-
Product
Security Products
-
Security is no longer an option; it’s a requirement. As your trusted provider of platform security solutions, our comprehensive portfolio addresses a variety of threat models.
-
Product
Security Devices
-
Schweitzer Engineering Laboratories, Inc.
Security devices protect perimeters and secure communications within LANs.
-
Product
Global Security Cameras
-
Our products optimize the reaction time and push the operational envelope!
-
Product
Hipot & Security Tester
-
Safety testers (also called hipot testers) ensure the safe use of test items in different working environments and under different operating conditions. There are a variety of solutions, depending on the tests required to meet the relevant industry standards. Many test units offer a combination of functionality and performance.
-
Product
Security Testing
-
As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.
-
Product
Hardware Security Testing
-
Day by day, security threads are increasing and now enemies are able to access all data through adding small components of hardware devices to personal devices like mobiles, laptops, and etc.Also, software can be patched, but hardware can never be easily updated; thus, security flaws are increasing dramatically day by day
-
Product
E2E Security Connector
-
The E2E Security Connector is a cloud solution for enhancing the security level of your system. It provides secure generation and management of confidential data during the pre-personalization process of your connected devices as well as different protection schemes for its application and data transportation layer.
-
Product
Quantum-Safe Security
CN9000 Series
-
The Centauris CN9000 Series is the first commercially available certified high-assurance 100Gbps Ethernet encryptor that supports the most complex fully meshed topologies – enabling 100% security for Big Data, Cloud and data centre services’ ultra-fast networks.
-
Product
Security Testing
-
Security/negative testing is typically conducted during development to highlight how a DUT handles abnormal conditions like very high traffic load, different frame sizes (incl. undersized and oversized frames), framed with different IFG settings, various types of errors and deviation of the signal frequency, as well as various DDoS attacks.
-
Product
Cloud Security Testing
-
Using a cloud infrastructure is no more a new phenomenon in the digital world. Businesses use it as a basic practice now a days due to numerous benefits associated with it. Hence, it should be a top most priority for the businesses to secure their cloud infrastructure as that’s the nucleus of their business from all aspects. In cloud security testing, the cloud infrastructure is screened to identify security risks and the areas which can be exploited by the attackers. Cloud security testing is mainly performed to ensure that cloud infrastructure can protect the confidential information of an organization. QA Mentor adopts three different approaches during the cloud security testing process:
-
Product
Defense & Security
-
Protecting populations from nuclear risk. Our instruments precisely detect and monitor radiation in the most critical and challenging situations, empowering military and civil defense teams to keep populations safe.
-
Product
Security Testing Services
-
You're building more-complex software faster than ever before, but does your team have sufficient application security skills and resources to test it for security defects? Synopsys security testing services provide continuous access to security testing experts with the skills, tools, and discipline needed to cost-effectively analyze any application, at any depth, at any time.
-
Product
Network Security
-
PLANET Network Security solution is designed to build a strong and secure network for any commercial and industrial environments. By providing functions like cybersecurity, SPI firewall, VPN, IDP, antispam and antivirus, this collection includes VPN Security Gateway, 5G NR Gateway, Flat-type Smart Router, UTM Content Security Gateway and Wireless VPN Routers. A variety of product lines can satisfy all the demands of enterprises, SMBs, factories, communities and more for the network security including remote management and surveillance of IoT, IIoT and building automation applications.
-
Product
Thermal Analytics Security Camera
ELARA™ FC-Series ID
-
The Elara FC-Series ID is a premium FLIR thermal security camera for perimeter protection. The Elara FC-Series ID includes onboard video analytics capable of classifying human or vehicular intrusions, resulting in fewer false alarms.The Elara FC-Series ID also offers a wide range of high-performance lenses and multiple resolutions, giving greater flexibility in tailoring security systems to specific site conditions.
-
Product
Checkpoint Security System
ConneCT
System
The ConneCTTM Checkpoint Security System is an advanced aviation security explosive detection system (EDS) engineered to deliver superior threat detection, dramatically improved passenger throughput, and low total cost of ownership.
