Filter Results By:

Products

Applications

Manufacturers

Showing results: 31 - 41 of 41 items found.

  • RTOS

    LynxOS - LynuxWorks, Inc.

    The embedded market is exploding with the dawn of the “Internet of Things”. The basic idea being that almost everything will ultimately be connected to the internet and these embedded devices are becoming more complex. This means they need to run more full functioned operating systems, with connectivity and popular human interfaces, require more processing power, including multi-core chips, and are likely to be exposed to the same types of cyber attacks that we are facing in our corporate and personal computers.Lynx Software Technologies addresses these needs with our high performance LynxOS operating systems and tools based on open standards. Our new powerful RTOS security features allow embedded developers to design their systems to be more secure before they are connected to the internet.

  • GleanPackets

    Glean Corp.

    Identifying cyber security risks and solving network performance problems are becoming primary concerns for enterprises and small businesses. Many companies record network traffic and store the PCAP files for security forensics at a later time, but it is excruciatingly difficult to manage PCAP files and dig through mountains of information to find the relevant data. Searching through multiple large PCAP files and opening up each one with an analysis program is like looking for a needle in many haystacks. GleanPackets search is a powerful, affordable, and easy to use packet search engine that exports PCAP files to your favorite 3rd party web and mobile applications and network appliances via our REST API. Our user friendly interface will guide you through your searches, enabling you to find the the data you need quickly and painlessly. GleanPackets Search is available in several forms.

  • Satellite Clock

    TCG 02-G - Tekron International Ltd

    The TCG 02-G is a highly accurate, full featured GPS and GLONASS (GNSS) clock. Offering multiple oscillator options, Time Code and Frequency outputs, it fits virtually any timing application. With enhanced cyber security features that support NERC CIP requirements, the TCG 02-G is designed for use in modern day smart grid / smart substations, electricity distribution, transmission, and generation protection. In addition industrial application systems and traditional substations are equally provided for. This master clock synchronizes multiple IEDs (Intelligent Electronic Devices) within a network, including protection relays, synchrophasors, event recording and remote telemetry units to enable accurate time stamping. The TCG 02-G is available as a base unit or with one of three expansion module options.

  • Application Penetration Testing

    HORNE Cyber

    Data breaches that compromise client confidentiality and intellectual property are top cybersecurity concerns. Organizations spend somewhere between 45 and 50 billion dollars every year on cybersecurity, but a very small percentage is focused on applications despite that fact that more than 80%

  • Cybersecurity Test & Assurance

    Spirent Communications plc

    Taming the complexity of cybersecurity through innovation.

  • Cybersecurity

    Schweitzer Engineering Laboratories, Inc.

    Networks are protected with multiple layers of cybersecurity, including securing access and permissions, detecting malware, encrypting data, and logging events.

  • Layered Cybersecurity

    Schweitzer Engineering Laboratories, Inc.

    Networks are protected with multiple layers of cybersecurity, including securing access and permissions, detecting malware, encrypting data, and logging events.

  • Security Gateways

    Schweitzer Engineering Laboratories, Inc.

    Security gateways combine cybersecurity capabilities to create secure access paths through security perimeters.

  • Password Management

    Schweitzer Engineering Laboratories, Inc.

    Password management is a critical cybersecurity element that includes enforcing strong passwords on IEDs and changing passwords on a schedule.

  • Operational Technology (OT) Networking

    Schweitzer Engineering Laboratories, Inc.

    OT networking solutions provide communications with the performance, cybersecurity, and ruggedness required for demanding operational applications.

  • Cybersecurity and Compliance Solution

    Application Audit - Compuware Corp.

    Application Audit, Compuware's mainframe cybersecurity and compliance solution, enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Using Application Audit, security staff can: Deter insider threats by capturing and analyzing start-to-finish user session activity. Integrate user behavior intelligence with popular SIEM engines to analyze the overall application environment. Support criminal/legal investigations with complete and credible forensics. Fulfill compliance mandates regarding protection of sensitive data. The Value of Application Audit. Provides deep insight into user behavior including data viewed, by whom and which applications were used to access it. Enables immediate analysis through the automatic delivery of data to SIEM platforms such as Splunk and QRadar, either directly or in combination with CorreLog zDefenderTM for z/OS or Syncsort Ironstream. Delivers granular intelligence and reporting capabilities needed to comply with regulations such as HIPAA and GDPR as well as security policies. Eliminates dependency on specialized mainframe knowledge. Separates the system administrator's duties from mainframe-inexperienced auditor's responsibilities with a web UI, so that no single person is in a position to engage in malicious activities without detection.

Get Help