Module
PerfectStorm 10/1GE Load Module
Keysight Network Applications and Security
Equipped with powerful multi-core, multi-threaded network processors, PerfectStorm 10/1GbE is designed to satisfy the testing needs of manufacturers needing speed flexibility in their testing resources. Networking equipment manufacturers building new equipment or service providers and large enterprises integrating this them benefit from testing and verifying performance and functionality prior to deployment.
-
product
Enterprise-Wide Application and Security Testing
PerfectStorm ONE
Keysight Network Applications and Security
Enterprises and government organizations are making major investments in consolidating and rebuilding data centers and enterprise -wide networks. The stakes have never been so high to get it right the first time.
-
product
3U VPX Virtual Secure Router
VSR347D
The VSR347D takes advantage of Abaco’s SBC347D hardware with an optimized environment running Juniper Networks’ vSRX Virtual Firewall, providing high levels of network security and performance in a single 3U VPX slot.
-
product
Open Source Advanced Web Security Testing Platform
IronWASP
IronWASP (Iron Web application Advanced Security testing Platform) is an open source system for web application vulnerability testing. It is designed to be customizable to the extent where users can create their own custom security scanners using it.
-
product
Application Security Platform
Sentinel
WhiteHat Sentinel is a Software-as-a-Service (SaaS) platform that enables your business to quickly deploy a scalable application security program across the entire software development lifecycle (SDLC). Combining advanced scanning technology with the world’s largest application security research team, we accurately identify your vulnerabilities and scale to meet any demand without slowing you down.
-
product
Portable Security System
Sensor-1
The portable security system that fits in the palm of your hand. Sensor-1 detects real-time changes in motion and alerts you when your important items move. Operates independent of the mobile app. Communicates with smartphones, tablets, laptops and desktops.
-
product
API Security Testing
Nowadays, APIs are frequently used for communication between two applications. In this communication, lots of sensitive data is transferred between devices and the server.In order to be protected in the event of a data loss or attack, we must secure our API.
-
product
ARINC 615/615A Integrated Secure PDL & Transport Solution
PDL-615-XT
Avionics Interface Technologies
The PDL-615-XT is a rugged ARINC 615 & ARINC 615A Secure PDL solution integrated with a rugged, portable, storage and transport case.





























