Filter Results By:

Products

Applications

Manufacturers

Application Security Testing

assures web application vulnerabilities are identified.

See Also: Penetration Testing


Showing results: 16 - 30 of 39 items found.

  • Security Testing

    TestingXperts

    As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.

  • Business Application

    Precise Testing Solution

    Business Application testing encompasses verification and validation services to support Quality Assurance and Control of business applications. Application testing ensures that all aspects of the application like its functionality, integration, performance, security, and usability are working as expected.

  • Virtualized Security Resilience Testing

    BreakingPoint VE - Keysight Network Applications and Security

    Ixia BreakingPoint Virtual Edition (VE) provides real-world application and threat simulation for complete performance and security testing, and its elastic deployment model allows you to achieve security resilience without sacrificing scalability or flexibility.

  • Veracode Platform

    ChongqingTop Oil Purifier Manufacture Co., Ltd.

    The Veracode Continuous Software Security Platform contains all of the application security testing types you need in one place – static analysis, dynamic analysis, software composition analysis, and manual penetration testing – ensuring that you have a comprehensive view of your risk from design through deployment.

  • Veracode Platform

    Veracode

    The Veracode Continuous Software Security Platform contains all of the application security testing types you need in one place – static analysis, dynamic analysis, software composition analysis, and manual penetration testing – ensuring that you have a comprehensive view of your risk from design through deployment.

  • Web Application Penetration Testing

    LGMS

    Web Application Penetration Testing – to identify, analyze, and report vulnerabilities in a given web application. LGMS adopts a robust technology and process-based approach supported by a well-documented methodology to identify potential security flaws in the web application and the underlying environment.

  • Web App Testing

    TestFort QA Lab

    TestFort delivers a full range of web application testing services to help you be sure that your software is in compliance with the highest functional, security and usability standards of quality in cyberspace.When web application testing is carried out, your web application or website is tested for potential bugs and all necessary reports are performed depending on your web testing requirements.

  • QA Services

    Indium Software Inc.

    Indium’s QA Services focuses primarily on software Quality Assurance(QA) in a business process context. We understand that software QA is best delivered when the focus shifts to the context of the ecosystem in which an application or product operates. QA is more than just debugging. Regression TestingTest Automation, User Acceptance Testing (UAT), Compatibility Testing, Performance Testing, Security Testing.

  • Penetration Testing Services

    UTOR

    All web and mobile applications are vulnerable to attack. You are going to get hacked – it's not "if", it's "when." Before it happens, you want to make sure you have a mature security system in place. Our specialists in software security testing have a background in IT and software development, know different types of exploits, and have experience in performing thousands of pen tests. We get hired to hack into systems and determine weaknesses.

  • Veracode Analysis Center

    Veracode

    Innovating through software holds many promises, but it can also create some major operational headaches. Without a holistic approach to application security, teams often lose valuable time onboarding, learning, and managing multiple AppSec tools that don't “play well” together. Various testing methods, metrics, and dashboards provide incomplete views of activity, and security teams often struggle to maintain control and understand overall risk.

  • Spirent SecurityLabs

    Testing Technologies

    The Spirent SecurityLabs’ services are structured to produce high-impact results with minimal impact on the client organization. Our dedicated teams of experienced security professionals offer comprehensive scanning, penetration testing and monitoring services for networks, applications and devices, as well as source code analysis.

  • Application Penetration Testing:

    QA Mentor, Inc.

    Penetration testing (or pen testing) is a simulated security exercise in which ethical hackers attempts to exploit the vulnerabilities of an application system (web or mobile). The objective of this exercise is to identify any possible loopholes present in the system’s defence mechanism which the real hackers could take advantage of. QA Mentor practices the following stages while exercising this:

  • API Security Testing

    QA Mentor, Inc.

    In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:

  • Network Test Solution

    CyPerf - Keysight Technologies

    Realism: Create digital twin of users, applications, and attacks to replicate and test QoE in real-world network environments.Native authentication: Send application and security traffic over authenticated sessions at high scale.Highly scalable: Supports millions of concurrent users and millions of connections per second that elastically scale up and down, enabling both resiliency and chaos testing.Containerized agents: Deploy lightweight traffic agents as containerized pods on-prem, VMs, managed Kubernetes deployments, private or public cloud (AWS, GCP, Azure)Lab and live network testing: Test performance and security both pre-deployment in a lab or safely in live production networks.Flexible: Portable subscription-based software solution with a robust and intuitive cloud-native GUI management dashboard

  • Test Targets & Charts

    Applied Image, Inc.

    APPLIED IMAGE is a world leader in the field of IMAGE EVALUATION Test Targets and Test Charts. Some of the specialized test charts include camera image evaluation ISO, NIST, ANSI, and MIL standard image evaluation applications; photonic and optophotonic applications; test charts for copiers and scanner; DATAcapture and BARcode Scanning testing; Security & Identification Image Capture; and all other type of imaging industries that require quality evaluation of thier image capture systems.

Get Help