Filter Results By:

Products

Applications

Manufacturers

Network Security

assure threat free net performance.

See Also: Penetration Testing, Threat


Showing results: 106 - 120 of 173 items found.

  • Software Engineering Services

    EnGenius, Inc.

    From the many phases of software engineering, designing, building, testing, implementation, interfacing, and support, enGenius has an expert team and network of highly-vetted partners ready to accommodate projects and programs, both large and small. From the vast list of possible requirements, including web applications, architecture, requirements analysis, network security, and recovery and restoration, enGenius has trusted knowledge management resources for state-side and global projects.

  • GleanPackets

    Glean Corp.

    Identifying cyber security risks and solving network performance problems are becoming primary concerns for enterprises and small businesses. Many companies record network traffic and store the PCAP files for security forensics at a later time, but it is excruciatingly difficult to manage PCAP files and dig through mountains of information to find the relevant data. Searching through multiple large PCAP files and opening up each one with an analysis program is like looking for a needle in many haystacks. GleanPackets search is a powerful, affordable, and easy to use packet search engine that exports PCAP files to your favorite 3rd party web and mobile applications and network appliances via our REST API. Our user friendly interface will guide you through your searches, enabling you to find the the data you need quickly and painlessly. GleanPackets Search is available in several forms.

  • Network Test Solution

    CyPerf - Keysight Technologies

    Realism: Create digital twin of users, applications, and attacks to replicate and test QoE in real-world network environments.Native authentication: Send application and security traffic over authenticated sessions at high scale.Highly scalable: Supports millions of concurrent users and millions of connections per second that elastically scale up and down, enabling both resiliency and chaos testing.Containerized agents: Deploy lightweight traffic agents as containerized pods on-prem, VMs, managed Kubernetes deployments, private or public cloud (AWS, GCP, Azure)Lab and live network testing: Test performance and security both pre-deployment in a lab or safely in live production networks.Flexible: Portable subscription-based software solution with a robust and intuitive cloud-native GUI management dashboard

  • Wireless Network Firewall and Switch

    AWSNS - AvaLAN Wireless Systems, Inc.

    AWSNSWireless Network Firewall and SwitchAvaLAN’s Secure Networking Service “SNS” is an affordable centralized managed service that provides top-level security whether it’s for a single site or mega-site enterprise. This service manages your PCI compliance from the store and into your forecourt. It is the ideal service for monitoring and maintaining your store's critical network infrastructure and also offering LTE Failover and WiFi capability. This cloud-based management means large network changes can be made quickly and easily even if it’s to thousands of sites. AvaLAN’s Secure Network Service takes the pain, hassle, and complexity out of your data network so you can focus on your business and your customers.

  • Global Network Monitoring and Incident Response

    NetOmni™ - Niksun

    NIKSUN NetOmni™ collects information (e.g., Logs, NetFlow, SNMP, Packets, etc) from all network applications, services, and their underlying infrastructure and prioritizes key service delivery, security, and compliance metrics. This enables powerful correlated dashboards and workflows from a single pane of glass.

  • 802.11n wireless access point

    SX-AP-4800AN2 - Silex Technology

    SX-AP-4800AN2 is a dual band 802.11n wireless access point (base station) and is able to communicate with station devices (clients) supporting IEEE802.11a/b/g/n wireless networks. SX-AP-4800AN2 is ideal for business and factory environments supporting enterprise wireless security and PoE (Power over Ethernet).

  • Switches

    Kontron

    As your partner in embedded solutions, we understand that most military and industrial customers need different products than their commercial world counterparts–switches are no exception. We manufacture layer 2 and layer 3 switches with added security options to ensure that your network components are always protected.

  • 10-Port Layer 2 Managed/Unmanaged Ethernet Switches

    TEN710MW - Axiomtek Co., Ltd.

    *EN 50155 layer 2 managed Ethernet switch*Power boost for PoE+, max. budget 150W*Wide operating temperature range from -40°C to 75°C*Supports ERPS/QoS/LACP and more network control, and security features*Reliable IP54 & 5 years warranty

  • Network Search Engine

    Renesas Electronics Corp.

    Renesas’ Network Search Engines (NSE’s) provide high-performance deterministic search results for packet processing applications, including routers, switches, datacenter and security appliances. Incorporating cutting edge memory array technologies and scalable architecture, this range of NSE’s is the perfect solution for any state-of-the-art networking infrastructure.

