Net Security
-
Product
Quantum-Safe Security
CN6000 Series
-
The Centauris CN6000 encryptors may be upgraded to quantum cryptography through the addition of the Cerberis Quantum Key Distribution (QKD) server to ensure that the solutions are quantum-safe for the long-term protection of sensitive data. This also ensures investment-protection of the encryptors. Such quantum cryptography is provably secure, ensures anti-eavesdropping detection and provides long-term forward secrecy against brute force hacking and attacks by quantum computers.
-
Product
Modbus Master TCP/IP Component for .NET
WSMBT
-
WSMBT is a powerful and simple to use .Net component that makes it easy to access data from a Modbus slave device connected to the PC's Ethernet network. Simply drop the component on your form and talk to your device with your VB.NET, C# or Managed C++.
-
Product
Network Security Validation Platform
FireDrill
-
AttackIQ FireDrill is a game changing platform that seamlessly integrates into any existing network, delivering immediate visibility into your security program so you can mitigate risk, and maximize security ROI.
-
Product
Security Testing Service
-
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
Product
Network Security Object Management - AlgoSec AddOns
ObjectFlow
-
Manage network security objects across your entire multi-vendor network.
-
Product
Embedded Security
-
Efficient, reliable, and intuitive: The world-leading end-to-end embedded security builder.
-
Product
Secure DNS
-
DNS attacks are still a regular occurrence for cybercriminals and many companies are targeted by such attacks not only once a year. With Secure DNS, you not only ensure secure access to your website, but also benefit from extra protection against such attacks.
-
Product
Secure Access
-
Schweitzer Engineering Laboratories, Inc.
Devices with secure access authenticate users, control privileges, and create audit trails.
-
Product
Network Security Appliances
-
With the development and popularization of cloud computing technologies, traditional network security providers are repositioning and moving their development efforts from network security solutions that can only handle single point security issues to a new generation of network security solution that are effective in big data and cloud computing environments. ICT equipment providers in the network security industry need network security servers that have massive DPI parsing power, full support for NFV and SDN, and a powerful big data processing engine. This equipment must also support dynamic capacity expansion and scalable IO extension in order to adapt to a more complicated cloud environment.
-
Product
Security Labs
-
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
Product
Full-HD Mini Dome Security Camera
FLIR ARIEL™ CM-3202
-
The Ariel CM-3202 mini dome camera offers 1080p video and fast frame rates in high-motion, low light scenes. True wide dynamic range (WDR) on the CM-3202 captures sharp video in complex environments, such as critical infrastructure sites, commercial offices, and large campuses. With a strong H.265 built-in motion processing architecture, the Ariel CM-3202 mini dome delivers predictable, efficient streaming and storage, reducing utility costs and total cost of ownership (TCO).
-
Product
Thermal Security Camera
Elara™ FC-Series O
-
The Elara™ FC-Series O thermal security camera is one of FLIR’s premium thermal security cameras for perimeter protection. The Elara FC-Series O integrates with external video analytics devices, such as FLIR’s TRK or third party solutions, to classify human or vehicular intrusions. The Elara FC-Series O also offers a wide range of high-performance lenses, with a choice of resolutions, offering greater flexibility for tailoring security systems to specific site conditions.
-
Product
ARINC 615/615A Tablet PC Secure PDL Solution
PDL-615
-
Avionics Interface Technologies
The PDL-615 is a secure rugged, portable, tablet PC based ARINC 615 & ARINC 615A PDL solution.
-
Product
Security and Traffic Monitoring System
-
Information System Technologies Inc.
ISTI’s versatile sensor nodes can support multiple sensing types including acoustic, seismic, visible/IR, and scanning laser. Several eye-safe scanning lasers form a distributed wireless sensor network and can continuously and accurately track as well as monitor ground vehicles and personnel in a surveillance area. This system provides super-fine angular and range resolution to precisely locate moving targets. Among other key benefits are: day/night operational capability, continuous monitoring and surveillance without blind spots, 360 degrees field-of-view, large coverage area, multiple closely spaced target tracking, threat classification, and automatic alarm generation. The system can be used in applications such as traffic monitoring, intrusion detection, border control, airport runway collision and incursion avoidance, and perimeter security.
