-
Product
Cloud Security
-
Cloud Security Assessment is the most critical phase before the product is finally deployed and Product is finally ready to handle real-world cyber security threats.
-
Product
Network Security
TrustMonitor™
-
TrustMonitor™ provides continuous monitoring of the trust network by:*(Analyzing content & constraints for validity of credentials*Monitoring that certificate authorities are available to support validation*Easily scaling to incorporate new certificate authorities (no agent required)
-
Product
Quantum-Safe Security
CN4000 Series
-
The CN4000 series are the ideal optimized, high-performance encryptors for Small to Medium Enterprises (SME). They also enable an ideal cost effective “encrypt everywhere” solution for Large Enterprises. Despite their small form-factor, the CN4000 Series encryptors have the same robust security credentials as the rack-mounted models.
-
Product
Security Testing
-
Security/negative testing is typically conducted during development to highlight how a DUT handles abnormal conditions like very high traffic load, different frame sizes (incl. undersized and oversized frames), framed with different IFG settings, various types of errors and deviation of the signal frequency, as well as various DDoS attacks.
-
Product
Security Testing
-
For an application to be successful, it has to ensure the security of the customer’s data, which in turn helps to gain the trust of the customers, avoid legal battles, and enables growth in business.
-
Product
Thermal Analytics Security Camera
Elara™ FB-Series ID
-
The FLIR Elara™ FB-Series ID thermal security camera uses onboard analytics to classify human or vehicular intrusions, making it ideal for perimeter intrusion detection and sterile-zone monitoring. The Elara™ FB-Series ID can also hand off classified intrusions to FLIR PTZ cameras for autonomous tracking of intruders. Easy to set up, Elara™ FB-Series provide reliable detection with low false alarm rates in challenging environments, bad weather, and complete darkness.
-
Product
Hybrid Network Security Policy Management
AlgoSec Cloud
-
Across cloud, SDN, on-premises and anything in between - one platform to manage it all.
-
Product
Security and Traffic Monitoring System
-
Information System Technologies Inc.
ISTI’s versatile sensor nodes can support multiple sensing types including acoustic, seismic, visible/IR, and scanning laser. Several eye-safe scanning lasers form a distributed wireless sensor network and can continuously and accurately track as well as monitor ground vehicles and personnel in a surveillance area. This system provides super-fine angular and range resolution to precisely locate moving targets. Among other key benefits are: day/night operational capability, continuous monitoring and surveillance without blind spots, 360 degrees field-of-view, large coverage area, multiple closely spaced target tracking, threat classification, and automatic alarm generation. The system can be used in applications such as traffic monitoring, intrusion detection, border control, airport runway collision and incursion avoidance, and perimeter security.
-
Product
Embedded Security
-
Efficient, reliable, and intuitive: The world-leading end-to-end embedded security builder.
-
Product
App and API Security
-
Defend against a wide range of multi-vector attacks. Intelligent protection, end to end.
-
Product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 1GE/10GE Appliance
-
Keysight Network Applications and Security
PerfectStorm ONE facilitates network and security proof-of-concepts (POCs) and assessments, all in a compact device. This POC-in-a-box enables enterprises and service providers to select optimal devices and right-size data centers, as well as providing device vendors with a platform to fully showcase their product’s performance, resiliency, and throughput under realworld traffic loads.
-
Product
Visible Security Cameras - Specialized Cameras
-
Teledyne FLIR's Specialized Visible Security Cameras
-
Product
API Security Testing
-
Nowadays, APIs are frequently used for communication between two applications. In this communication, lots of sensitive data is transferred between devices and the server.In order to be protected in the event of a data loss or attack, we must secure our API.
-
Product
1U Network Appliance With 12th/13th/14th Gen Intel® Core Processors For Network Security And Management For Network Security Applications.
FWA-3034
-
12th/13th/14th Gen Intel Core Processors, up to 24 Cores/32 Threads, Hybrid Performance & Efficiency CoresDDR5 UDIMM with up to 64GB2 x 1GbE SFP, 8 x 2.5GbE RJ-45, 2 x 10GbE SFP+ with two pairs of LAN bypass2 x internal 2.5” SATA SSDs/HDDsIPMI v2.0 compliant BMC1 x Advantech network module expansion
-
Product
Cyber Security Testing Services
-
Cyber security testing is often also referred to as pen testing or penetration testing. Such tests validate the cyber security defences of your applications, network infrastructure and even your team members. Our cyber security testers are highly trained and certified ethical hackers.
-
Product
Fixed Surveillance System for Perimeter Security
Argus
-
Argus is a fixed, rugged, preconfigured wide area surveillance system. Combining a best-in-class radar and thermal camera with Command and Control software, Argus is designed to detect and track multiple threats both near and far in the most demanding weather conditions 24 /7. When compared to other perimeter security solutions, Argus has the lowest initial cost per kilometer of secured space as well as the lowest lifetime cost.
-
Product
Checkpoint Security System
ConneCT
System
The ConneCTTM Checkpoint Security System is an advanced aviation security explosive detection system (EDS) engineered to deliver superior threat detection, dramatically improved passenger throughput, and low total cost of ownership.
-
Product
Security Testing
-
We protect your business from cyber attacksSecure online transactionsPrevent unauthorized accessMinimize the risk of data lossEnhance resistance to DoS attacks
-
Product
Security Testing Services
-
You're building more-complex software faster than ever before, but does your team have sufficient application security skills and resources to test it for security defects? Synopsys security testing services provide continuous access to security testing experts with the skills, tools, and discipline needed to cost-effectively analyze any application, at any depth, at any time.
-
Product
Cyber Security Assessment
-
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
Product
Security Vehicles
-
When you need to set up robust security operations in a temporary or outdoor location, our security vehicles can provide a tried and tested solution. For use at festivals, public ceremonies, sports events and other outdoor functions, our mobile check point and scan truck will help keep your guests or members of the public safe from security threats.
-
Product
Cyber Security/Network Security Training
-
Stratign’s Cyber Security/Network Security Training provides cybersecurity professionals with foundational, intermediate, and advanced security skills imparted through experts in the field.
-
Product
Security Labs
-
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
Product
SST Security Assessment
-
Self-Service Terminal (SST) penetration testing is an activity which identifies vulnerabilities in SST that may potentially exist due to the lack of physical security measures, technical configuration or process controls.
-
Product
Network Security Object Management - AlgoSec AddOns
ObjectFlow
-
Manage network security objects across your entire multi-vendor network.
-
Product
E2E Security Connector
-
The E2E Security Connector is a cloud solution for enhancing the security level of your system. It provides secure generation and management of confidential data during the pre-personalization process of your connected devices as well as different protection schemes for its application and data transportation layer.
-
Product
Cross Domain Security Solutions
-
Stratign’s Cross Domain Security Solutions are highly trusted, government-accredited network security components that control and, if necessary, block the flow of data between two security domains at all layers.
-
Product
Quantum-Safe Security
CN8000 Series
-
The CN8000 harnesses the power of quantum mechanics to help ensure secure communications – the encryption keys are generated by IDQ’s Quantum Random Number Generator to guarantee inherent and provable randomness. The CN8000 can also be upgraded to be quantum-safe via the Cerberis QKD Blade (quantum cryptography) to ensure long-term protection of the data in transit.





