-
Product
Quantum-Safe Security
CN6000 Series
-
The Centauris CN6000 encryptors may be upgraded to quantum cryptography through the addition of the Cerberis Quantum Key Distribution (QKD) server to ensure that the solutions are quantum-safe for the long-term protection of sensitive data. This also ensures investment-protection of the encryptors. Such quantum cryptography is provably secure, ensures anti-eavesdropping detection and provides long-term forward secrecy against brute force hacking and attacks by quantum computers.
-
Product
Modernized Navstar Security Algorithm (MNSA) M-code Testing
SimMNSA
-
The M-code signal is part of the security architecture that all new Military GPS User Equipment (MGUE) has been required to use since 2017. Until recently, testing with non-classified AES-encryption and replay of M-code Satellite Data Sets (SDS) have been the only methods authorized for GPS M-code receiver testing using a constellation simulator.
-
Product
Intelligent Chatbot for Network Security Policy Management
AlgoBot
-
AlgoBot, is an intelligent chatbot that handles network security policy management tasks for you. AlgoBot answers your questions, submitted in plain English, and personally assists with security policy change management processes – without requiring manual inputs or additional research.
-
Product
Quantum-Safe Security
CN8000 Series
-
The CN8000 harnesses the power of quantum mechanics to help ensure secure communications – the encryption keys are generated by IDQ’s Quantum Random Number Generator to guarantee inherent and provable randomness. The CN8000 can also be upgraded to be quantum-safe via the Cerberis QKD Blade (quantum cryptography) to ensure long-term protection of the data in transit.
-
Product
NETWORK SECURITY
-
Network Critical Solutions Limited
Network Critical gives all your security systems complete, uncompromising visibility into what’s happening on the network. Get better overall ROI by improving performance of existing security systems to keep pace with increasing network speed and complexity, while gaining the insight needed to better detect, contain and recover from breaches fast.
-
Product
Network Security Appliances
-
With the development and popularization of cloud computing technologies, traditional network security providers are repositioning and moving their development efforts from network security solutions that can only handle single point security issues to a new generation of network security solution that are effective in big data and cloud computing environments. ICT equipment providers in the network security industry need network security servers that have massive DPI parsing power, full support for NFV and SDN, and a powerful big data processing engine. This equipment must also support dynamic capacity expansion and scalable IO extension in order to adapt to a more complicated cloud environment.
-
Product
Security Testing Service
-
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
Product
Industrial & Security
-
Kromek's custom configurations of Cadmium Zinc Telluride (CZT) based detector tiles and linear arrays can be implemented into custom Advanced Imaging platforms for various Industry and Security applications.
-
Product
Virtualized Security Resilience Testing
BreakingPoint VE
-
Keysight Network Applications and Security
Ixia BreakingPoint Virtual Edition (VE) provides real-world application and threat simulation for complete performance and security testing, and its elastic deployment model allows you to achieve security resilience without sacrificing scalability or flexibility.
-
Product
Control, Monitor, Security and Power Management for ATEs
-
Subset of 6TL's FastATE modules designed for the control, monitoring, security, and power management of ATEs (automated test equipment).
-
Product
Security Vehicles
-
When you need to set up robust security operations in a temporary or outdoor location, our security vehicles can provide a tried and tested solution. For use at festivals, public ceremonies, sports events and other outdoor functions, our mobile check point and scan truck will help keep your guests or members of the public safe from security threats.
-
Product
Network Security
TrustMonitor™
-
TrustMonitor™ provides continuous monitoring of the trust network by:*(Analyzing content & constraints for validity of credentials*Monitoring that certificate authorities are available to support validation*Easily scaling to incorporate new certificate authorities (no agent required)
-
Product
Communication Security
-
Shoghi Communications design and development specific Military Grade Crypto System , Shoghi provids end-to-end communication Security (COMSEC) and secure information transfer. Shoghi has strong experience in creating customer specific Algorithms and Key management schemes. All the hardware, inspite of all the complexities can be loaded by the customer themselves with their own algorithm, to enhance the whole security environment.We are known for our open source designs and crypto validated equipment supply to our military customers. In case of any specific design or development, please feel free to get in touch with our team
-
Product
Power, Environmental, Security & Connectivity Hardware
-
Panduit power distribution, environmental, and connectivity hardware products improve availability, scalability, power, cooling efficiency, and product quality, which also minimizes network downtime and increases data center productivity.





