  • 1U Rackmount Network Appliance Platform With Intel® Celeron® Processor J1900 Up To 2.42 GHz And 6 LANs

    NA342R - Axiomtek Co., Ltd.

    The NA342R 1U rackmount network appliance platform supports the 22nm Intel® Celeron® J1900 quad-core processor (codename: Bay Trail). The x86-based network appliance NA342R supports 6 Gigabit Ethernet ports and aims to provide customers a powerful and cost effective network appliance for VPN, content filtering, UTM, network security gateway, and firewall solutions.In order to address the various network application needs, the NA342R supports one USB 3.0 port, one USB 2.0 port, one console RJ-45 port, and one VGA port. Two 2.5" SATA hard drive bays and one CompactFlash type-II socket are available for storing event logs. The network appliance also supports mainstream Windows® 7, Windows® 8 and Linux operating systems.

  • 2U Rackmount Network Appliance Platform With Dual LGA2011 Socket Intel® Xeon® E5-2600 V3/v4 Family Processors, Intel® C612 And Up To 42 LAN

    NA850 - Axiomtek Co., Ltd.

    The NA850 offers cutting edge performance for networking applications with dual high performance 12-core Intel® Xeon® E5-2600 V3 series processors and Intel® C612 chipset, 16 high bandwidth DDR4 memory slots and two hot swappable 3.5” SATA HDD bays. For greater flexible and easy maintenance, the NA850 can be fitted with up to five Ethernet modules, supporting up to 42 Gigabit LAN ports or 20 10GbE LAN ports. Two PCIe x16 standard expansion slots are available for optional network security cards. The superior network appliance platform also supports the Intel® Data Plane Development Kit (Intel® DPDK), a set of software libraries that can improve packet processing performance by up to ten times. It could achieve over 80 Mbps on a single Intel Xeon processor and double with a dual-processor configuration. With its friendly design and high capacity, this powerful network appliance is suited for IDS/IPS, VPN, content filtering, UTM, network security applications, and cloud computing solutions.

  • Communications & Networking

    Curtiss-Wright Defense Solutions

    Our field-proven communications and networking solutions provide the core capabilities for secure mobile networks onboard land, sea, and airborne platforms. Leveraging advances in enterprise and data center technology, we design and create our rugged solutions to deliver high-performance connectivity on converged, application-aware networks in disconnected, intermittent, and (DIL) environments. For network security and information assurance, our modules and systems support a variety of secure network management protocols and authentication methods. We rigorously test our solutions to ensure they deliver reliable performance in the most demanding environmental conditions and extended temperatures. Our expertise and experience help system integrators to securely and affordably deploy digital network architectures for enhanced situational awareness (SA) and network-centric operations.

  • Lawful Interception

    Shoghi Communications Ltd.

    Lawful Interception is the legally sanctioned official surveillance of private communications, such as telephone calls, SMS and Email messages etc. It is a security process which allows service providers to support law enforcement agencies to identify, monitor and deliver all electronic communication of specified individuals and groups when requested. Shoghi’s Lawful Interception solutions focus on officially intercepting private communications to support legal and/or criminal investigations. The lawful interception solution offered by us covers all available networks such as fixed line network, cellular networks and Internet networks. Shoghi Lawful Interception solution is capable of lawfully intercepting, storing and analyzing communication content.

  • Multispectral Fixed Camera for Perimeter Protection

    FH-Series ID - Teledyne FLIR

    The FLIR FH-Series ID are ruggedized, multispectral fixed cameras that integrate industry-leading thermal imaging with 4K visible imaging to provide reliable intruder-detection capabilities for perimeter security. Built-in convolutional neural network (CNN) analytics accurately detect and classify human and vehicle threats moving at high or low speeds, minimizing false alarms and daily operations costs. Custom scheduling enables security operators to set intrusion analytics to run on visible streams during the day and on thermal streams throughout the night, establishing optimized coverage for any lighting condition.

  • Secure Voice & Data Communications in EURO-ISDN

    ELCRODAT 6-2 - Rohde & Schwarz GmbH & Co. KG

    Rohde & Schwarz ELCRODAT products protect voice and data communications in digital and analog armed forces and government networks in all German and NATO security classifications.The ELCRODAT 6-2 is the first encryption unit approved for transmitting information classified as TOP SECRET that uses a public key method for key agreement. Together with the public key method, the noise generator in the encryption unit enables mutual authentication and key agreement. New session keys are generated in the encryption unit for each connection. The keys do not leave the units and are deleted after the session for maximum security.

Get Help