Showing results: 271 - 285 of 757 items found.
-
Shanghai Pubang Sensor Co.,Ltd.
1. Compact and durable, magnetism detection with long distance2. Manufactured with specialized hall element, high security and stablity3. Can choose N pole or S pole to sense,long-life span and high reliability4. Red LED for checking the sensor status5. Cost-effective and easy operation
-
Artiza Networks Inc.
When problems and security breaches happen in your network, it’s already too late to start keeping records. The etherExtractor line of packet capture tools offers 0 packet loss and makes it easy to diagnose problems and analyze traffic across your network.
-
Scientific Research Corp. STI Division
SRC supports the VA by engineering a secure and scalable computing platform based on a cloud environment to host veterans health information. We provide system administration, information security, data recovery, and incident response for a system sized to meet the requirements of 10 million users.
-
Security Intelligence Technologies, Inc.
In order to make effective presentations to Government and Law Enforcement clients, the Reseller Demonstration Kits were created for those interested in Security Business Opportunities. Many visitors come to our offices and manufacturing facilities to learn about our technologies and explain them to their clients.
-
ADLINK Technology Inc.
The Matrix series of fanless embedded computers enhances responsiveness and durability of edge AI and edge computing applications. Designed to perform and to last, the Matrix fanless embedded computers enable timely data-driven decision making at the edge, improving efficiency, productivity and security enhancement across industries.
-
Epitiro
The Internet of Things (IoT) offers breathtaking potential. But IoT success means navigating new technologies, multiple standards, intense competition, and security threats. Spirent helps developers, operators, and service providers optimize their IoT solution and get to market faster. Discover how below.
-
Renesas Electronics Corp.
The RH850 is Renesas Electronics' latest automotive micro-controller family that offers high performance balanced with very low power consumption over a wide and scalable range of products. This family offers rich functional safety and embedded security features needed for new and advanced automotive applications.
-
ML2400 -
GE Digital Energy
The MultiLink ML2400 is a 19" Rack Mountable hardenedManaged Ethernet Switch that is designed specifically foruse in Industrial Facilities, Substations and Transportation environments. It will supply you with reliable, high-speednetworking of all your mission critical applications andprovide flexibility and security with easy to usemanagement functions that are unsurpassed in the industry.
-
STMicroelectronics
ST offers watchdog timers as standalone devices (separate from the microprocessor) for applications requiring a high security level. These devices are a robust, reliable means of monitoring software code execution, or hardware failures, and can trigger appropriate action, such as system reboot, high-level interrupt generation and others.
-
NAVICS -
Rohde & Schwarz GmbH & Co. KG
The NAVICS® fully IP based ICS from Rohde & Schwarz uses a uniform IP network to connect distributed on-board voice terminals and other subsystems for internal and external communications. The ruggedized, highly available IT technology with creditable security is also from Rohde & Schwarz
-
Flex Tap VHD -
Keysight Network Applications and Security
Flex Tap VHD is a modular, very high density fiber tap available, offering up to 36 taps in a 19 inch 1U space, to reduce IT costs while helping ensure availability of security and business critical applications. Network taps (test access points) are a key part of the access layer of a visibility architecture because they are an unobtrusive way to capture monitoring data. They offer comprehensive traffic visibility for network monitoring and security tools that do not introduce points of failure in the network. Ixia has a large variety of network taps on the market today, offering speeds from 1Gbps to 100Gbps, single and multi-mode, as well as different fiber types and support for Cisco bidirectional (BiDi) transceivers.
-
UTOR
All web and mobile applications are vulnerable to attack. You are going to get hacked – it's not "if", it's "when." Before it happens, you want to make sure you have a mature security system in place. Our specialists in software security testing have a background in IT and software development, know different types of exploits, and have experience in performing thousands of pen tests. We get hired to hack into systems and determine weaknesses.
-
VPX3-685 -
Curtiss-Wright Defense Solutions
The VPX3-685 is a fully-featured Layer-2/Layer-3 managed Ethernet router with a highly integrated security subsystem. Enabling the vision of Network Centric connectivity, the VPX3-685 Secure Ethernet Network Router provides an accelerated path to secure network-ready architectures that can interoperate seamlessly within the Global Information Grid (GIG).
-
NetOmni™ -
Niksun
NIKSUN NetOmni™ collects information (e.g., Logs, NetFlow, SNMP, Packets, etc) from all network applications, services, and their underlying infrastructure and prioritizes key service delivery, security, and compliance metrics. This enables powerful correlated dashboards and workflows from a single pane of glass.
-
NetMobility® -
Niksun
The next generation of mobile network monitoring is here. With NIKSUN NetMobility® you gain unparalleled insights into subscriber behavior, carrier services, network health, cyber threats, and application performance to meet a wide range of service provider needs - Performance, Security, Operations, Management, and Planning.