-
Product
Test SIP
-
VoIP, Video, and IPTV products must withstand and continue to function when facing all the conditions that occur on the Internet. These include attacks from hackers exploiting vulnerabilities in security and protocols as well as the common phenomenon of congestion, delay, jitter, drops, and so on. VoIP, Video, and IPTV products must demonstrate robustness and resiliency in the face of unusual and/or illegal conditions.
-
Product
SWIR Imagers
-
SWIR imagers (short wavelength infrared) are an important group of surveillance electro-optical imagers due several reasons. First, advances in InGaAs technology enabled design of relatively low cost SWIR imagers. Second, InGaAs imagers are very sensitive and can generate images of observed scenery even at dark nights. Third, SWIR imagers are less vulnerable to bad atmospheric conditions than TV/LLLTV cameras working in visible/near infrared band. Fourth, SWIR imagers can generate hi-res images even if they are built using much smaller optics than used for design of thermal imagers.
-
Product
Application Security Platform
Sentinel
-
WhiteHat Sentinel is a Software-as-a-Service (SaaS) platform that enables your business to quickly deploy a scalable application security program across the entire software development lifecycle (SDLC). Combining advanced scanning technology with the world’s largest application security research team, we accurately identify your vulnerabilities and scale to meet any demand without slowing you down.
-
Product
Telephone And Line Analyzer
TALAN™ 3.0
-
The TALAN 3.0 Telephone and Line Analyzer represents advanced capability to detect and locate illicit tampering and security vulnerabilities on digital, analog, and VoIP telephone systems. New hardware provides the ability to test twisted pairs against modern telecommunication threats including shield and ground.
-
Product
eBIRST™ – Switching System Test Tools
-
Switching systems are an important part of many test systems, however, the switching system is in a vulnerable place. When accidents happen that can cause a faulty device, you need a way to get the system up and running again with a minimum of effort and operator skills.
-
Product
P1 Vulnerability Knowledge Base
VKB
-
With more than 1800 identified & listed vulnerabilities P1 Security Vulnerability Knowledge Base (VKB) is a unique telecom-dedicated Vulnerability Database, with absolutely no other equivalent on the market. It is the result of years of expertise and vulnerability assessments successfully led by our engineers on the Core & Radio Networks & Network Elements of many of the biggest Telecom operators in the World.
-
Product
Security Testing Service
-
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
Product
Veracode Static Analysis
SAST
-
*Find Flaws Accurately, at ScaleScan over 100 languages and frameworks quickly and accurately.*Prioritize and Fix Flaws FastRapidly find and fix vulnerabilities with real-time feedback and reduce flaws introduced in new code by up to 60% with IDE scans.*Deliver a Frictionless Developer ExperienceCode confidently with contextual learning and easy integration with over 40 developer tools and custom APIs.*Streamline Governance, Risk Management, and ComplianceManage and measure the security posture of your applications with enterprise-wide security policies, robust reporting, and comprehensive analytics.
-
Product
Application Penetration Testing:
-
Penetration testing (or pen testing) is a simulated security exercise in which ethical hackers attempts to exploit the vulnerabilities of an application system (web or mobile). The objective of this exercise is to identify any possible loopholes present in the system’s defence mechanism which the real hackers could take advantage of. QA Mentor practices the following stages while exercising this:
-
Product
Security intelligence & analytics
-
Detect and prioritize threats that pose the greatest risk. dentify high-risk threats with near real-time correlation and behavioral anomaly detection. Detect vulnerabilities, manage risks and identify high-priority incidents among billions of data points.Gain full visibility into network, application and user activity.
-
Product
Power Tester
PS-200
-
It is important to keep your graphic cards powered, but you want to make sure that your graphic cards aren’t overpowered. Not all power supply units have power surge protection, so your graphic cards may be vulnerable to damages from over voltage or over current. Protect your graphic cards now with the new PS-200.
-
Product
The World's Most Advanced Integrated Thermal Traffic Detector
TrafiSense2
-
TrafiSense2 is an integrated thermal sensor and detector for vehicle, vulnerable road user, and wrong way driver detection. TrafiSense2 does not need light to operate, and instead uses the thermal energy emitted from road users. This enables the sensor to detect vehicles and vulnerable road users at night, over long distances, and in harsh weather conditions. With available 640x480 resolution, the TrafiSense2 offers 24/7 traffic detection for a wide range of applications.
-
Product
TCP Tests
-
The Maxwell Pro TCP Test Suite is used by design engineers, quality assurance engineers and testers to find and fix bugs in their TCP stack or engine. The tests help ensure that the TCP stack is sufficiently robust so that it is not vulnerable to the wide range of attacks in today's Internet. The tests make use of the Maxwell Pro network emulation environment, so that each test sequence can intelligently impair all aspects of the TCP protocol.
-
Product
Network Security Testing
-
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
Product
Solder Paste Inspection System
KY8030-3
-
The new KY8030-3 delivers 3x fasterinspection without compromisingperformance and accuracy.Using patented dual projection,the system eliminates the criticalShadow problem that all 3D SPI systemscan be vulnerable to.Additionally, the new KY8030-3 has solvedthe PCB Warp problem that seriouslyimpacts inspection accuracyand reliability of result.
