-
product
Quantum-Safe Security
CN6000 Series
The Centauris CN6000 encryptors may be upgraded to quantum cryptography through the addition of the Cerberis Quantum Key Distribution (QKD) server to ensure that the solutions are quantum-safe for the long-term protection of sensitive data. This also ensures investment-protection of the encryptors. Such quantum cryptography is provably secure, ensures anti-eavesdropping detection and provides long-term forward secrecy against brute force hacking and attacks by quantum computers.
-
product
CCTV Security Testers
CCTV Security Tester is a kind of multi-function test tool for CCTV and security camera installation professionals. CCTV Camera Tester is developed aiming to CCTV security system installation and maintenance, combining the following function: Optical Fiber Communication test, low power circuit test, video test and PTZ control, and DC12 1A output for camera test, etc. Helps solving varies problem of security system. It could be also used in laboratory tests, equipment maintenance, etc. CCTV Tester is really an ideal multi-function instrument for CCTV Security System, Optical Fiberal Communication, CATV and other optical fiber networks.
-
product
Security Testing Services
You're building more-complex software faster than ever before, but does your team have sufficient application security skills and resources to test it for security defects? Synopsys security testing services provide continuous access to security testing experts with the skills, tools, and discipline needed to cost-effectively analyze any application, at any depth, at any time.
-
product
App and API Security
Defend against a wide range of multi-vector attacks. Intelligent protection, end to end.
-
product
Scalable for High Performance Application and Security Needs
PerfectStorm 40/10GE Load Module
Keysight Network Applications and Security
Equipped with powerful multi-core, multi-threaded network processors, PerfectStorm 40 GbE is designed to satisfy the testing needs of manufacturers needing speed flexibility in their testing resources. Networking equipment manufacturers building new equipment or service providers and large enterprises integrating this them benefit from testing and verifying performance and functionality prior to deployment.
-
product
Security intelligence & analytics
Detect and prioritize threats that pose the greatest risk. dentify high-risk threats with near real-time correlation and behavioral anomaly detection. Detect vulnerabilities, manage risks and identify high-priority incidents among billions of data points.Gain full visibility into network, application and user activity.
-
product
Secure DNS
DNS attacks are still a regular occurrence for cybercriminals and many companies are targeted by such attacks not only once a year. With Secure DNS, you not only ensure secure access to your website, but also benefit from extra protection against such attacks.
-
product
Visible Security Cameras - Bullet Cameras
Teledyne FLIR Visible Security Cameras, Bullet Cameras
-
product
Virtualized Security Resilience Testing
BreakingPoint VE
Keysight Network Applications and Security
Ixia BreakingPoint Virtual Edition (VE) provides real-world application and threat simulation for complete performance and security testing, and its elastic deployment model allows you to achieve security resilience without sacrificing scalability or flexibility.
-
product
Cyber Security Training
Elbit Systems of America's comprehensive attack scenario library reflects the most recent threat landscape. Our cyber security experts continuously update training scenarios with newly discovered attacks and tactics. Versatile network settings and attack scenarios equip cyber security teams with customized training specific to each team's organization.
-
product
Security Testing
For an application to be successful, it has to ensure the security of the customer’s data, which in turn helps to gain the trust of the customers, avoid legal battles, and enables growth in business.
-
product
Cloud Security Testing
RedWolf is the premium cloud-DDoS testing provider globally. We offer an easy-to-use testing system that is either self-serve or guided by RedWolf experts with years of experience helping secure the worlds largest and most complex enterprise networks.
-
product
Aviation Security
Aviation is highly regulated, from ICAO Annex 17 to National Security Programs. Due to its high profile and the subsequent multitude of threats, regulation safeguards travel security. Our expertise will support your business, by supplying market leading X-Ray and Metal detection products along with maintenance, that meet the regulator requirements and best fit your business.
-
product
Pull tester for security testing
SAFOR 2000
The Safor portable tester is an accurate unit, designed for testing the pulling force of fixings prior to being put into service. Easily prevent accidents by testing on site the fixings to install end brackets and safety harness eyebolts.
-
product
Industrial & Security
D-Matrix
The D-Matrix Gamma Ray Imager is a fully integrated, photon-counting, pixilated, 12-bit energy discriminating CZT detector/imager.
-
product
Network Security Validation Platform
FireDrill
AttackIQ FireDrill is a game changing platform that seamlessly integrates into any existing network, delivering immediate visibility into your security program so you can mitigate risk, and maximize security ROI.
