Filter Results By:
Products
Applications
Manufacturers
-
product
Node.js® platform
N|Solid™
N|Solid is a fully compatible Node.js runtime that has been enhanced to address the needs of the enterprise. Rapidly resolve performance problems. Protect customer data from vulnerable packages and unauthorized code. Drive performance and operational efficiency at scale.
-
product
Security Testing Service
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
product
Security Testing Services
By testing the flaws in software, our security testing services seek to remove vulnerabilities before the software is deployed or purchased. By focusing on the different layers of an information system across the database, infrastructure, network, and access channels such as mobile, security testing looks at making the applications free from vulnerabilities. We assist online service providers, website owners, and independent software vendors to manage application security risks. We offer a comprehensive range of white, grey, or black-box model security testing based on your stage in the development cycle.
-
product
Isolated RS-232
Analog Devices offers a wide range of RS-232 transceivers to suit many applications. As RS-232 cable networks and the systems to them can be vulnerable to voltage spikes and ground loops, we have developed a number of innovations that protect against these issues and create an isolated RS-232 environment. We accomplish this through our isoPower® integrated dc-to-dc converters, as well as our iCoupler® technology, which enable the power isolation and signal isolation required for system reliability in a noisy environment.
-
product
Ada Source Code Analyzer
CodePeer
CodePeer is an Ada source code analyzer that detects run-time and logic errors. It assesses potential bugs before program execution, serving as an automated peer reviewer, helping to find errors efficiently and early in the development life-cycle. It can also be used to perform impact analysis when introducing changes to the existing code, as well as helping vulnerability analysis. Using control-flow, data-flow, and other advanced static analysis techniques, CodePeer detects errors that would otherwise only be found through labor-intensive debugging.
-
product
Autonomous PNT Performance and Vulnerability Test Suite
PANACEA
PANACEA is an autonomous GNSS performance and threat environment simulator system designed to control simulation hardware and collect data from up to 32 GNSS receivers simultaneously.
-
product
Telecom, Embedded Hardware-S/W Systems
Network Penetration Testing is a technique that identifies security vulnerabilities in the application by applying different malicious processes to break network security.
-
product
Power Tester
PS-200
It is important to keep your graphic cards powered, but you want to make sure that your graphic cards aren’t overpowered. Not all power supply units have power surge protection, so your graphic cards may be vulnerable to damages from over voltage or over current. Protect your graphic cards now with the new PS-200.
-
product
Penetration Testing
Reduce your risk of a breach by identifying and exploiting business-critical vulnerabilities with on-demand penetration testing expertise.
-
product
SWIR Imagers
SWIR imagers (short wavelength infrared) are an important group of surveillance electro-optical imagers due several reasons. First, advances in InGaAs technology enabled design of relatively low cost SWIR imagers. Second, InGaAs imagers are very sensitive and can generate images of observed scenery even at dark nights. Third, SWIR imagers are less vulnerable to bad atmospheric conditions than TV/LLLTV cameras working in visible/near infrared band. Fourth, SWIR imagers can generate hi-res images even if they are built using much smaller optics than used for design of thermal imagers.
-
product
Application Security Testing Solution
CxIAST
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.
-
product
AI-Powered Thermal Traffic Sensor
TrafiSense AI
Designed to reliably detect and classify road users, TrafiSense AI is an intelligent thermal imaging sensor for traffic monitoring in complex urban environments. Featuring AI algorithms built on 25+ years of traffic detection and best-in-class thermal imaging, TrafiSense AI delivers continuous vision and data collection for safer, more efficient cities. Capable of tracking multiple objects in any lighting condition, the advanced edge-based AI technology effectively controls intersections, helps protect vulnerable road users, and gathers detailed traffic data for better city planning decisions.
-
product
Security intelligence & analytics
Detect and prioritize threats that pose the greatest risk. dentify high-risk threats with near real-time correlation and behavioral anomaly detection. Detect vulnerabilities, manage risks and identify high-priority incidents among billions of data points.Gain full visibility into network, application and user activity.
-
product
Secure Automotive
With cars becoming more connected and therefore more vulnerable to attacks, security has become critical for automotive applications and is at the heart of many concerns. ST is committed to provide secure solutions to address the challenges of this new era of digital technologies.
-
product
Open Source Analyzer
Prevent vulnerabilities such as OpenSSL Heartbleed, Bash ShellShock and many others from impacting your application's security posture. Checkmarx Open Source Analysis (OSA) allows organizations to manage, control and prevent the security risks and legal implications introduced by open source components used as part of the development effort.
-
product
Pneumatic Zero Drop Tester
HIACC Engineering & Services Pvt. Ltd.
Designed as per ISTA packaging standard, the Pneumatic Zero Drop Test stand is used to assess the drop bearing capacity of the specimen during its transportation and handling process. The system is ideal for testing the specimen vulnerability around edges, surfaces and corners at different heights.
