-
product
4x 3U OpenVPX MOSA Mission Computer
SIU34-MCVARM-01
SIU34-MCVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Mission Computers (MC) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
Distributed Control Systems
As the heart of plant-level digitalization, ABB's Distributed Control Systems (DCS) are designed to transform your multi-faceted, 24/7 process operations. Our market-leading control architecture constantly monitors and drives plant productivity, maximizing asset utilization, process efficiency and production quality. A focus on availability, safety and cyber security ensures the protection of your people, assets and equipment. And by maintaining tight controls over raw material consumption, plant energy levels and waste by-products, ABB DCS solutions help to significantly reduce environmental impact.
-
product
Cyber Security Training
Elbit Systems of America's comprehensive attack scenario library reflects the most recent threat landscape. Our cyber security experts continuously update training scenarios with newly discovered attacks and tactics. Versatile network settings and attack scenarios equip cyber security teams with customized training specific to each team's organization.
-
product
Cybersecurity Penetration Testing Assessments
Tripwire Professional Services
Organizations do all that they can to protect their critical cyber assets, but they don’t always systematically test their defenses. Penetration tests—otherwise known as pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems. Whether we are testing an application or network environment, Tripw...show more -
product
Intrusion Detection and Prevention System
TACLANE
General Dynamics Mission Systems, Inc.
Adding Continuous Monitoring and Cyber Sensing Capability to your TACLANE Encryptor. Trusted Sensor Software is a first-of-its kind, National Security Agency (NSA) approved, option that adds IDS/IPS capabilities to the TACLANE-1G (KG-175G) encryptor. These additional cyber sensor features aid network administrators in establishing network situational awareness and provides greater Defense-
-
product
Cyber Security Assessment
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
product
Security Testing
As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.
-
product
GleanPackets
Identifying cyber security risks and solving network performance problems are becoming primary concerns for enterprises and small businesses. Many companies record network traffic and store the PCAP files for security forensics at a later time, but it is excruciatingly difficult to manage PCAP files and dig through mountains of information to find the relevant data. Searching through multiple large PCAP files and opening up each one with an analysis program is like looking for a needle in many h...show more -
product
Cyber Assurance
As the Internet of Things (IoT) continues to expand, connecting more and more of our world through communication devices, a growing trend has emerged: cyber security threats.
-
product
Satellite Clock
TCG 02-G
The TCG 02-G is a highly accurate, full featured GPS and GLONASS (GNSS) clock. Offering multiple oscillator options, Time Code and Frequency outputs, it fits virtually any timing application. With enhanced cyber security features that support NERC CIP requirements, the TCG 02-G is designed for use in modern day smart grid / smart substations, electricity distribution, transmission, and generation protection. In addition industrial application systems and traditional substations are equally provi...show more -
product
Red Team Engagement
Red Team Assessment (Red Teaming) is an activity where a group of white hat hackers (or penetration tester) perform a series of activities to assess the company’s security readiness towards real-world cyber threats. Red teaming aims to ‘attack’ an organization’s digital and physical infrastructure to evaluate the organization’s security defense and posture, at the same time targeting to obtain any sensitive and beneficial information. Red Teaming usually emulates several malicious actors to penetrate the organization’s digital and physical infrastructure security.
-
product
6x 3U OpenVPX MOSA Mission Computer
SIU36-MCVARM-01
SIU36-MCVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Mission Computers (MC) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
Engineering Data Analytics
ESI’s Data Analytics solution platform INENDI is a specialized set of solutions that combines state of the art Engineering Data Analytics and management approaches, intuitive visualization and efficient investigation methodologies to allow for a fast discovery of the unknown in large high-dimensional datasets.With INENDI, ESI brings its long-standing innovative capability and its expertise in designing solutions tailored for professionals who need to solve difficult high-value problems into the Cyber Security market.
-
product
Shoghi Microsites
Shoghi Communications focusing on usage of Strategic Communications solutions, to the defense and government entities worldwide. Our pristine capabilities in the fields of Intelligence Surveillance and Reconnaissance Systems, Electronic Warfare, Cyber Intelligence, COMSEC, Satellite Imaging, Avionics and Trainings, Supports Countries Defense, Space, and Homeland Security agencies
-
product
Cyber Forensics
Cyber Forensics deals in safeguarding the digital evidence gathered during the cyber attack, identifying the duration of the attack, and locating the geographical location of the attack followed by mapping them.
