Cyber Security
See Also: Cyber, Phishing, Pen Testing, DDoS
-
Product
SQL Secure
-
SQL Secure dramatically reduces the complexity and manual effort required to analyze, audit, and manage SQL Server security. It allows Database Administrators (DBAs) to confidently answer the critical question: “Who has access to what, where, and how?”—across on-premises and cloud-based SQL Server environments.
-
Product
Hardware Security Testing
-
Day by day, security threads are increasing and now enemies are able to access all data through adding small components of hardware devices to personal devices like mobiles, laptops, and etc.Also, software can be patched, but hardware can never be easily updated; thus, security flaws are increasing dramatically day by day
-
Product
Cyber Protection System
-
Raytheon’s Cyber Protection System enables enterprises to go beyond traditional CSOC monitoring and establish a response center capable of situational awareness, proactive defense and rapid response. Cyber test ranges: Test the cyber resilience of hardware, software, and networks. Penetration/Malware/Forensics Fly Away Kits: Provide mobile environments to perform testing and analysis at remote facilities. Lab environments: Analyze malware, perform penetration testing and conduct forensics at enterprise scale so analysts can determine the best way to manage them.
-
Product
Powered by Intel® E830 delivers 200GbE connectivity, ideal for AI workloads and data centers network security application
NMC-6005
Network Mezzanine Card
1 x Intel E830-CCAM11 port x 200GbE QSFP56 or 2 ports x x 100GbE QSFP281 x PCIe x8, Gen5Support CE/ FCC, RoHS Compliant Front
-
Product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 1GE/10GE Appliance
-
Keysight Network Applications and Security
PerfectStorm ONE facilitates network and security proof-of-concepts (POCs) and assessments, all in a compact device. This POC-in-a-box enables enterprises and service providers to select optimal devices and right-size data centers, as well as providing device vendors with a platform to fully showcase their product’s performance, resiliency, and throughput under realworld traffic loads.
-
Product
Network Security Validation Platform
FireDrill
-
AttackIQ FireDrill is a game changing platform that seamlessly integrates into any existing network, delivering immediate visibility into your security program so you can mitigate risk, and maximize security ROI.
-
Product
Multi-Protocol Wireless Application Networking System with Open, Integrated, Secure & Scalable System for Data Aggregation & Viewing
Ion
-
Jacobs’ vendor agnostic architecture was designed and implemented with the goal of an open Industrial Internet of Things (IoT) solution. ion© adapts and applies technology that enables our customers to gain efficiencies and savings, through connecting our client’s sites then collecting and displaying data in a unified interface. This provides custom insights to our clients, empowering them to ensure safety and respond quickly. The Jacobs ion© solution has been operationally deployed for over a decade and enables innovative approaches for data accuracy, data timeliness, and safety — greatly improving information flow and productivity.
-
Product
Network Security
TrustMonitor™
-
TrustMonitor™ provides continuous monitoring of the trust network by:*(Analyzing content & constraints for validity of credentials*Monitoring that certificate authorities are available to support validation*Easily scaling to incorporate new certificate authorities (no agent required)
-
Product
Modernized Navstar Security Algorithm (MNSA) M-code Testing
SimMNSA
-
The M-code signal is part of the security architecture that all new Military GPS User Equipment (MGUE) has been required to use since 2017. Until recently, testing with non-classified AES-encryption and replay of M-code Satellite Data Sets (SDS) have been the only methods authorized for GPS M-code receiver testing using a constellation simulator.
-
Product
Tabletop Network Appliance With AMD Ryzen™ Embedded V3000 Processors For Network Security Applications.
FWA-1081
Network Appliance
AMD Ryzen™ V3C44/V3C48, up to 8 cores/16 threads, 2 x DDR5 SODIMM slots, up to 64GB. Up to 12 x GbE RJ45, 2 x 2.5GbE RJ45, 4 x 10GbE SFP+, with 2 pairs LAN bypass, Support for 4G LTE/5G modules through the RF kit (optional) With clock speeds of 3.2/3.5 GHz, CPU outperforms similar desktop models.
-
Product
IT Security & Anti-Virus Testing Services
-
The AV-TEST Institute is a leading international and independent service provider in the fields of IT security and anti-virus research. The aim of the research work carried out by AV-TEST is to directly detect the latest malware, to analyse it using state-of-the-art methods and to inform our customers of the top-quality results obtained.
-
Product
Quantum-Safe Security
CN6000 Series
-
The Centauris CN6000 encryptors may be upgraded to quantum cryptography through the addition of the Cerberis Quantum Key Distribution (QKD) server to ensure that the solutions are quantum-safe for the long-term protection of sensitive data. This also ensures investment-protection of the encryptors. Such quantum cryptography is provably secure, ensures anti-eavesdropping detection and provides long-term forward secrecy against brute force hacking and attacks by quantum computers.
-
Product
Communication Security
-
Shoghi Communications design and development specific Military Grade Crypto System , Shoghi provids end-to-end communication Security (COMSEC) and secure information transfer. Shoghi has strong experience in creating customer specific Algorithms and Key management schemes. All the hardware, inspite of all the complexities can be loaded by the customer themselves with their own algorithm, to enhance the whole security environment.We are known for our open source designs and crypto validated equipment supply to our military customers. In case of any specific design or development, please feel free to get in touch with our team
-
Product
Visible PTZ Security Cameras
Quasar™ 4K IR PTZ Cameras
-
With crisp 4K video resolution, on-board long-range IR illumination, and 22x or 31x optical zoom options, FLIR Quasar™4K IR PTZ cameras deliver critical situational awareness. Exceptional field of view gives operators the ability to seamlessly monitor key details throughout large areas. The combination of high-performance optics and sensors, exceptional low light visible imaging, and effortless integration with all major third-party VMS and FLIR United VMS makes Quasar 4K IR PTZ cameras an ideal solution for critical infrastructure sites and remote facilities that require close monitoring.
