Filter Results By:

Products

Applications

Manufacturers

Application Security

vulnerabilities identification and remediation software.


Showing results: 106 - 120 of 258 items found.

  • Detectors and Associated Electronics

    CdZnTe/CdTe - Baltic Scientific Instruments, Ltd

    CdZnTe (CZT) is a room temperature semiconductor which allows to create X- and gamma-ray detectors with comparably high energy resolution and high count rate capability without cooling. Detectors performance allow to use CdZnTe detectors successfully in Nuclear Industry and Medicine, Safeguard and Homeland Security, many others industrial and laboratory applications.

  • Digital Spectroscopy

    CAEN S.p.A.

    CAEN SyS is the new Systems & Spectroscopy Division of CAEN Spa. Such Division relies upon an extremely strong foundational knowledge of nuclear measurement instrumentation in developing Radiation Measurements Systems and Spectroscopy Solutions. These systems and solutions are perfectly suited to operations involving Nuclear Fuel Facilities, Nuclear Power Plants, Measurements Laboratories, and Security Applications.

  • 10GbE Network Attached Storage

    HSR10 - Curtiss-Wright Defense Solutions

    The High-Speed Recorder 10 (HSR10) is a network attached storage (NAS) device designed for high-speed network recording based on a double 10 Gigabit Ethernet (GbE) port layout. What’s more, to adhere to security requirements for mission-critical applications, this unit is designed with two-layer encryption and follows industry-standard NAS protocols permitting system design flexibility.

  • Application Penetration Testing:

    QA Mentor, Inc.

    Penetration testing (or pen testing) is a simulated security exercise in which ethical hackers attempts to exploit the vulnerabilities of an application system (web or mobile). The objective of this exercise is to identify any possible loopholes present in the system’s defence mechanism which the real hackers could take advantage of. QA Mentor practices the following stages while exercising this:

  • Radar Systems

    HLS GSR Series - GETS Systems Ltd

    Welcome to the future of Radar Systems: the Gets Systems HLS GSR Series.Our state-of-the-art, high-performance FMCW X-band RADAR systems redefine the possibilities of detection and classification. Whether it’s People, Vehicles, UAVs, Airborne, or Seaborne targets, our HLS GSR Series empowers you with unparalleled capabilities for the most demanding security and defense applications.

  • 1U Rackmount Network Appliance Platform With Intel® Atom® Processor C3558/C3758 And Up To 14 LAN

    NA363R - Axiomtek Co., Ltd.

    The NA363R is a reliable 1U rackmount network appliance platform offering Intel® QuickAssist technology and high processing performance through the Intel® Atom® processor C3558/C3758 (Denverton). It comes with six 10/100/1000 Mbps LAN ports using Intel® i210 Ethernet controller and one expandable LAN module slot for a maximum of fourteen LAN ports. It features two pairs of latch-type LAN bypass functions to protect important communications during power outages as well as BIOS console redirection for efficient management. The network security appliance provides high security and reliability with power-efficient for VPN, network bandwidth controller, firewall and UTM applications.

  • API Security Testing

    QA Mentor, Inc.

    In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:

  • Beam Directional Power Supply Battery 40 to 120 kV

    CP120B - Teledyne ICM

    This ultra-light, compact and battery operated constant potential portable X-Ray generator is the perfect tool for specific NDT applications that require repetitive short exposures. Its versatility also makes it the ideal piece of equipment for security applications. In fact, in combination with the FLATSCAN15, the FLATSCAN30 and other digital X-Ray detectors, the CP120B will – thanks to its small focal spot and constant potential X-Ray output – enhance image quality and definitely contribute to a reduced exposure time.

  • Omni-Directional Antenna

    EM-6104-1 | 20 MHz-18 GHz - Electro-Metrics Corp.