-
Product
Application Security Testing Solution
CxIAST
-
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.
-
Product
IoT Devices Penetration Testing
-
There is a rising concern that IoT devices are being developed rapidly without appropriate consideration of the profound security challenges involved, as demonstrated by the various IoT devices hacked in recent years— automobiles, cameras, children's toys, thermostats, and medical devices.With more than a decade of specialized cyber security testing experience combined with our extensive research and development, we can assess and identify both common and complex security vulnerabilities that may be residing within your whole IoT ecosystem.
-
Product
Roughness Testers
-
Roughness is an important parameter when trying to find out whether a surface is suitable for a certain purpose. Rough surfaces often wear out more quickly than smoother surfaces. Rougher surfaces are normally more vulnerable to corrosion and cracks, but they can also aid in adhesion. A roughness tester is used to quickly and accurately determine the surface texture or surface roughness of a material. A roughness tester shows the measured roughness depth (Rz) as well as the mean roughness value (Ra) in micrometers or microns (µm). Measuring the roughness of a surface involves applying a roughness filter. Different international standards and surface texture or surface finish specifications recommend the use of different roughness filters. For example, a Gaussian filter often is recommended in ISO standards.
-
Product
Cloud-Based Predictive Service for Identifying Infrastructure Vulnerabilities
Kaleidoscope
-
With Kaleidoscope, you can rapidly and accurately identify previously unknown infrastructure vulnerabilities to prioritize capital expenditures and achieve greater infrastructure resilience in a more proactive and interconnected way.Kaleidoscope uses predictive algorithms to generate vulnerability assessments across key sectors of infrastructure in a community, including transportation, potable water, energy, communications and sanitation. By identifying vulnerabilities and how they may potentially impact a community’s resilience, helping to curtail expensive, unplanned and reactive maintenance, organizations can prevent disruptions before becoming hazards – so life goes on uninterrupted.
-
Product
Dual Projection 3D In-Line Solder Inspection System
KY8030-2
-
The new KY8030-2 delivers 2x fasterinspection without compromising performanceand accuracy.Using patented dual projection, the systemeliminates the critical Shadow problem thatall 3D SPI systems can be vulnerable to.Easy UI and SPC Plus are included in the systempackage in order to help users achieve faster& easier printer process optimization
-
Product
Cybersecurity Penetration Testing Assessments
Tripwire Professional Services
-
Organizations do all that they can to protect their critical cyber assets, but they don’t always systematically test their defenses. Penetration tests—otherwise known as pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems. Whether we are testing an application or network environment, Tripwire’s pen testing will not only identify vulnerabilities, but it will also demonstrate them through exploitation—definitively determining if unauthorized access or other malicious activity is possible.
-
Product
Secure Hardened Android Phone
-
Shoghi has designed a totally Secure Hardened Android phone, which comes with a Specialized Operating system to prevent Hackers from remotely compromising your device , from all major vulnerabilities and exploits including protection from zero-days.
-
Product
Crypto Libraries Test Suite open source
Project Wycheproof
-
A set of security tests for identifying cryptographic vulnerabilities. Project Wycheproof tests crypto libraries against known attacks.
-
Product
SST Security Assessment
-
Self-Service Terminal (SST) penetration testing is an activity which identifies vulnerabilities in SST that may potentially exist due to the lack of physical security measures, technical configuration or process controls.
-
Product
Static Code Analysis for Embedded Software
GrammaTech CodeSonar®
-
CodeSonar is GrammaTech´s flagship static analysis software. Able to analyze both source code and binary code, it is specifically designed for zero-tolerance defect environments. With its advanced static analysis engine, CodeSonar is one of the most effective tools for eliminating the most costly and hard-to-find software defects early in the application development lifecycle. Compared with other tools, CodeSonar identifies twice as many defects that result in system crashes, leaks, data races, memory corruptions and security vulnerabilities.
-
Product
Processor IP
Security
-
Security IP designed to protect against a variety of different vulnerabilities.
-
Product
Static Analyzer
Julia
-
Julia Static Analyzer is best in class for finding defects and security vulnerabilies in C#, Java and Android applications (for C and C++ languages, please have a look to GrammaTech CodeSonar). By using Julia Static Analyzer, you reduce development and maintenance costs and eliminate risks related to security vulnerabilities and privacy leaks. The powerful analysis technology ensures a maximum precision of results. With advanced dashboarding you can flexibly transform the data into useful information for the different stakeholders.
-
Product
Telecom, Embedded Hardware-S/W Systems
-
Network Penetration Testing is a technique that identifies security vulnerabilities in the application by applying different malicious processes to break network security.
-
Product
Autonomous PNT Performance and Vulnerability Test Suite
PANACEA
-
PANACEA is an autonomous GNSS performance and threat environment simulator system designed to control simulation hardware and collect data from up to 32 GNSS receivers simultaneously.
-
Product
Multi-frequency, Multi-GNSS Simulator
GSS7000
-
The GSS7000 offers exceptional accuracy, fidelity and authentic GNSS signal emulation, ensuring true performance at every test stage. Advance features include embedded multipath, interference, and spoofing capabilities that deliver comprehensive vulnerabilities testing.




























