Showing results: 331 - 345 of 758 items found.
-
Immunity, Inc.
Penetration Testing is Immunity Service's premier consulting option. Our experienced team of security consultants assumes the role of real world attackers that will stop at nothing to compromise your infrastructure. You can focus the scope of the engagement on specific parts of your infrastructure, or open up the scope for an engagement that runs under real world conditions.
-
VKB -
P3 International Corp.
With more than 1800 identified & listed vulnerabilities P1 Security Vulnerability Knowledge Base (VKB) is a unique telecom-dedicated Vulnerability Database, with absolutely no other equivalent on the market. It is the result of years of expertise and vulnerability assessments successfully led by our engineers on the Core & Radio Networks & Network Elements of many of the biggest Telecom operators in the World.
-
VKB -
P1 Security
With more than 1800 identified & listed vulnerabilities P1 Security Vulnerability Knowledge Base (VKB) is a unique telecom-dedicated Vulnerability Database, with absolutely no other equivalent on the market. It is the result of years of expertise and vulnerability assessments successfully led by our engineers on the Core & Radio Networks & Network Elements of many of the biggest Telecom operators in the World.
-
Hiperstation -
Compuware Corp.
Hiperstation is Compuware's mainframe application quality assurance and data breach deterrent solution. Developers need to test numerous conditions in order to ensure superior performance, reliability and security from your applications. However, the Time-consuming steps necessary to manually test applications means less time for http://www.compuware.com/en_us.htmlyour developers to actually develop applications.
-
Acromag, Inc.
Sophisticated watchdog timer functions allow the application to define the module's failsafe output state. The watchdog timer invokes the failsafe condition when communication between the host and module exceed a duration specified by the application. For further security, a second hardware watchdog timer monitors the microcontroller for failed operations or a "lock-up" condition and automaticaly resets the unit.
-
NIC10G -
Abaco Systems Inc
Featuring the Intel 82599ES dual 10GbE controller, the NIC10G supports flow control, integrated IPsec security engines, optimized queues, IPv6 offloading, advanced filtering capabilities, and Tx/Rx IP, TCP and UDP checksum offloading capability. Also has integrated a PCI Express Gen 2 interface supporting up to 8 lanes.
-
Elara™ FB-Series O -
Teledyne FLIR
The compact FLIR Elara™ FB-Series O thermal security camera delivers industry-leading thermal imaging for perimeter and wide area protection around the clock. The camera also offers "plug-and-play" compatibility with external video analytics and major VMS suppliers, including FLIR United VMS, for additional functionality and a flawless user experience.
-
Lanner Electronics Inc.
Companies use a network appliance because it provides the following benefits over general purpose servers or computers:Easy deployment - Simply unpack, power on, configure IP and you're done.Compatibility - Removes local environmental factors.Long-term brand value - An appliance is visible, attractive and a constant reminder to your value.Purpose design - Appliances optimize performance, security and scalability.
-
ProfiMessage D -
Delphin Technology
With a ProfiMessage D device, you can immediately begin using a optinal PROFINET interface as well as communicating to third-party systems via an OPC UA Server/Client. The device is also equipped with a display to show important configuration and measurement data. Other special features include universal sensor inputs, high-level data security, and a diverse range of interfaces.
-
Texas Co.
* high voltage multimeter probe is a 1000:1 fixed attenuation ratio passive probe. This probe is designed to test high voltages for multimeters. With high voltage and high precision.* The test signal can be read on the multimeter, and the multimeter multiplied by 1000 is the actual test result.* High reliability and high security.* The highest voltage can measure DC up to 30KV.
-
Verifiber, LLC
VeriFiber, LLC was established in 2001 to offer manufacturing services to the Telecom, CATV, Security, Energy Management, Wireless and 3D Printing Industries.Services offered include:*Turn-key*Make-to-stock*Build-to-order*Factory-certified direct-ship from customer supplied bill-of-materials*Prototype fabrication*Consignment inventory management*International shipping expertise and*EDI fulfillment.
-
Pen Test Partners, LLP
We are vendor neutral and platform agnostic. This means that you get unbiased testing and appraisal of any and every environment. We keep a very clear and level head too. We are not fazed by high pressure situations so we can and do advise on incident response- in real-time when needed.CHECK, CREST and Tiger accredited security testing.
-
Autronic S.r.l.
The ECU is designed to exploit the chemical-physical characteristics of the gas fuel used in Otto engines while maintaining the level of emissions of the exhaust gas according to the original standard car.The connector used in Air 48 is automotive type 48- Poles . The connection to the engine signals , offers exceptional qualities of connective security and protection against water infiltration .
-
ProfiMessage D -
Delphin Technology AG
With a ProfiMessage D device, you can immediately begin using a optinal PROFINET interface as well as communicating to third-party systems via an OPC UA Server/Client. The device is also equipped with a display to show important configuration and measurement data. Other special features include universal sensor inputs, high-level data security, and a diverse range of interfaces.
-
TACLANE -
General Dynamics Mission Systems, Inc.
Adding Continuous Monitoring and Cyber Sensing Capability to your TACLANE Encryptor. Trusted Sensor Software is a first-of-its kind, National Security Agency (NSA) approved, option that adds IDS/IPS capabilities to the TACLANE-1G (KG-175G) encryptor. These additional cyber sensor features aid network administrators in establishing network situational awareness and provides greater Defense-