Showing results: 46 - 60 of 173 items found.
-
-
Garland Technology
Bypass TAPs (bypass switches) are used to connect a monitored network segment to an active, in-line security device and monitor the device's health. If your security tool goes off-line, the bypass TAP automatically 'switches to bypass mode' keeping your network link up while you resolve the issue. Garland's Bypass TAPs with failsafe technology guarantee 100% network up-time and let your security devices see every bit, byte, and packet.®
-
Testhouse Ltd
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
-
MNS-300EM -
Silex Technology
MNS-300EM is an embedded module that provides mesh connectivity for low-power portable devices to connect to a 802.11s capable mesh network. It features an 802.11ac radio, and a complete TCP/IP network protocol stack with an optimized QCA9377 wireless radio driver and security supplicant in a self-contained hardware package. It also supports enterprise security which ensures data integrity and privacy for highly sensitive applications.Embedded Wi-Fi Mesh with Enterprise Security
-
Audacix
Cyber security testing is often also referred to as pen testing or penetration testing. Such tests validate the cyber security defences of your applications, network infrastructure and even your team members. Our cyber security testers are highly trained and certified ethical hackers.
-
SyncServer S600 -
Microsemi Corporation
SyncServer S600 GPS / GNSS, Stratum 1 network time server with security-hardened NTP Reflector™ technology improves the security, accuracy and the reliability of the time services on the network for IT network administrators working to provide network time services in hardened network operations.
-
P1 Security
Evaluate the 5G Core Network security risks, based on NRF API authorisation (OAuth 2.0) filtering scanning (from 3GPP OpenAPI definition) and SEPP PLMN security evaluation from an International or National perspective.
-
SILICA -
Immunity, Inc.
Understanding the vulnerabilities of your WiFi network can be challenging as users can easily create networks on demand, or even perhaps unintentionally. But as recent events have demonstrated, scanning your WiFi network is an important part of understanding your security posture.
-
Axiomtek Co., Ltd.
Low power, fanless, noiseless, reasonable performance, and slim form factor designs are characters of Axiomtek compact network hardware platforms appliances. The network appliances can be used in small and home offices as network security devices, or other embedded applications.
-
NA861 -
Axiomtek Co., Ltd.
The NA861 offers high processing performance through the LGA3647 socket 2nd Generation Intel® Xeon® Scalable processor (codename: Cascade Lake) and supports the Intel® C621 chipset. The robust and highly reliable network appliance platform comes with two Gigabit Ethernet ports and four expandable LAN modules supporting 1GbE/10GbE/Fiber/Copper/Bypass with a maximum of thirty-four LAN ports. The NA861 is the perfect network hardware solution for enhancing digital security & surveillance, network traffic management and virtualized network security.
-
VSR347D -
Abaco Systems Inc
The VSR347D takes advantage of Abaco’s SBC347D hardware with an optimized environment running Juniper Networks’ vSRX Virtual Firewall, providing high levels of network security and performance in a single 3U VPX slot.
-
Profitap B.V.
Profitap vTAP is a full-featured network visibility solution built for virtualized service providers and enterprise networks, providing complete visibility of Virtual Machine (VM) traffic (including inter-VM) for security, availability, and performance monitoring.
-
Vision E40 / E100 -
Keysight Network Applications and Security
These new cost-effective and scalable solutions help IT teams supporting hyperscale and microscale data centers, resolve application performance bottlenecks, trouble shoot problems, and improve data center automation, as well as better utilize network analysis and security tools. Today’s hyperscale data centers, which are designed for expansion, as well as micro data centers, which often sit on the network edge closer to end users for an improved experience, can create significant challenges for IT organizations. These challenges range from poor network performance due to increasing size and complexity, to security issues resulting from insufficient visibility into incident detection and resolution. Many IT organizations use multiple network monitoring tools, and need to efficiently transport network traffic from thousands of network locations. Ixia’s solutions for highly scalable and expanding data centers. Ixia’s Vision portfolio of NPBs provides intelligent, sophisticated, and programmable network flow optimization, delivering comprehensive visibility and security coverage. The new Vision Edge 40 and Vision Edge 100 offer real-time visibility, insight, and security into high density hyperscale and microscale data centers, even as they expand. Each is capable of inline and out-of-band deployments, and delivers control, coverage, and performance to protect and improve crucial networking, data center, and cloud business assets.
-
CommView -
TamoSoft
CommView is a powerful network monitor and analyzer designed for LAN administrators, security professionals, network programmers, home users…virtually anyone who wants a full picture of the traffic flowing through a PC or LAN segment. Includes a VoIP analyzer.