IP Security
-
product
Processor IP
Security
Security IP designed to protect against a variety of different vulnerabilities.
-
product
RA Family Of Arm-based MCUs
RA4
The RA4 Series bridges the needs for reasonable low power with the demand for connectivity and performance. These MCUs deliver up to 48MHz of CPU performance using an ArmⓇ CortexⓇ-M4 core with up to 256kB of embedded flash memory. The series offers a wide set of peripherals, including USB, CAN, ADC, capacitive touch, a segment LCD controller, and additional security IP integration, making it suitable for industrial equipment, home appliances, office equipment, healthcare products, and meters.
-
product
RZ/G1 32-bit MPUs
The RZ/G1 high-performance 32-bit processors have 1GHz+ Arm® Cortex®-A cores, a 3D graphics engine, a full high-definition (HD) video engine, secure IP, high-speed interfaces such as PCIe, SATA and Gigabit Ethernet, and other functions necessary for embedded devices in the industrial segment.
-
product
Chamber Controllers & Software
Designed off of our previous controller platform with familiar features in an improved interface, added functionality for ease and fewer steps to accomplish your daily testing needs. Remotely monitor and control your chambers and receive text/email alarms. From the home screen users can now manually control, run or stop a profile and view a snapshot of current activity like actual/setpoint values, alarm, datalogging, profile, security, IP address information and more.
-
product
Industrial & Security
Kromek's custom configurations of Cadmium Zinc Telluride (CZT) based detector tiles and linear arrays can be implemented into custom Advanced Imaging platforms for various Industry and Security applications.
-
product
Secure Access
Schweitzer Engineering Laboratories, Inc.
Devices with secure access authenticate users, control privileges, and create audit trails.
-
product
Quantum-Safe Security
CN8000 Series
The CN8000 harnesses the power of quantum mechanics to help ensure secure communications – the encryption keys are generated by IDQ’s Quantum Random Number Generator to guarantee inherent and provable randomness. The CN8000 can also be upgraded to be quantum-safe via the Cerberis QKD Blade (quantum cryptography) to ensure long-term protection of the data in transit.
-
product
Cloud Security
Cloud Security Assessment is the most critical phase before the product is finally deployed and Product is finally ready to handle real-world cyber security threats.
-
product
Aviation Security
Aviation is highly regulated, from ICAO Annex 17 to National Security Programs. Due to its high profile and the subsequent multitude of threats, regulation safeguards travel security. Our expertise will support your business, by supplying market leading X-Ray and Metal detection products along with maintenance, that meet the regulator requirements and best fit your business.
-
product
NETWORK SECURITY
Network Critical Solutions Limited
Network Critical gives all your security systems complete, uncompromising visibility into what’s happening on the network. Get better overall ROI by improving performance of existing security systems to keep pace with increasing network speed and complexity, while gaining the insight needed to better detect, contain and recover from breaches fast.
-
product
Quantum-Safe Security
CN6000 Series
The Centauris CN6000 encryptors may be upgraded to quantum cryptography through the addition of the Cerberis Quantum Key Distribution (QKD) server to ensure that the solutions are quantum-safe for the long-term protection of sensitive data. This also ensures investment-protection of the encryptors. Such quantum cryptography is provably secure, ensures anti-eavesdropping detection and provides long-term forward secrecy against brute force hacking and attacks by quantum computers.
-
product
IP Converters
SMPTE-2022 compliant standalone solutions for conversion between IP and "traditional" DTV signals such as ASI and QAM. These IP converters are hardware-based, providing low latency and zero-jitter transmission of IP signals.
-
product
Application Security Platform
Sentinel
WhiteHat Sentinel is a Software-as-a-Service (SaaS) platform that enables your business to quickly deploy a scalable application security program across the entire software development lifecycle (SDLC). Combining advanced scanning technology with the world’s largest application security research team, we accurately identify your vulnerabilities and scale to meet any demand without slowing you down.
-
product
Security Vehicles
When you need to set up robust security operations in a temporary or outdoor location, our security vehicles can provide a tried and tested solution. For use at festivals, public ceremonies, sports events and other outdoor functions, our mobile check point and scan truck will help keep your guests or members of the public safe from security threats.
