Filter Results By:
Products
Applications
Manufacturers
Application Security
vulnerabilities identification and remediation software.
-
product
Application Security Testing Solution
CxIAST
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.
-
product
100GE Application & Security Test Load Module
CloudStorm
Keysight Network Applications and Security
Ixia's CloudStormTM is an industry-first 2.4 terabit application and security test solution that not only meets today’s need, but that of the future. CloudStorm delivers 3X-application and 4X-SSL-emulation scale over any other test system. It helps NEMs shortening their development cycles, and enterprises and data center operators find the right balance between mitigating security risks and delivering high end-user application performance. Emulate multi-terabit DDoS and botnet attacks to future-proof security solutions
-
product
Cybersecurity and Compliance Solution
Application Audit
Application Audit, Compuware's mainframe cybersecurity and compliance solution, enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Using Application Audit, security staff can: Deter insider threats by capturing and analyzing start-to-finish user session activity. Integrate user behavior intelligence with popular SIEM engines to analyze the overall application environment. Support criminal/legal investigations with complete and credible forensics. Fulfill compliance mandates regarding protection of sensitive data. The Value of Application Audit. Provides deep insight into user behavior including data viewed, by whom and which applications were used to access it. Enables immediate analysis through the automatic delivery of data to SIEM platforms such as Splunk and QRadar, either directly or in combination with CorreLog zDefenderTM for z/OS or Syncsort Ironstream. Delivers granular intelligence and reporting capabilities needed to comply with regulations such as HIPAA and GDPR as well as security policies. Eliminates dependency on specialized mainframe knowledge. Separates the system administrator's duties from mainframe-inexperienced auditor's responsibilities with a web UI, so that no single person is in a position to engage in malicious activities without detection.
-
product
100GbE Application and Security Load Module
PerfectStorm 100GE 1-Port Load Module
Keysight Network Applications and Security
PerfectStorm is a highly modular hardware test platform enabling equipment providers, service providers and enterprises the ability to create real-world, high-stress conditions and user behavior to push new equipment and networks to their limits.
-
product
Enterprise-Wide Application and Security Testing
PerfectStorm ONE
Keysight Network Applications and Security
Enterprises and government organizations are making major investments in consolidating and rebuilding data centers and enterprise -wide networks. The stakes have never been so high to get it right the first time.
-
product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 10GE/40GE Appliance
Keysight Network Applications and Security
Building upon the terabit-scale PerfectStorm platform, PerfectStorm ONE™ appliances offers enterprises, service providers, and technology vendors a revolutionary solution for generating stateful applications and malicious traffic, simulating millions of real-world end-user environments to test and validate infrastructure, a single device, or an entire system.
-
product
Security Testing Service
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
product
Agile Application Performance & Security Resilience Test Tool
Developer
Keysight Network Applications and Security
Ixia Developer is an agile application performance and security resilience test tool that helps developers find bugs early in the development cycle. Ixia Developer features an integrated debugger that helps locate the primary source of defects. An easy-to-use, fast, and responsive web-based user interface significantly reduces the time it takes to move from test configuration to actual packets on the network. And by leveraging a robust ATI engine, Ixia Developer always includes the most up-to-date apps and security strikes.
-
product
Application Security Platform
Sentinel
WhiteHat Sentinel is a Software-as-a-Service (SaaS) platform that enables your business to quickly deploy a scalable application security program across the entire software development lifecycle (SDLC). Combining advanced scanning technology with the world’s largest application security research team, we accurately identify your vulnerabilities and scale to meet any demand without slowing you down.
-
product
High-Performance Application and Security Load Module
PerfectStorm 10/1GE Load Module
Keysight Network Applications and Security
Equipped with powerful multi-core, multi-threaded network processors, PerfectStorm 10/1GbE is designed to satisfy the testing needs of manufacturers needing speed flexibility in their testing resources. Networking equipment manufacturers building new equipment or service providers and large enterprises integrating this them benefit from testing and verifying performance and functionality prior to deployment.
-
product
Mobile Application Security
ImmuniWeb®
ImmuniWeb® Mobile is a part of ImmuniWeb Application Security Testing Platform dedicated to comprehensive security testing of mobile applications. Based on proprietary machine-learning SAST and DAST mobile application testing technology, it also provides thorough testing of the mobile backend.
-
product
Digital Spectroscopy
CAEN SyS is the new Systems & Spectroscopy Division of CAEN Spa. Such Division relies upon an extremely strong foundational knowledge of nuclear measurement instrumentation in developing Radiation Measurements Systems and Spectroscopy Solutions. These systems and solutions are perfectly suited to operations involving Nuclear Fuel Facilities, Nuclear Power Plants, Measurements Laboratories, and Security Applications.
