IP Security
-
Product
IP Waterproof Test Equipment
-
Shenzhen Bonad Instrument Co., Ltd.
BONAD’s IP waterproof test equipment is divided into nine common waterproof levels according to international and national standards, namely IPX1, IPX2, IPX3, IPX4, IPX5, IPX6, IPX7, IPX8 and IPX9. In addition, there are many different comprehensive rain test chambers, whether it is the common nine instruments or customized spray chambers, charging pile water spray tests or energy storage cabinet spray tests. For more information, please contact us, BONAD will provide you with professional technical advice and high-quality testing equipment.
-
Product
Security Testing
-
As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.
-
Product
Power Management IP
-
We provide a comprehensive set of silicon-proven, compatible IP clusters with the most advanced low-power design techniques.
-
Product
Security Labs
-
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
Product
Network Security
TrustMonitor™
-
TrustMonitor™ provides continuous monitoring of the trust network by:*(Analyzing content & constraints for validity of credentials*Monitoring that certificate authorities are available to support validation*Easily scaling to incorporate new certificate authorities (no agent required)
-
Product
Thermal Analytics Security Camera
Elara™ FB-Series ID
-
The FLIR Elara™ FB-Series ID thermal security camera uses onboard analytics to classify human or vehicular intrusions, making it ideal for perimeter intrusion detection and sterile-zone monitoring. The Elara™ FB-Series ID can also hand off classified intrusions to FLIR PTZ cameras for autonomous tracking of intruders. Easy to set up, Elara™ FB-Series provide reliable detection with low false alarm rates in challenging environments, bad weather, and complete darkness.
-
Product
ARINC 818-2 IP Core
-
iWave’s ARINC IP core is ARINC 818–2 compliant offering point-to-point, high-speed, low latency video transmission. This IP core can be implemented on any transceiver-based FPGA device. It can be used for both transmit and receive applications. This core supports configurable ADVB video formats and uses a simple streaming interface to interface with video & image processing IP cores supported by FPGA vendors.
-
Product
Cloud Security Testing
-
Using a cloud infrastructure is no more a new phenomenon in the digital world. Businesses use it as a basic practice now a days due to numerous benefits associated with it. Hence, it should be a top most priority for the businesses to secure their cloud infrastructure as that’s the nucleus of their business from all aspects. In cloud security testing, the cloud infrastructure is screened to identify security risks and the areas which can be exploited by the attackers. Cloud security testing is mainly performed to ensure that cloud infrastructure can protect the confidential information of an organization. QA Mentor adopts three different approaches during the cloud security testing process:
-
Product
FPGA Toolkits & IP
-
Curtiss-Wright Defense Solutions
Our tools and source code for use with our Xilinx Virtex and Kintex-based FPGA products include- FusionXF simplifies the development of FPGA-based application code by allowing developers to concentrate on their application without needing to worry about system integration of the hardware and operating system interface. The DDC family of IP cores supports decimation from 2 to 64 in complex mode and 2 to 32 in real mode
-
Product
Security Testing
-
For an application to be successful, it has to ensure the security of the customer’s data, which in turn helps to gain the trust of the customers, avoid legal battles, and enables growth in business.
-
Product
Security Testing Consultancy
-
QA Mentor provides an End-to-End security testing services through the array of preventive measures, proven methodology and framework, use of best tools identified through POCs (proof of concepts) and an excellent infrastructure which is using evolving technologies. The backbone of all of these are the industry and project experience QA Mentor and its highly qualified & certified Security Testing Consultants. Our consultants closely work with our customers to assess their system, conduct POC to identify the relevant preventive measure and tools to be used and guide the IT teams of the businesses with a clearly defined roadmap to be followed to secure their systems.
-
Product
Application Security Testing Solution
CxIAST
-
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.
-
Product
Security and Traffic Monitoring System
-
Information System Technologies Inc.
ISTI’s versatile sensor nodes can support multiple sensing types including acoustic, seismic, visible/IR, and scanning laser. Several eye-safe scanning lasers form a distributed wireless sensor network and can continuously and accurately track as well as monitor ground vehicles and personnel in a surveillance area. This system provides super-fine angular and range resolution to precisely locate moving targets. Among other key benefits are: day/night operational capability, continuous monitoring and surveillance without blind spots, 360 degrees field-of-view, large coverage area, multiple closely spaced target tracking, threat classification, and automatic alarm generation. The system can be used in applications such as traffic monitoring, intrusion detection, border control, airport runway collision and incursion avoidance, and perimeter security.
-
Product
PCI Bus Carrier for IP Modules
APC8620A
-
This board interfaces industry-standard Industrial I/O Pack (IP) modules to a PCI bus on a PC-based computer system.
-
Product
Network Security Validation Platform
FireDrill
-
AttackIQ FireDrill is a game changing platform that seamlessly integrates into any existing network, delivering immediate visibility into your security program so you can mitigate risk, and maximize security ROI.
-
Product
Cyber Security Testing Services
-
Cyber security testing is often also referred to as pen testing or penetration testing. Such tests validate the cyber security defences of your applications, network infrastructure and even your team members. Our cyber security testers are highly trained and certified ethical hackers.
