-
product
Communication Security
Shoghi Communications design and development specific Military Grade Crypto System , Shoghi provids end-to-end communication Security (COMSEC) and secure information transfer. Shoghi has strong experience in creating customer specific Algorithms and Key management schemes. All the hardware, inspite of all the complexities can be loaded by the customer themselves with their own algorithm, to enhance the whole security environment.We are known for our open source designs and crypto validated equipment supply to our military customers. In case of any specific design or development, please feel free to get in touch with our team
-
product
Secure NFC
Mobile security is expanding from the largely deployed SIM technology to the growing NFC, embedded Secure Element (eSE) and embedded SIM (eSIM) technologies in smartphones, tablets, wearables, and laptops. ST provides an exhaustive offer of NFC and eSE/eSIM products to address secure mobile transaction applications such as secure connectivity, payment wireless charging and automotive: from the state-of-the-art ST21NFC to the ST54 integrating the widely deployed ST33.
-
product
Network Test and Security
Ensuring high performance of wired, Wi-Fi, and 3G/4G/LTE and 5G networks in both pre-deployment and real-world environments while enabling dynamic security intelligence to help stay one step ahead of attacks.
-
product
Secure Automotive
With cars becoming more connected and therefore more vulnerable to attacks, security has become critical for automotive applications and is at the heart of many concerns. ST is committed to provide secure solutions to address the challenges of this new era of digital technologies.
-
product
Mobile Application Security
ImmuniWeb®
ImmuniWeb® Mobile is a part of ImmuniWeb Application Security Testing Platform dedicated to comprehensive security testing of mobile applications. Based on proprietary machine-learning SAST and DAST mobile application testing technology, it also provides thorough testing of the mobile backend.
-
product
Embedded Security
Efficient, reliable, and intuitive: The world-leading end-to-end embedded security builder.
-
product
Secure Hardware Platforms
With our STSECURE portfolio, STMicroelectronics offers secure microcontrollers that answer the market needs for advanced security. We deliver hardware-certified solutions based on advanced flash technology, with our latest generation implementing an ARM® SecurCore® processor.
-
product
NETWORK SECURITY
Network Critical Solutions Limited
Network Critical gives all your security systems complete, uncompromising visibility into what’s happening on the network. Get better overall ROI by improving performance of existing security systems to keep pace with increasing network speed and complexity, while gaining the insight needed to better detect, contain and recover from breaches fast.
-
product
Secure CDN
Increase your conversion with our global CDN infrastructure to speed up your website load times and provide the highest streaming quality to your customers. Through improved loading times, it has been shown that conversion rates can be improved up to 2,5 times. You also benefit from the highest possible security and compliance for your content. Secure CDN combines all the benefits in one innovative solution.
-
product
Quantum-Safe Security
CN8000 Series
The CN8000 harnesses the power of quantum mechanics to help ensure secure communications – the encryption keys are generated by IDQ’s Quantum Random Number Generator to guarantee inherent and provable randomness. The CN8000 can also be upgraded to be quantum-safe via the Cerberis QKD Blade (quantum cryptography) to ensure long-term protection of the data in transit.
-
product
Secure Wearable Solutions
From ST31 secure microcontrollers to ST54 solutions integrating NFC controller, secure element and eSIM, ST offers a complete range of solutions for payment, transit and multiple contactless services. ST's technology is ideal for applications that require a card emulation function but are environmentally challenged or have limited space for the antenna.
-
product
Security Testing Services
By testing the flaws in software, our security testing services seek to remove vulnerabilities before the software is deployed or purchased. By focusing on the different layers of an information system across the database, infrastructure, network, and access channels such as mobile, security testing looks at making the applications free from vulnerabilities. We assist online service providers, website owners, and independent software vendors to manage application security risks. We offer a comprehensive range of white, grey, or black-box model security testing based on your stage in the development cycle.
-
product
Security Labs
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
product
Secure Smartphone - Salus
Stratign’s Salus Smartphone is a high-end smartphone built from the ground-up and protects you from eavesdropping, malware, data breaches and any attempts to hack or tamper with your mobile communications and data.