-
Product
Security Testing
-
As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.
-
Product
Cyber Security Training
-
Elbit Systems of America's comprehensive attack scenario library reflects the most recent threat landscape. Our cyber security experts continuously update training scenarios with newly discovered attacks and tactics. Versatile network settings and attack scenarios equip cyber security teams with customized training specific to each team's organization.
-
Product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 1GE/10GE Appliance
-
Keysight Network Applications and Security
PerfectStorm ONE facilitates network and security proof-of-concepts (POCs) and assessments, all in a compact device. This POC-in-a-box enables enterprises and service providers to select optimal devices and right-size data centers, as well as providing device vendors with a platform to fully showcase their product’s performance, resiliency, and throughput under realworld traffic loads.
-
Product
Secure CDN
-
Increase your conversion with our global CDN infrastructure to speed up your website load times and provide the highest streaming quality to your customers. Through improved loading times, it has been shown that conversion rates can be improved up to 2,5 times. You also benefit from the highest possible security and compliance for your content. Secure CDN combines all the benefits in one innovative solution.
-
Product
E2E Security Connector
-
The E2E Security Connector is a cloud solution for enhancing the security level of your system. It provides secure generation and management of confidential data during the pre-personalization process of your connected devices as well as different protection schemes for its application and data transportation layer.
-
Product
Industrial & Security
D-Matrix
-
The D-Matrix Gamma Ray Imager is a fully integrated, photon-counting, pixilated, 12-bit energy discriminating CZT detector/imager.
-
Product
Industrial & Security
-
Kromek's custom configurations of Cadmium Zinc Telluride (CZT) based detector tiles and linear arrays can be implemented into custom Advanced Imaging platforms for various Industry and Security applications.
-
Product
API Security Testing
-
In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:
-
Product
Voice Systems for Safe, Secure, & Efficient Communications
-
Rohde & Schwarz offers flexible and cost-effective communications system solutions that meet all scalability and reliability requirements for civil and defense use cases regardless of the application domain - in the air, on the ground or at sea Multi-redundant, IP based voice communications systems ensure safe, secure and efficient voice communication, combining state-of-the-art, flexible and resilient IP based architecture with strong security mechanisms.
-
Product
Secure Automotive
-
With cars becoming more connected and therefore more vulnerable to attacks, security has become critical for automotive applications and is at the heart of many concerns. ST is committed to provide secure solutions to address the challenges of this new era of digital technologies.
-
Product
SST Security Assessment
-
Self-Service Terminal (SST) penetration testing is an activity which identifies vulnerabilities in SST that may potentially exist due to the lack of physical security measures, technical configuration or process controls.
-
Product
Omnisens Securing Power Cable Integrity
https://www.omnisens.com/uploads/1/2/0/5/120592129/published/omnisens-cobra-logo-white-2014-06-10.png?1546958203
-
In both underground and subsea cables incipient faults often result in temperature events. Using optical fibers integrated into the power cable or laid close by, Distributed Temperature Sensing (DTS) helps detect changes and faults allowing the operator to intervene before the cable fails. It is suitable for deployment in any cable where an optical fiber is present, including HVDC, HVAC, export, inter-array, transmission and distribution.
-
Product
Intelligent Chatbot for Network Security Policy Management
AlgoBot
-
AlgoBot, is an intelligent chatbot that handles network security policy management tasks for you. AlgoBot answers your questions, submitted in plain English, and personally assists with security policy change management processes – without requiring manual inputs or additional research.
-
Product
Visible PTZ Security Cameras
Quasar™ 4K IR PTZ Cameras
-
With crisp 4K video resolution, on-board long-range IR illumination, and 22x or 31x optical zoom options, FLIR Quasar™4K IR PTZ cameras deliver critical situational awareness. Exceptional field of view gives operators the ability to seamlessly monitor key details throughout large areas. The combination of high-performance optics and sensors, exceptional low light visible imaging, and effortless integration with all major third-party VMS and FLIR United VMS makes Quasar 4K IR PTZ cameras an ideal solution for critical infrastructure sites and remote facilities that require close monitoring.





