-
product
Scalable for High Performance Application and Security Needs
PerfectStorm 40/10GE Load Module
Keysight Network Applications and Security
Equipped with powerful multi-core, multi-threaded network processors, PerfectStorm 40 GbE is designed to satisfy the testing needs of manufacturers needing speed flexibility in their testing resources. Networking equipment manufacturers building new equipment or service providers and large enterprises integrating this them benefit from testing and verifying performance and functionality prior to deployment.
-
product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 1GE/10GE Appliance
Keysight Network Applications and Security
PerfectStorm ONE facilitates network and security proof-of-concepts (POCs) and assessments, all in a compact device. This POC-in-a-box enables enterprises and service providers to select optimal devices and right-size data centers, as well as providing device vendors with a platform to fully showcase their product’s performance, resiliency, and throughput under realworld traffic loads.
-
product
Seeker Interactive Application Security Testing
IAST
The industry's first IAST solution with active verification and sensitive-data tracking for web-based applications. See how Seeker helps development, QA, DevOps, and security teams automate the security testing of modern web applications and services.
-
product
Enhance Secure Control Applications
MachXO3D
*Simplifies implementation of hardware security by integrating Root-of-Trust in your platform’s first on, last off device*Supports security throughout the product lifecycle including device manufacturing and transport, platform manufacturing, installation, operation and decommissioning
-
product
Kalypso-Military Grade Secure Messaging Application
Secure Messenger Application (Code name : Kalypso) is a revolutionary Application designed to provide its users with end-to-end secure communication (Text, Voice and Video) using proprietary robust communication protocol / 256 bit military grade encryption algorithm with an On Premises Server.
-
product
Security Testing
Security/negative testing is typically conducted during development to highlight how a DUT handles abnormal conditions like very high traffic load, different frame sizes (incl. undersized and oversized frames), framed with different IFG settings, various types of errors and deviation of the signal frequency, as well as various DDoS attacks.
-
product
Quantum-Safe Security
CN4000 Series
The CN4000 series are the ideal optimized, high-performance encryptors for Small to Medium Enterprises (SME). They also enable an ideal cost effective “encrypt everywhere” solution for Large Enterprises. Despite their small form-factor, the CN4000 Series encryptors have the same robust security credentials as the rack-mounted models.
-
product
Thermal Security Camera
Elara™ FC-Series O
The Elara™ FC-Series O thermal security camera is one of FLIR’s premium thermal security cameras for perimeter protection. The Elara FC-Series O integrates with external video analytics devices, such as FLIR’s TRK or third party solutions, to classify human or vehicular intrusions. The Elara FC-Series O also offers a wide range of high-performance lenses, with a choice of resolutions, offering greater flexibility for tailoring security systems to specific site conditions.
-
product
Application Gauging
Bowers Group offers a range of both standard and bespoke measurement solutions for a variety of gauging applications. As the world’s leading bore gauge manufacturer, our application heads can be fitted directly onto our XT range of internal micrometers to create a flexible, modular measuring system. Whether you’re measuring threads, grooves, splines, sphericals, or deep holes, we have a standard solution to suit. If you’re looking for something completely bespoke, our team has the skills and expertise to solve your measurement problem.
-
product
Network Security Testing
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
product
Business Application
Business Application testing encompasses verification and validation services to support Quality Assurance and Control of business applications. Application testing ensures that all aspects of the application like its functionality, integration, performance, security, and usability are working as expected.
-
product
Cyber Security & Intelligence
We are a leading supplier of cyber, intelligence, and security capabilities to government agencies, and a growing supplier of cyber and network security capabilities to commercial customers.
-
product
Applications
No matter what the requirement for ultra high-precision measurement, VIEW has the ideal solution. VIEW non-contact measurement systems utilize sub-pixel image feature detection with either field-of-view (FOV) or point-to-point (PTP) configurations for exceptional accuracy and repeatability. From etch-dimensions on hard disk drive (HDD) heads to semiconductor overlay measurements, we provide the accuracy you need for quality manufacturing.
-
product
Security Testing Services
Alphabin Technology Consulting
Fortify your digital defenses and enhance the resilience of your systems to safeguard against cyber threats.
-
product
Security & Search Systems
Discreet and robust gamma radiation detector, specifically designed for law enforcement and first responders to interdict nuclear and radioactive materials.
-
product
Secure Wearable Solutions
From ST31 secure microcontrollers to ST54 solutions integrating NFC controller, secure element and eSIM, ST offers a complete range of solutions for payment, transit and multiple contactless services. ST's technology is ideal for applications that require a card emulation function but are environmentally challenged or have limited space for the antenna.





