-
product
FLy-Away Kits
Complete Solutions for Cyber Operations,Transportable Private Cloud, Edge Computing A Fly-Away Kit (FAK) or Expeditionary Kit is a self-contained suite of equipment (hardware and software) for DoD and federal civilian Cyber Protection Teams (CPTs) and forward operations to operate both in tactical (field-deployed) and back-office environments. The FAK suite of cyber tools or cloud/server applications include tools to conduct vulnerability analysis, incident response, and other cyber-analytic functions, and are suitable for operation on both classified and unclassified networks.
-
product
RTOS
LynxOS
The embedded market is exploding with the dawn of the “Internet of Things”. The basic idea being that almost everything will ultimately be connected to the internet and these embedded devices are becoming more complex. This means they need to run more full functioned operating systems, with connectivity and popular human interfaces, require more processing power, including multi-core chips, and are likely to be exposed to the same types of cyber attacks that we are facing in our corporate and ...show more -
product
4x 3U OpenVPX MOSA Actuator Interface Unit
SIU34-AIUVARM-01
SIU34-AIUVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Actuator Interface Units (AIU) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
The Cyberbit Skill Development Platform
Cyberbit is the only platform that delivers the entire cyber skilling spectrum, on-demand, in coherent learning paths, validating your team’s performance and progress along the way.
-
product
Security Testing
We protect your business from cyber attacksSecure online transactionsPrevent unauthorized accessMinimize the risk of data lossEnhance resistance to DoS attacks
-
product
IoT Devices Penetration Testing
There is a rising concern that IoT devices are being developed rapidly without appropriate consideration of the profound security challenges involved, as demonstrated by the various IoT devices hacked in recent years— automobiles, cameras, children's toys, thermostats, and medical devices.With more than a decade of specialized cyber security testing experience combined with our extensive research and development, we can assess and identify both common and complex security vulnerabilities that may be residing within your whole IoT ecosystem.
-
product
Cyber Protection System
Raytheon’s Cyber Protection System enables enterprises to go beyond traditional CSOC monitoring and establish a response center capable of situational awareness, proactive defense and rapid response. Cyber test ranges: Test the cyber resilience of hardware, software, and networks. Penetration/Malware/Forensics Fly Away Kits: Provide mobile environments to perform testing and analysis at remote facilities. Lab environments: Analyze malware, perform penetration testing and conduct forensics at enterprise scale so analysts can determine the best way to manage them.
-
product
Cyber
General Dynamics Global Imaging Technologies
The Cyber Domain crosses and integrates with all domains - Land, Sea, Air and Space. We’re designing, building and delivering data protection products and solutions, and web-based SaaS to rapidly strengthen the mission and help our customers successfully navigate the cyber domain.
-
product
Cyber Labs
Building your cybersecurity team’s skills starts with foundational building blocks: theory, tools, attacker tactics, soft skills and more. Each of our cyber labs delivers a specific building block to build individual skills in shorter training sessions.
-
product
High Definition Mid-Range Surveillance System
Ranger® HDC MR
The Ranger HDC MR sets a new standard for surveillance with its ability to detect illegal activities even in degraded weather conditions, utilizing embedded analytics and image processing to reduce the cognitive workload, enabling operators to distinguish quickly between true threats and false alarms. The HDC MR is not only a superior system in bad weather, it also provides increased uptime and reduces cyber risks -- a reliable tool that adds days of efficient surveillance and reduces risk compared to previous generations of systems.
-
product
Cyber Drill And Blue Team Exercise Stimulation
LGMS Security Team will approach the Cyber Drill as a simulation of the possible occurrences during a cyber incident. Based on the defined scenario, LGMS Security Team will perform a technical simulation so as to accurately capture the responses of client’s team in responding to such incidents.In order to obtain the best results, LGMS Security Team will only use information that can be obtained either through public information or by any means of deception techniques.
-
product
Intelligence – Led Penetration Testing
An Intelligence-Led Penetration Test (Intel-led Pentest) closely mimics the tactics and techniques of sophisticated and persistent cyber attackers with the intention of compromising an organization’s critical systems.
-
product
Cyber Crisis Simulator
When responding to a cyber crisis, the C-Suite no longer works in a silo. Executive management continuously collaborates with incident response and SOC teams to make well-informed decisions. But tabletop exercises and conventional crisis simulation platforms do not prepare for this new reality.
-
product
4x 3U OpenVPX MOSA Flight Control Computer
SIU34-FCCVARM-01
SIU34-FCCVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Flight Control Computer (FCC) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.