-
product
Dynamic Analysis
DAST
Dynamic application security testing at the scale and speed modern enterprises need. WhiteHat™ Dynamic rapidly and accurately finds vulnerabilities in websites and applications, with the scale and agility you need to identify security risks across your entire application portfolio.
-
product
Penetration Testing
Our penetration testing services reveal real vulnerabilities that matter to your environment. Ultimately LGMS will provide advisory and guidance to help your business to become more secure.
-
product
Expert-Level Vulnerability Assessments
Vanguard Analyzer
Vanguard Integrity Professionals
Vanguard Analyzer™ provides Vanguard expertise on z/OS Security Server. Analyzer delivers expert-level vulnerability assessments of z/OS Security Server configuration controls and security settings with the ability to produce audit results in minutes. Vanguard Analyzer™ provides risk analysis and mitigation requirements in easy to read panels. System auditors can review Analyzer findings in order of priority and mitigate accordingly. Do you have access to expert-level assessment based on severity and vulnerabilities? Are your security analyst armed with invaluable interpretation of assessment findings? Can you provide your company with a detailed explanation, easy to understand risk statements and corrective actions that need to be followed step-by-step?
-
product
Security Labs
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
product
P1 Vulnerability Knowledge Base
VKB
With more than 1800 identified & listed vulnerabilities P1 Security Vulnerability Knowledge Base (VKB) is a unique telecom-dedicated Vulnerability Database, with absolutely no other equivalent on the market. It is the result of years of expertise and vulnerability assessments successfully led by our engineers on the Core & Radio Networks & Network Elements of many of the biggest Telecom operators in the World.
-
product
Acoustic Compound Protection System
ACOMPRIS
Static kind of infrastructure is often vulnerable to attacks by either small arms fire (SAF) or mortars. The objects could be for instance a military forward operating base, an embassy or a post from the United Nations. As attacks may occur all the time, persistent and affordable protection is required. Especially when inhibited by civilians, ease of operations use and maintenance become more important. Often installed in remote places far away from the electricity grid, power consumption is an issue.
-
product
Cybersecurity Penetration Testing Assessments
Tripwire Professional Services
Organizations do all that they can to protect their critical cyber assets, but they don’t always systematically test their defenses. Penetration tests—otherwise known as pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems. Whether we are testing an application or network environment, Tripwire’s pen testing will not only identify vulnerabilities, but it will also demonstrate them through exploitation—definitively determining if unauthorized access or other malicious activity is possible.
-
product
Telephone And Line Analyzer
TALAN™ 3.0
The TALAN 3.0 Telephone and Line Analyzer represents advanced capability to detect and locate illicit tampering and security vulnerabilities on digital, analog, and VoIP telephone systems. New hardware provides the ability to test twisted pairs against modern telecommunication threats including shield and ground.
-
product
Security Testing Service
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
product
Static Analyzer
Julia
Julia Static Analyzer is best in class for finding defects and security vulnerabilies in C#, Java and Android applications (for C and C++ languages, please have a look to GrammaTech CodeSonar). By using Julia Static Analyzer, you reduce development and maintenance costs and eliminate risks related to security vulnerabilities and privacy leaks. The powerful analysis technology ensures a maximum precision of results. With advanced dashboarding you can flexibly transform the data into useful information for the different stakeholders.
-
product
Veracode Dynamic Analysis
DAST
Identify and Fix Critical Runtime Vulnerabilities in Web Applications and APIs.* Identify Vulnerabilities in Runtime Environments. Simultaneously scan hundreds of web apps and APIs to find vulnerabilities quickly - including pre-production and staging environments behind a firewall.*Prioritize and Fix Flaws Quickly, A <5% false positive rate allows teams to focus on the vulnerabilities that matter. Detailed, actionable remediation guidance means flaws are fixed faster.*Contribute to a Successful DevSecOps ProgramDynamic scans can be viewed in the Veracode Platform alongside other application security tests, providing multi-faceted insights into the entire security program. Insights and analytics can be used to further improve your DevSecOps program.
-
product
Multi-frequency, Multi-GNSS Simulator
GSS7000
The GSS7000 offers exceptional accuracy, fidelity and authentic GNSS signal emulation, ensuring true performance at every test stage. Advance features include embedded multipath, interference, and spoofing capabilities that deliver comprehensive vulnerabilities testing.
-
product
SST Security Assessment
Self-Service Terminal (SST) penetration testing is an activity which identifies vulnerabilities in SST that may potentially exist due to the lack of physical security measures, technical configuration or process controls.
-
product
WordPress Vulnerability Scanner
WPScan
WPScan is a free, for non-commercial use, black box WordPress vulnerability scanner written for security professionals and blog maintainers to test the security of their sites.





























