-
Product
Vulnerability Assessment And Penetration Testing
VA&PT
-
If new web applications are installed into your organization’s network, you have shifted your business physically to another network, or if your site requires IT governance and regulatory compliance, you should opt for Penetration Testing.
-
Product
WordPress Vulnerability Scanner
WPScan
-
WPScan is a free, for non-commercial use, black box WordPress vulnerability scanner written for security professionals and blog maintainers to test the security of their sites.
-
Product
P1 Vulnerability Knowledge Base
VKB
-
With more than 1800 identified & listed vulnerabilities P1 Security Vulnerability Knowledge Base (VKB) is a unique telecom-dedicated Vulnerability Database, with absolutely no other equivalent on the market. It is the result of years of expertise and vulnerability assessments successfully led by our engineers on the Core & Radio Networks & Network Elements of many of the biggest Telecom operators in the World.
-
Product
Expert-Level Vulnerability Assessments
Vanguard Analyzer
-
Vanguard Integrity Professionals
Vanguard Analyzer™ provides Vanguard expertise on z/OS Security Server. Analyzer delivers expert-level vulnerability assessments of z/OS Security Server configuration controls and security settings with the ability to produce audit results in minutes. Vanguard Analyzer™ provides risk analysis and mitigation requirements in easy to read panels. System auditors can review Analyzer findings in order of priority and mitigate accordingly. Do you have access to expert-level assessment based on severity and vulnerabilities? Are your security analyst armed with invaluable interpretation of assessment findings? Can you provide your company with a detailed explanation, easy to understand risk statements and corrective actions that need to be followed step-by-step?
-
Product
FLy-Away Kits
-
Complete Solutions for Cyber Operations,Transportable Private Cloud, Edge Computing A Fly-Away Kit (FAK) or Expeditionary Kit is a self-contained suite of equipment (hardware and software) for DoD and federal civilian Cyber Protection Teams (CPTs) and forward operations to operate both in tactical (field-deployed) and back-office environments. The FAK suite of cyber tools or cloud/server applications include tools to conduct vulnerability analysis, incident response, and other cyber-analytic functions, and are suitable for operation on both classified and unclassified networks.
-
Product
Network Penetration Testing
Metasploit
-
Network penetration testing (aka pen testing) and timely identification of network vulnerabilities is something every organization needs done before hackers or disgruntled insiders exploit the weaknesses.
-
Product
Security Labs
-
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
Product
3D AOI with Revolutionary New 3D Measurement
Zenith
-
The Zenith 3D AOI system measures the true profilometricshape of components, solder joints, patterns and even foreignmaterial on assembled PCBs with true 3 dimensional measurement, overcoming the shortcomings and vulnerabilities of 2D AOI.
-
Product
Security Labs Community Edition
-
*Hack and Patch Real Applications- Get hands-on experience with top vulnerabilities and see the fix impact in a live app, in real-time.*Level-Up Your Coding Approach- Add secure coding to your list of skills by fixing issues that you face regularly, in the languages you’re most comfortable with. *Complete Labs in Minutes- With labs under 10 minutes, you can learn fast and gauge your progress in real-time for quick feedback.
-
Product
Static Code Analysis Tool
Klockwork
-
Klocwork integrates seamlessly into desktop IDEs, build systems, continuous integration tools, and any team's natural workflow. Mirroring how code is developed at any stage, Klocwork prevents defects and finds vulnerabilities on-the-fly, as code is being written.
-
Product
Intelligent Blind Spot Detection Module
TREK-154
-
AI-based detection and identification of vulnerable road users (VRUs) and vehicles using inner wheel difference technology. Compliant with BSIS, R158, and R159 regulations, 180° ultra-wide detection range. Adjustable alarm areas allow flexible deployment across vehicles of varying heights and types.
-
Product
Website Penetration Testing
-
The vulnerabilities in a website need to be proactively fixed before the weaknesses are exploited by hackers, which in turn may lead to loss in customer’s confidence. We at Precise Testing Solution provide extensive planning to conduct website penetration. We check for holes in CRM, extranets, and internal network applications.
-
Product
The Internet Control Message Protocol (ICMP)
ICMP Tests
-
The Maxwell Pro ICMP Test Suite provides a series of tests for verifying correct operation of ICMP. The tests ensure TCP/IP compliance through vulnerability and robustness testing, with tests for ICMP in both the IPv4 and IPv6 environments.
-
Product
Ada Source Code Analyzer
CodePeer
-
CodePeer is an Ada source code analyzer that detects run-time and logic errors. It assesses potential bugs before program execution, serving as an automated peer reviewer, helping to find errors efficiently and early in the development life-cycle. It can also be used to perform impact analysis when introducing changes to the existing code, as well as helping vulnerability analysis. Using control-flow, data-flow, and other advanced static analysis techniques, CodePeer detects errors that would otherwise only be found through labor-intensive debugging.
-
Product
Security Testing
-
As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.
-
Product
Open Source Advanced Web Security Testing Platform
IronWASP
-
IronWASP (Iron Web application Advanced Security testing Platform) is an open source system for web application vulnerability testing. It is designed to be customizable to the extent where users can create their own custom security scanners using it.
