-
Product
Security Testing
-
We protect your business from cyber attacksSecure online transactionsPrevent unauthorized accessMinimize the risk of data lossEnhance resistance to DoS attacks
-
Product
Security Policy Change Automation
FireFlow
-
Confidently automate your security policy change process - from planning through risk analysis, implementation and validation.
-
Product
Industrial & Security
D-Matrix
-
The D-Matrix Gamma Ray Imager is a fully integrated, photon-counting, pixilated, 12-bit energy discriminating CZT detector/imager.
-
Product
Security Consulting
-
Our Managed Security Services can dramatically improve your ongoing security posture through more frequent, cost effective security assessments, helping you to identify, assess and manage risk.
-
Product
Cyber Security and Digital Data Protection
-
As security demands evolve, Applied Computer Technologies provides a layered and progressive approach to security. Organizations without a sufficient security footprint are being affected and held ransom, operations disrupted, and business reputations damaged. We've partnered with some amazing and innovative companies to offer our clients the best cyber security and protection available today. Our integrated security products include next generation firewalls; ransomware and crypto malware; secure connectivity; Email, encryption, archiving, and SPAM filtering; Web and content filtering; and data integrity & theft prevention.
-
Product
API Security Testing
-
In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:
-
Product
Security Labs
-
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
Product
100GbE Application and Security Load Module
PerfectStorm 100GE 1-Port Load Module
-
Keysight Network Applications and Security
PerfectStorm is a highly modular hardware test platform enabling equipment providers, service providers and enterprises the ability to create real-world, high-stress conditions and user behavior to push new equipment and networks to their limits.
-
Product
Visible Security Cameras - Specialized Cameras
-
Teledyne FLIR's Specialized Visible Security Cameras
-
Product
Embedded Security
-
Efficient, reliable, and intuitive: The world-leading end-to-end embedded security builder.
-
Product
API Security Testing
-
Nowadays, APIs are frequently used for communication between two applications. In this communication, lots of sensitive data is transferred between devices and the server.In order to be protected in the event of a data loss or attack, we must secure our API.
-
Product
Network Security Testing
-
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
Product
Thermal Security Camera with Onboard Analytics
Triton™ F-Series ID
-
The FLIR Triton™ F-Series ID thermal security cameras set the new standard of perimeter protection for critical infrastructure. The Triton F-Series ID features best-in-class thermal imaging detail and high-performance onboard analytics for classifying human or vehicular intrusions. FLIR’s premium line offers five models with full 640 × 480 thermal resolution, longer detection ranges, and better analytics performance than ever before.
-
Product
Application Security Testing Solution
CxIAST
-
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.
-
Product
SST Security Assessment
-
Self-Service Terminal (SST) penetration testing is an activity which identifies vulnerabilities in SST that may potentially exist due to the lack of physical security measures, technical configuration or process controls.
-
Product
Visible Security Cameras - Bullet Cameras
-
Teledyne FLIR Visible Security Cameras, Bullet Cameras
-
Product
App and API Security
-
Defend against a wide range of multi-vector attacks. Intelligent protection, end to end.
-
Product
Industrial Grade Cyber Security Appliance Based On Intel® Atom™ X5-E3940/ X5-E3930 Processor For Network Security Applications.
FWA-1211
-
Intel® Atom™ x5-E3940 with x5-E3930 Processor, IP40, Fanless design, -40~70℃ wide temperature. 4 x 1GbE RJ-45 with 2 segments of LAN bypass, 2 x 1GbE SFP ports (optional) Dual power input: 9~36 V.
-
Product
Visible PTZ Security Cameras
Quasar™ 4K IR PTZ Cameras
-
With crisp 4K video resolution, on-board long-range IR illumination, and 22x or 31x optical zoom options, FLIR Quasar™4K IR PTZ cameras deliver critical situational awareness. Exceptional field of view gives operators the ability to seamlessly monitor key details throughout large areas. The combination of high-performance optics and sensors, exceptional low light visible imaging, and effortless integration with all major third-party VMS and FLIR United VMS makes Quasar 4K IR PTZ cameras an ideal solution for critical infrastructure sites and remote facilities that require close monitoring.