-
product
100GbE Application and Security Load Module
PerfectStorm 100GE 1-Port Load Module
Keysight Network Applications and Security
PerfectStorm is a highly modular hardware test platform enabling equipment providers, service providers and enterprises the ability to create real-world, high-stress conditions and user behavior to push new equipment and networks to their limits.
-
product
Hybrid Network Security Policy Management
AlgoSec Cloud
Across cloud, SDN, on-premises and anything in between - one platform to manage it all.
-
product
SQL Security & Compliance
Improve SQL Server audits, strengthen permissionssecurity & alert on data changes in your environment
-
product
API Security Testing
In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:
-
product
Secure Hardened Android Phone
Shoghi has designed a totally Secure Hardened Android phone, which comes with a Specialized Operating system to prevent Hackers from remotely compromising your device , from all major vulnerabilities and exploits including protection from zero-days.
-
product
Network Security Testing
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
product
Security Testing Services
Alphabin Technology Consulting
Fortify your digital defenses and enhance the resilience of your systems to safeguard against cyber threats.
-
product
Omnisens Securing Power Cable Integrity
https://www.omnisens.com/uploads/1/2/0/5/120592129/published/omnisens-cobra-logo-white-2014-06-10.png?1546958203
In both underground and subsea cables incipient faults often result in temperature events. Using optical fibers integrated into the power cable or laid close by, Distributed Temperature Sensing (DTS) helps detect changes and faults allowing the operator to intervene before the cable fails. It is suitable for deployment in any cable where an optical fiber is present, including HVDC, HVAC, export, inter-array, transmission and distribution.
-
product
100GE Application & Security Test Load Module
CloudStorm
Keysight Network Applications and Security
Ixia's CloudStormTM is an industry-first 2.4 terabit application and security test solution that not only meets today’s need, but that of the future. CloudStorm delivers 3X-application and 4X-SSL-emulation scale over any other test system. It helps NEMs shortening their development cycles, and enterprises and data center operators find the right balance between mitigating security risks and delivering high end-user application performance. Emulate multi-terabit DDoS and botnet attacks to future-proof security solutions
-
product
Quantum-Safe Security
CN9000 Series
The Centauris CN9000 Series is the first commercially available certified high-assurance 100Gbps Ethernet encryptor that supports the most complex fully meshed topologies – enabling 100% security for Big Data, Cloud and data centre services’ ultra-fast networks.
-
product
DeepCover Embedded Security in IoT Authenticated Sensing and Notification
MAXREFDES143#
The MAXREFDES143# is an Internet of Things (IoT) embedded security reference design, built to protect an industrial sensing node by means of authentication and notification to a web server. The hardware includes a peripheral module representing a protected sensor node monitoring operating temperature and remaining life of a filter (simulated through ambient light sensing) and an mbed shield representing a controller node responsible for monitoring one or more sensor nodes. The design is hierarchical with each controller node communicating data from connected sensor nodes to a web server that maintains a centralized log and dispatches notifications as necessary. The mbed shield contains a Wi-Fi module, a DS2465 coprocessor with 1-Wire® master function, an LCD, LEDs, and pushbuttons. The protected sensor node contains a DS28E15 authenticator, a DS7505 temperature sensor, and a MAX44009 light sensor. The mbed shield communicates to a web server by the onboard Wi-Fi module and to the protected sensor node with I2C and 1-Wire. The MAXREFDES143# is equipped with a standard shield connector for immediate testing using an mbed board such as the MAX32600MBED#. The simplicity of this design enables rapid integration into any star-topology IoT network requiring the heightened security with low overhead provided by the SHA-256 symmetric-key algorithm.
-
product
Security Testing Consultancy
QA Mentor provides an End-to-End security testing services through the array of preventive measures, proven methodology and framework, use of best tools identified through POCs (proof of concepts) and an excellent infrastructure which is using evolving technologies. The backbone of all of these are the industry and project experience QA Mentor and its highly qualified & certified Security Testing Consultants. Our consultants closely work with our customers to assess their system, conduct POC to identify the relevant preventive measure and tools to be used and guide the IT teams of the businesses with a clearly defined roadmap to be followed to secure their systems.
-
product
Hardware Security For Programmable System Control
Mach-NX
*Up to 8.4K LC of user logic, 2669 kbits of user flash memory and dual boot flash feature*Up to 379 programmable I/O supporting 1.2/1.5/1.8/2.5/3.3 I/O voltages*Secure enclave supports 384-bit cryptography, including SHA, HMAC, and ECC*Configuration of PFR and security functions through Lattice Propel simplifies developer experience*Highly reliable. Low power and 3X better SER performance to comparable CMOS technologies





