-
Product
Secure Hardened Android Phone
-
Shoghi has designed a totally Secure Hardened Android phone, which comes with a Specialized Operating system to prevent Hackers from remotely compromising your device , from all major vulnerabilities and exploits including protection from zero-days.
-
Product
IP Gateway
SFT3503A
-
Hangzhou Softel Optic Co., Ltd.
SFT3503A Bidirectional IP Gateway is a head-end interface device which is used for DVB and Ethernet. It can be used both for a receiver and a lancers! On one hand, in the lancers part, this machine can be used for sending IP stream, turning the TS stream into IP Stream. On the other hand, in the receive part; this machine can be used for receiving IP stream, turning the IP stream into TS stream.
-
Product
Thermal Analytics Security Camera
ELARA™ FC-Series ID
-
The Elara FC-Series ID is a premium FLIR thermal security camera for perimeter protection. The Elara FC-Series ID includes onboard video analytics capable of classifying human or vehicular intrusions, resulting in fewer false alarms.The Elara FC-Series ID also offers a wide range of high-performance lenses and multiple resolutions, giving greater flexibility in tailoring security systems to specific site conditions.
-
Product
100GbE Application and Security Load Module
PerfectStorm 100GE 1-Port Load Module
-
Keysight Network Applications and Security
PerfectStorm is a highly modular hardware test platform enabling equipment providers, service providers and enterprises the ability to create real-world, high-stress conditions and user behavior to push new equipment and networks to their limits.
-
Product
Interface IP
-
Synopsys provides the industry’s broadest portfolio of complete, silicon-proven IP solutions, with leading power, performance, area, and security, for the most widely used interfaces such as PCI Express®, CXL, USB, Ethernet, DDR, HBM, Die-to-Die, CCIX, MIPI, HDMI, and Bluetooth.
-
Product
FPGA Image Processing (IP) Development Kit
ProcVision
-
Gidel’s Vision Pro Development Kit is an optimal solution for developing,validating, demonstrating and evaluating Image Processing (IP) andpipeline designs on FPGA.The suite is designed to provide a complete and convenient envelop enablingthe developer to focus strictly on the proprietary image processingdesign. The entire Vision Pro flow is within a single FPGA, independentof the final target application(s). The Vision Pro flow is composedof a pipeline that streams simulated data to the user image processingdesign under test (DUT) and then captures the design’s output streamfor displaying, storing, analysis and/or co-processing on host software.The entire process is performed on a single FPGA without the need foradditional peripheral connectivity or tools.Vision Pro suite is plug-and-play enabling the developer to begin at oncethe IP design development and validation. A simple design example providesthe developer immediate hands-on familiarization with the systemflow and supporting tools. The final design can be ported to any IntelFPGA device or other vendors’ devices (FPGA or ASIC) by replacing basiclibraries. To significantly reduce compilation time, initial design developmentmay be on a small FPGA device and later compiled for the targetdevice(s). The target implementation may use any FPGA board. For a fullImaging/Vision system solution, Gidel offers a number of off-the-shelfgrabbers and FPGA accelerators that are designed to utilize these imageprocessing blocks and Gidel Imaging Library (GIL).
-
Product
Secure CDN
-
Increase your conversion with our global CDN infrastructure to speed up your website load times and provide the highest streaming quality to your customers. Through improved loading times, it has been shown that conversion rates can be improved up to 2,5 times. You also benefit from the highest possible security and compliance for your content. Secure CDN combines all the benefits in one innovative solution.
-
Product
Quad ASI To IP Conversion Module
DTM-3224
-
The DTM-3224 is a highly-integrated and cost-effective OEM module for converting four ASI transport streams to IP. The next-generation architecture of this device has support for IPv6 and for IGMP v3, enabling source-specific multicast.
-
Product
Virtualized Security Resilience Testing
BreakingPoint VE
-
Keysight Network Applications and Security
Ixia BreakingPoint Virtual Edition (VE) provides real-world application and threat simulation for complete performance and security testing, and its elastic deployment model allows you to achieve security resilience without sacrificing scalability or flexibility.
-
Product
Wireless Day/Night IP Surveillance Camera
ENVIROMUX-IPCAM-WN
-
View and control the camera from the ENVIROMUX web interface, the camera web interface, included software, or with a compatible cell phone. With the ENVIROMUX-2D/5D/16D, a triggered snapshot can be forwarded in alert e-mails. A snapshot can be triggered by any programmed event (motion detection, door open/close, glass break, smoke, liquid detection, etc.). Image sensor: 1/4" progressive scan CMOS sensor. Video Streaming: simultaneous Motion JPEG and MPEG-4. Frame rate: 30fps at 640x480 (VGA) resolution. Lens: F2.0, 4.3 mm (0.17 in), 12 infrared LEDs for night vision. RJ45 connector. Wireless models: wireless IEEE 802.11 b/g up to 54 Mbps. Regulatory approvals: CE, FCC, RoHS.
-
Product
Standalone ASI To IP Converter
DTE-3120
-
DekTec's standalone power-over-ethernet enabled ASI to IP Converter, allowing zero-jitter transmission of Transport Streams to IP networks.
-
Product
Security Testing Service
-
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws





