-
Product
E2E Security Connector
-
The E2E Security Connector is a cloud solution for enhancing the security level of your system. It provides secure generation and management of confidential data during the pre-personalization process of your connected devices as well as different protection schemes for its application and data transportation layer.
-
Product
Secure Hardware Platforms
-
With our STSECURE portfolio, STMicroelectronics offers secure microcontrollers that answer the market needs for advanced security. We deliver hardware-certified solutions based on advanced flash technology, with our latest generation implementing an ARM® SecurCore® processor.
-
Product
Checkpoint Security System
ConneCT
System
The ConneCTTM Checkpoint Security System is an advanced aviation security explosive detection system (EDS) engineered to deliver superior threat detection, dramatically improved passenger throughput, and low total cost of ownership.
-
Product
Thermal Analytics Security Camera
Elara™ FB-Series ID
-
The FLIR Elara™ FB-Series ID thermal security camera uses onboard analytics to classify human or vehicular intrusions, making it ideal for perimeter intrusion detection and sterile-zone monitoring. The Elara™ FB-Series ID can also hand off classified intrusions to FLIR PTZ cameras for autonomous tracking of intruders. Easy to set up, Elara™ FB-Series provide reliable detection with low false alarm rates in challenging environments, bad weather, and complete darkness.
-
Product
Voice Systems for Safe, Secure, & Efficient Communications
-
Rohde & Schwarz offers flexible and cost-effective communications system solutions that meet all scalability and reliability requirements for civil and defense use cases regardless of the application domain - in the air, on the ground or at sea Multi-redundant, IP based voice communications systems ensure safe, secure and efficient voice communication, combining state-of-the-art, flexible and resilient IP based architecture with strong security mechanisms.
-
Product
1U Network Appliance For SD-WAN & AI Security Based On Intel® Xeon® 6 Series Processor.
FWA-3052
Network Appliance
Single Intel® Xeon-D® 6 processors, up to 42 cores4 x DDR5 RDIMM memory, up to 512GB2 x M.2 2280 NVMe SSD1x FH/FL double deck or 2x FH/FL single deck (FWA-3052E)2 x Advantech network module expansions w/ PCIe Gen5 (FWA-3052)2 x 1GbE, 8 x 2.5GbE, 4 x 25G/10G SFP28Intel® QAT with up to 200G crypto support
-
Product
Power, Environmental, Security & Connectivity Hardware
-
Panduit power distribution, environmental, and connectivity hardware products improve availability, scalability, power, cooling efficiency, and product quality, which also minimizes network downtime and increases data center productivity.
-
Product
Trusted & Secure Servers
-
A part of the EnterpriseSeries™ product line, Mercury’s RES Trust servers employ U.S. designed and manufactured motherboards with embedded Intel® processors and composable BuiltSECURE™ framework to deliver trusted performance for the most security-imperative mission critical applications. RES Trust servers can be configured with a variety of nation-state-level security features. System security features enable customer Foreign Military Sales (FMS) or Direct Commercial Sales (DCS) program success.
-
Product
1U Rackmount Network Appliance With AMD EPYC™ 8004 Series Processor For NFV And SD-WAN. Ideal For High-Performance Network Security.
FWA-5082
Network Appliance
Up to 64 cores for NFV needs with single AMD EPYC™ 8004 Series processorsUp to 12 DDR5 RDIMM memory to boost computing capability4 x NMC with PCIe Gen5 for networking (Compatible with Gen4 & Gen3)High availability system with redundant solutionsManaging system with Advantech in-house IPMI firmware. (Comply with Redfish 1.14.1)
-
Product
1U Rackmount Network Appliance With 4th/5th Generation Intel® Xeon® Scalable Processor For NFV And SD-WAN. Ideal For Enterprise Network Security.
FWA-5072
Network Appliance
Single 4th/5th Gen Intel® Xeon® Scalable Processors, up to 60 Cores16 x DDR5 ECC RDIMM slotsHot-swap system fan and redundant PSU, 2 x Internal 2.5" disk bays, 1 x HH/HL PCIe Gen4 x16 slotIntel® QAT with up to 200G crypto supportIPMI v2.0 compliant with web interface4 x Advantech network module expansions w/ PCIe Gen5 bandwidth
-
Product
Thermal Analytics Security Camera
ELARA™ FC-Series ID
-
The Elara FC-Series ID is a premium FLIR thermal security camera for perimeter protection. The Elara FC-Series ID includes onboard video analytics capable of classifying human or vehicular intrusions, resulting in fewer false alarms.The Elara FC-Series ID also offers a wide range of high-performance lenses and multiple resolutions, giving greater flexibility in tailoring security systems to specific site conditions.
-
Product
3U VPX Virtual Secure Router
VSR347D
-
The VSR347D takes advantage of Abaco’s SBC347D hardware with an optimized environment running Juniper Networks’ vSRX Virtual Firewall, providing high levels of network security and performance in a single 3U VPX slot.
-
Product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 10GE/40GE Appliance
-
Keysight Network Applications and Security
Building upon the terabit-scale PerfectStorm platform, PerfectStorm ONE™ appliances offers enterprises, service providers, and technology vendors a revolutionary solution for generating stateful applications and malicious traffic, simulating millions of real-world end-user environments to test and validate infrastructure, a single device, or an entire system.




























