Filter Results By:

Products

Applications

Manufacturers

Security

to make safe.

See Also: Threat


Showing results: 46 - 60 of 757 items found.

  • Network Test and Security

    Keysight Technologies

    Ensuring high performance of wired, Wi-Fi, and 3G/4G/LTE and 5G networks in both pre-deployment and real-world environments while enabling dynamic security intelligence to help stay one step ahead of attacks.

  • Security Testing Consultancy

    QA Mentor, Inc.

    QA Mentor provides an End-to-End security testing services through the array of preventive measures, proven methodology and framework, use of best tools identified through POCs (proof of concepts) and an excellent infrastructure which is using evolving technologies. The backbone of all of these are the industry and project experience QA Mentor and its highly qualified & certified Security Testing Consultants. Our consultants closely work with our customers to assess their system, conduct POC to identify the relevant preventive measure and tools to be used and guide the IT teams of the businesses with a clearly defined roadmap to be followed to secure their systems.

  • Portable Security System

    Sensor-1 - Metasensor Inc.

    The portable security system that fits in the palm of your hand. Sensor-1 detects real-time changes in motion and alerts you when your important items move. Operates independent of the mobile app. Communicates with smartphones, tablets, laptops and desktops.

  • API Security Testing

    QA Mentor, Inc.

    In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:

  • Security Education Platform

    Wombat Security Technologies

    Our unique Assess, Educate, Reinforce, Measure training methodology combines the four key components of successful security awareness and training programs. Customers who have used this cyclical approach have experienced up to a 90% reduction in successful external phishing attacks and malware infections.

  • Airspace Security Platform

    DroneTracker - Dedrone Inc.

    The airspace security platform that detects, classifies, and mitigates all drone threats.​ DroneTracker aggregates sensor information about potential threats, recognizing and classifying drones of all kinds. Its web-based interface shows live threats, real-time drone flight paths, and records forensic details including video evidence. The RF Sensor detects drones and remote controls by their radio frequency (RF) signatures.

  • Cloud Security Solutions

    Akamai Technologies

    Online threats are constantly changing. Offering protection against the largest and most sophisticated attacks, Akamai helps you safeguard your websites and other Internet-facing applications from the risks of downtime and data theft. Built on the Akamai Intelligent Platform, Akamai Cloud Security Solutions provide the scale to stop the largest Distributed Denial-of-Service (DDoS) and web application attacks without reducing performance, as well as intelligence into the latest threats and the expertise to adapt to shifting tactics and attack vectors.

  • Network Security Scanner

    Fyodor

    Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool

  • Cyber ​​Security Assessment

    7Layers, Inc.

    In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.

  • Email Security Solution

    Email Trust Platform - Agari

    Agari's Email Trust Platform, deployed by Fortune 1000 companies and government agencies, is the only solution that effectively stops phishing by identifying the true sender of emails. Agari's proprietary analytics engine and email telemetry network provides unparalleled visibility into more than 10 billion email messages per day across 3 billion mailboxes. This insight drives the company's Trust Analytics machine learning engine, which uniquely enables enterprises to stop phishing attacks against their employees and customers.

  • Mini-Dome Security Camera

    Ariel Quad HD Mini-Dome - Teledyne FLIR

    The Ariel Quad HD Dome is ready for diverse motion and lighting conditions found in critical infrastructure and commercial locations. The camera includes Shutter Wide Dynamic Range, IR Illumination and H.264/H.265 compression. The Ariel Quad HD Dome reduces the total cost of ownership through network and storage savings. When controlled using FLIR’s United VMS, the camera also utilizes unique adaptive streaming technology, enhancing the overall viewing experience.

  • Remote Work Security

    Akamai Technologies

    Secure remote access to corporate apps and the internet from anywhere. Reduce cyberthreats without hindering your workforce.

  • Security intelligence & analytics

    IBM Security

    Detect and prioritize threats that pose the greatest risk. dentify high-risk threats with near real-time correlation and behavioral anomaly detection. Detect vulnerabilities, manage risks and identify high-priority incidents among billions of data points.Gain full visibility into network, application and user activity.

  • SQL Security & Compliance

    Idera, Inc.

    Improve SQL Server audits, strengthen permissionssecurity & alert on data changes in your environment

  • HDCVI Security Cameras

    1.3MP Family - eLine Technology

    This dome camera has reliable transmissions over coaxial cabling, Day/Night ICR, AWB, AGC and BLC.

Get Help