-
product
Network Security
TrustMonitor™
TrustMonitor™ provides continuous monitoring of the trust network by:*(Analyzing content & constraints for validity of credentials*Monitoring that certificate authorities are available to support validation*Easily scaling to incorporate new certificate authorities (no agent required)
-
product
Security Gateways
Schweitzer Engineering Laboratories, Inc.
Security gateways combine cybersecurity capabilities to create secure access paths through security perimeters.
-
product
Network Centric Secure Router
The system utilizes a 26-port layer 2/3 Gigabit Ethernet switch with embedded 32-bit CPU.It supports combinations of up to 26 SGMII ports consisting of 12 GbE Cu PHYs, 12 SGMII interfaces, two of which support 1G/2.5G, and up to three QSGMII ports. One of the SGMII ports can be dedicated to the CPU for packet insertion and extraction. The devices meet IEEE 802.3az requirements for green energy efficient Ethernet.
-
product
Perimeter Security And Coastal Surveillance Systems
These systems comprise of Radars and Cameras and can give early warming to the commanders about any intrusion/breach of perimeter of any restricted area. These can be integrated with jammers to tackle drone threats too.
-
product
Ethernet Switch & Secure Router
VPX3-685
Curtiss-Wright Defense Solutions
The VPX3-685 is a fully-featured Layer-2/Layer-3 managed Ethernet router with a highly integrated security subsystem. Enabling the vision of Network Centric connectivity, the VPX3-685 Secure Ethernet Network Router provides an accelerated path to secure network-ready architectures that can interoperate seamlessly within the Global Information Grid (GIG).
-
product
Power, Environmental, Security & Connectivity Hardware
Panduit power distribution, environmental, and connectivity hardware products improve availability, scalability, power, cooling efficiency, and product quality, which also minimizes network downtime and increases data center productivity.
-
product
IT Security & Anti-Virus Testing Services
The AV-TEST Institute is a leading international and independent service provider in the fields of IT security and anti-virus research. The aim of the research work carried out by AV-TEST is to directly detect the latest malware, to analyse it using state-of-the-art methods and to inform our customers of the top-quality results obtained.
-
product
Security Testing Service
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
product
Security Products
Security is no longer an option; it’s a requirement. As your trusted provider of platform security solutions, our comprehensive portfolio addresses a variety of threat models.
-
product
Network Security Object Management - AlgoSec AddOns
ObjectFlow
Manage network security objects across your entire multi-vendor network.
-
product
Cloud Security
Cloud Security Assessment is the most critical phase before the product is finally deployed and Product is finally ready to handle real-world cyber security threats.
-
product
Cyber Security and Digital Data Protection
As security demands evolve, Applied Computer Technologies provides a layered and progressive approach to security. Organizations without a sufficient security footprint are being affected and held ransom, operations disrupted, and business reputations damaged. We've partnered with some amazing and innovative companies to offer our clients the best cyber security and protection available today. Our integrated security products include next generation firewalls; ransomware and crypto malware; secure connectivity; Email, encryption, archiving, and SPAM filtering; Web and content filtering; and data integrity & theft prevention.
-
product
Defense & Security
Protecting populations from nuclear risk. Our instruments precisely detect and monitor radiation in the most critical and challenging situations, empowering military and civil defense teams to keep populations safe.
-
product
Cyber Security/Network Security Training
Stratign’s Cyber Security/Network Security Training provides cybersecurity professionals with foundational, intermediate, and advanced security skills imparted through experts in the field.
-
product
Voice Systems for Safe, Secure, & Efficient Communications
Rohde & Schwarz offers flexible and cost-effective communications system solutions that meet all scalability and reliability requirements for civil and defense use cases regardless of the application domain - in the air, on the ground or at sea Multi-redundant, IP based voice communications systems ensure safe, secure and efficient voice communication, combining state-of-the-art, flexible and resilient IP based architecture with strong security mechanisms.





