-
product
Portable Security System
Sensor-1
The portable security system that fits in the palm of your hand. Sensor-1 detects real-time changes in motion and alerts you when your important items move. Operates independent of the mobile app. Communicates with smartphones, tablets, laptops and desktops.
-
product
App and API Security
Defend against a wide range of multi-vector attacks. Intelligent protection, end to end.
-
product
IP Cores
logicBRICKS IP Cores by Xylon - for applications including compact multilayer video controller, versatile video input, multiview 3D transformation engine, image signal processing (isp) ulstraHD pipeline, high dynamic range pipeline, scalable 3d graphics accelerator, DDR3 SDRAM Memory Controller, slave hssl controller, HDR image signal processing framework, video design framework for multi-camera vision applications, and more
-
product
API Security Testing
Nowadays, APIs are frequently used for communication between two applications. In this communication, lots of sensitive data is transferred between devices and the server.In order to be protected in the event of a data loss or attack, we must secure our API.
-
product
IP QAM
SFT-IPSR3
Hangzhou Softel Optic Co., Ltd.
SFT-IPSR33 is a 2RU rack-mount IPTV streamer server. It is optimal for small and medium internet service providers to initial setup in large network.
-
product
SST Security Assessment
Self-Service Terminal (SST) penetration testing is an activity which identifies vulnerabilities in SST that may potentially exist due to the lack of physical security measures, technical configuration or process controls.
-
product
E2E Security Connector
The E2E Security Connector is a cloud solution for enhancing the security level of your system. It provides secure generation and management of confidential data during the pre-personalization process of your connected devices as well as different protection schemes for its application and data transportation layer.
-
product
SQL Security & Compliance
Improve SQL Server audits, strengthen permissionssecurity & alert on data changes in your environment
-
product
Cyber Security Assessment
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
product
Security Testing Services
You're building more-complex software faster than ever before, but does your team have sufficient application security skills and resources to test it for security defects? Synopsys security testing services provide continuous access to security testing experts with the skills, tools, and discipline needed to cost-effectively analyze any application, at any depth, at any time.
-
product
Hardware Security Testing
Day by day, security threads are increasing and now enemies are able to access all data through adding small components of hardware devices to personal devices like mobiles, laptops, and etc.Also, software can be patched, but hardware can never be easily updated; thus, security flaws are increasing dramatically day by day
-
product
IP Gateway
SFT3508F
Hangzhou Softel Optic Co., Ltd.
SOFTEL SFT3508F IPTV Gateway is a device which is used for the protocol conversion scenarios and streaming media distribution scenarios. It can convert the broadcast network IP stream over HTTP, UDP, RTP, RTSP and HLS and TS file into HTTP, UDP, HLS and RTMP protocol. The system can achieve the integration by receiving a variety of commercial streaming media services. Also, the system can provide streaming media services directly.
-
product
Security Testing Services
Alphabin Technology Consulting
Fortify your digital defenses and enhance the resilience of your systems to safeguard against cyber threats.
-
product
Security and Traffic Monitoring System
Information System Technologies Inc.
ISTI’s versatile sensor nodes can support multiple sensing types including acoustic, seismic, visible/IR, and scanning laser. Several eye-safe scanning lasers form a distributed wireless sensor network and can continuously and accurately track as well as monitor ground vehicles and personnel in a surveillance area. This system provides super-fine angular and range resolution to precisely locate moving targets. Among other key benefits are: day/night operational capability, continuous monitoring and surveillance without blind spots, 360 degrees field-of-view, large coverage area, multiple closely spaced target tracking, threat classification, and automatic alarm generation. The system can be used in applications such as traffic monitoring, intrusion detection, border control, airport runway collision and incursion avoidance, and perimeter security.
-
product
IP and Website Tracer
Visual IP Trace
Trace an IP address or web site back to its origin/location. There can be many reasons why anyone would want to trace an IP address or web site, everything from verifying a web sites location to avoid any potential phishing attempts, to verify a customers order, tracking a potential hack attempt and so on.





