-
Product
Security Testing Services
-
By testing the flaws in software, our security testing services seek to remove vulnerabilities before the software is deployed or purchased. By focusing on the different layers of an information system across the database, infrastructure, network, and access channels such as mobile, security testing looks at making the applications free from vulnerabilities. We assist online service providers, website owners, and independent software vendors to manage application security risks. We offer a comprehensive range of white, grey, or black-box model security testing based on your stage in the development cycle.
-
Product
Node.js® platform
N|Solid™
-
N|Solid is a fully compatible Node.js runtime that has been enhanced to address the needs of the enterprise. Rapidly resolve performance problems. Protect customer data from vulnerable packages and unauthorized code. Drive performance and operational efficiency at scale.
-
Product
Acoustic Compound Protection System
ACOMPRIS
-
Static kind of infrastructure is often vulnerable to attacks by either small arms fire (SAF) or mortars. The objects could be for instance a military forward operating base, an embassy or a post from the United Nations. As attacks may occur all the time, persistent and affordable protection is required. Especially when inhibited by civilians, ease of operations use and maintenance become more important. Often installed in remote places far away from the electricity grid, power consumption is an issue.
-
Product
P1 Telecom Auditor
PTA
-
PTA provides network discovery, security scanning and auditing for SS7/SIGTRAN, GPRS/GTP-C, LTE/Diameter and 5G protocol stacks. PTA enables Security and Telecom Engineers to discover the security level of their networks and assess the vulnerabilities of signaling Network Elements. It also provides CIOs, CTOs & VPs of Engineering, decision makers and top management, the ability to control the evolution of their Core Networks™ security using a dashboard of key indicators.
-
Product
UDP Test Suite
-
Design engineers, quality assurance engineers and testers use the IWL UDP Test Suite to find and fix bugs in their UDP implementation. The tests help ensure that the UDP implementation is sufficiently robust so that it is not vulnerable to the wide range of attacks in today's Internet. The tests make use of the Maxwell Pro network emulation environment, so that each test sequence can intelligently impair all aspects of the UDP protocol.
-
Product
Web Application Penetration Testing
-
Web Application Penetration Testing – to identify, analyze, and report vulnerabilities in a given web application. LGMS adopts a robust technology and process-based approach supported by a well-documented methodology to identify potential security flaws in the web application and the underlying environment.
-
Product
Security Testing Service
-
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
Product
Wideband True RMS AC Voltmeter
323
-
The Ballantine 323 True RMS analog ac voltmeter uses advanced true rms circuitry to achieve square law response from rugged, fast responding silicon diode detectors with no thermal lag and overload vulnerability inherent in thermocouple devices.
-
Product
Secure Automotive
-
With cars becoming more connected and therefore more vulnerable to attacks, security has become critical for automotive applications and is at the heart of many concerns. ST is committed to provide secure solutions to address the challenges of this new era of digital technologies.
-
Product
AI-Powered Thermal Traffic Sensor
TrafiSense AI
-
Designed to reliably detect and classify road users, TrafiSense AI is an intelligent thermal imaging sensor for traffic monitoring in complex urban environments. Featuring AI algorithms built on 25+ years of traffic detection and best-in-class thermal imaging, TrafiSense AI delivers continuous vision and data collection for safer, more efficient cities. Capable of tracking multiple objects in any lighting condition, the advanced edge-based AI technology effectively controls intersections, helps protect vulnerable road users, and gathers detailed traffic data for better city planning decisions.
-
Product
Veracode ELearning
-
When it comes to software, developers are the only ones who can really fix the vulnerabilities in their code. But many lack the requisite skills to identify and remediate vulnerabilities. Existing training materials are often lengthy, irrelevant to the organization’s preferred coding languages, or just plain unengaging.
-
Product
Open Source Analyzer
-
Prevent vulnerabilities such as OpenSSL Heartbleed, Bash ShellShock and many others from impacting your application's security posture. Checkmarx Open Source Analysis (OSA) allows organizations to manage, control and prevent the security risks and legal implications introduced by open source components used as part of the development effort.
-
Product
Isolated RS-232
-
Analog Devices offers a wide range of RS-232 transceivers to suit many applications. As RS-232 cable networks and the systems to them can be vulnerable to voltage spikes and ground loops, we have developed a number of innovations that protect against these issues and create an isolated RS-232 environment. We accomplish this through our isoPower® integrated dc-to-dc converters, as well as our iCoupler® technology, which enable the power isolation and signal isolation required for system reliability in a noisy environment.
-
Product
Veracode Dynamic Analysis
DAST
-
Identify and Fix Critical Runtime Vulnerabilities in Web Applications and APIs.* Identify Vulnerabilities in Runtime Environments. Simultaneously scan hundreds of web apps and APIs to find vulnerabilities quickly - including pre-production and staging environments behind a firewall.*Prioritize and Fix Flaws Quickly, A <5% false positive rate allows teams to focus on the vulnerabilities that matter. Detailed, actionable remediation guidance means flaws are fixed faster.*Contribute to a Successful DevSecOps ProgramDynamic scans can be viewed in the Veracode Platform alongside other application security tests, providing multi-faceted insights into the entire security program. Insights and analytics can be used to further improve your DevSecOps program.





