    The EM-6104-1 is an omni-directional, dual band, hybrid antenna covering 20 MHz-18 GHz. The antenna features wide frequency coverage making it an excellent choice for a variety of applications such as general purpose measurements as well as wideband security applications. This lightweight antenna is ideal for deployable applications that require wideband coverage in a very small footprint. The antenna’s elements collapse for convenient storage and transport. The antenna is configured to mount on a standard ¼-20 tripod stud. The EM-6104-1 Omni-Directional antenna is supplied with an EM-6089 Battery Pack.

  • Network Packet Brokers

    Vision E40 / E100 - Keysight Network Applications and Security

    These new cost-effective and scalable solutions help IT teams supporting hyperscale and microscale data centers, resolve application performance bottlenecks, trouble shoot problems, and improve data center automation, as well as better utilize network analysis and security tools. Today’s hyperscale data centers, which are designed for expansion, as well as micro data centers, which often sit on the network edge closer to end users for an improved experience, can create significant challenges for IT organizations. These challenges range from poor network performance due to increasing size and complexity, to security issues resulting from insufficient visibility into incident detection and resolution. Many IT organizations use multiple network monitoring tools, and need to efficiently transport network traffic from thousands of network locations. Ixia’s solutions for highly scalable and expanding data centers. Ixia’s Vision portfolio of NPBs provides intelligent, sophisticated, and programmable network flow optimization, delivering comprehensive visibility and security coverage. The new Vision Edge 40 and Vision Edge 100 offer real-time visibility, insight, and security into high density hyperscale and microscale data centers, even as they expand. Each is capable of inline and out-of-band deployments, and delivers control, coverage, and performance to protect and improve crucial networking, data center, and cloud business assets.

  • RFID

    LF (125 kHz) - Balluff GmbH

    BIS L uses a low frequency (LF) of 125 kHz with passive data carriers. These data carriers are read/write, designed for use in harsh environments and chemically highly resistant. With BIS L you can handle applications with special demands economically. Small form factors and versions with enhanced data security (additional check code) also provide great flexibility.

  • Current to Digital

    Analog Devices Inc.

    Analog Devices’ breakthrough current-to-digital converter technology is backed by award winning expertise to help solve your medical, industrial, and security application needs. Our high speed, high resolution ADC modules enable improved CT scanner data acquisition, photodiode sensors and power monitoring, spectroscopy, and high channel count data acquisition systems.

  • Very High Density Fiber Tap

    Flex Tap VHD - Keysight Network Applications and Security

    Flex Tap VHD is a modular, very high density fiber tap available, offering up to 36 taps in a 19 inch 1U space, to reduce IT costs while helping ensure availability of security and business critical applications. Network taps (test access points) are a key part of the access layer of a visibility architecture because they are an unobtrusive way to capture monitoring data. They offer comprehensive traffic visibility for network monitoring and security tools that do not introduce points of failure in the network. Ixia has a large variety of network taps on the market today, offering speeds from 1Gbps to 100Gbps, single and multi-mode, as well as different fiber types and support for Cisco bidirectional (BiDi) transceivers.

  • Code Integrity

    JScrambler - JScrambler

    If you develop a security sensitive Web Application we believe that you don''t want to give any bonuses to possible attackers. JScrambler enables you to conceal as much as possible, the logic of your application, such as what information is gathered from the user, how it is processed on the client-side, how it is sent to the servers-side. Since our obfuscation introduces a certain level of randomness, it allows you to explore code morphing techniques, which can be vital in precluding attack automation.

  • Test Targets & Charts

    Applied Image, Inc.

    APPLIED IMAGE is a world leader in the field of IMAGE EVALUATION Test Targets and Test Charts. Some of the specialized test charts include camera image evaluation ISO, NIST, ANSI, and MIL standard image evaluation applications; photonic and optophotonic applications; test charts for copiers and scanner; DATAcapture and BARcode Scanning testing; Security & Identification Image Capture; and all other type of imaging industries that require quality evaluation of thier image capture systems.

Get Help