-
Product
Security Testing Service
-
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
Product
PICMG 1.3 Full-size CPU Card With LGA1150 4th Gen Intel® Core™ I7/i5/i3 Processor, Intel® Q87, SATA3, USB 3.0, DVI-D, VGA, DisplayPort And Dual LAN
SHB130
-
The PICMG 1.3 full-size CPU card, SHB130, designed for the new architecture 4th Generation Intel® Core™ processors (codename: Haswell/Haswell Refresh) with Intel® Q87 chipset on 22nm technology using LGA1150 socket. The outstanding SHB130 with new Intel® architecture delivers up to double the graphics performance over the previous generation. The new graphics solution has high levels of integration to enable new form factors and designs with excellent visual quality built in. In addition, The PICMG 1.3 full-size CPU card comes with two DDR3 1333/1600 MHz unbuffered ECC DIMM slots up to 16 GB of system memory and six SATA 6Gbps ports with RAID 0, 1, 5, 10. The PCI Express 2.0 available on the new Intel® Core™ processor provides flexible x16, x4 or x1 lanes for versatile applications. The high performance SHB130 with improved graphics ability is ideal for applications such as network security, storage server, POS, kiosk, medical, gaming, digital signage, and surveillance security monitoring.
-
Product
Software Testing Services
-
Our test offerings include TCoE, Testing on Cloud, Entererprise Mobility Testing, Big Data Testing, Functional, Automation, Security and Performance Testing services. Our workforce is equally distributed between NA & India with a vision to be your local partner. Cigniti''''''''s SMART Tools and Cloud Enabled test labs provide cost effective solutions with early Return on Investments. Cigniti is rated at CMMI SVC V1.3 Maturity Level 3 and is an ISO 27001:2005 certified organization.
-
Product
PocketDetect LRM
PD-01LM
-
Hachmann Innovative Elektronik
With a PocketDetect LRM you have a highly specialized, miniaturized and easy-going voltage detector at your fingertips. A thorough self-test ensures reliable function. A permanently enabled interface-tester warns against defect interfaces or residual voltages, while the low-power long-term display mode secures live working. The PocketDetect can be carried along due to its diminutive dimensions and lightweight (e.g. in the optional available belt case).
-
Product
Cybersecurity and Compliance Solution
Application Audit
-
Application Audit, Compuware's mainframe cybersecurity and compliance solution, enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Using Application Audit, security staff can: Deter insider threats by capturing and analyzing start-to-finish user session activity. Integrate user behavior intelligence with popular SIEM engines to analyze the overall application environment. Support criminal/legal investigations with complete and credible forensics. Fulfill compliance mandates regarding protection of sensitive data. The Value of Application Audit. Provides deep insight into user behavior including data viewed, by whom and which applications were used to access it. Enables immediate analysis through the automatic delivery of data to SIEM platforms such as Splunk and QRadar, either directly or in combination with CorreLog zDefenderTM for z/OS or Syncsort Ironstream. Delivers granular intelligence and reporting capabilities needed to comply with regulations such as HIPAA and GDPR as well as security policies. Eliminates dependency on specialized mainframe knowledge. Separates the system administrator's duties from mainframe-inexperienced auditor's responsibilities with a web UI, so that no single person is in a position to engage in malicious activities without detection.
-
Product
IP Link Pro Control Processors
-
Ethernet-enabled control processors with enhanced speed, security, and memory
-
Product
Wire And Cable
-
Chengdu Mengsheng Electronics Co., Ltd.
We provide a variety of wire and cable products, including insulated wires, power cords, stranded wires, solid wires, wiring harnesses and connectors. Our products are widely used in security, medical, communications, instrumentation, medical, home appliances, auto parts, military, aerospace and other industries. Our products strictly comply with the product certification standards of countries and regions such as UL in the United States, VDE in Germany, CE in the European Union, and BS in the United Kingdom.
-
Product
MS-M 3-Pin RF Cable to SMB, 0.5m
40-979-503-0.5m-SMB
RF Cable Assembly
The MS-M RF 3-Pin cable assembly is constructed from RG178 Silver Plated Copper Clad Steel Wire with PVC insulation and an attenuation of 1.08dB/m at 400MHz. Screwlocks are provided to secure the MS-M connector to the associated product.
-
Product
20-Pin GMCT Cable, Female to Unterminated, Cut Ends, 16A, 2m
A020GFR-C-1B200
Cable Assembly
The 16A 20-Pin GMCT cable assembly is constructed from 19/0.41 (14AWG) Copper Wire with PFA 500V insulation. Screwlocks are provided to secure the connector to associated product. The unterminated connections are coded to match the connector pin designation and include crimped on ferrules to ensure the wire strands cannot break when they are terminated.





























