Net Security
-
product
Thermal Analytics Security Camera
Elara™ FB-Series ID
The FLIR Elara™ FB-Series ID thermal security camera uses onboard analytics to classify human or vehicular intrusions, making it ideal for perimeter intrusion detection and sterile-zone monitoring. The Elara™ FB-Series ID can also hand off classified intrusions to FLIR PTZ cameras for autonomous tracking of intruders. Easy to set up, Elara™ FB-Series provide reliable detection with low false alarm rates in challenging environments, bad weather, and complete darkness.
-
product
Secure Hardware Platforms
With our STSECURE portfolio, STMicroelectronics offers secure microcontrollers that answer the market needs for advanced security. We deliver hardware-certified solutions based on advanced flash technology, with our latest generation implementing an ARM® SecurCore® processor.
-
product
Fixed Surveillance System for Perimeter Security
Argus
Argus is a fixed, rugged, preconfigured wide area surveillance system. Combining a best-in-class radar and thermal camera with Command and Control software, Argus is designed to detect and track multiple threats both near and far in the most demanding weather conditions 24 /7. When compared to other perimeter security solutions, Argus has the lowest initial cost per kilometer of secured space as well as the lowest lifetime cost.
-
product
Security Testing
Security/negative testing is typically conducted during development to highlight how a DUT handles abnormal conditions like very high traffic load, different frame sizes (incl. undersized and oversized frames), framed with different IFG settings, various types of errors and deviation of the signal frequency, as well as various DDoS attacks.
-
product
Cloud Security Testing
Using a cloud infrastructure is no more a new phenomenon in the digital world. Businesses use it as a basic practice now a days due to numerous benefits associated with it. Hence, it should be a top most priority for the businesses to secure their cloud infrastructure as that’s the nucleus of their business from all aspects. In cloud security testing, the cloud infrastructure is screened to identify security risks and the areas which can be exploited by the attackers. Cloud security testing is mainly performed to ensure that cloud infrastructure can protect the confidential information of an organization. QA Mentor adopts three different approaches during the cloud security testing process:
-
product
Pull tester for security testing
SAFOR 2000
The Safor portable tester is an accurate unit, designed for testing the pulling force of fixings prior to being put into service. Easily prevent accidents by testing on site the fixings to install end brackets and safety harness eyebolts.
-
product
Global Security Cameras
Our products optimize the reaction time and push the operational envelope!
-
product
Net Radiometer
An on-board 24-bit A to D converter makes measurements and provides a digital SDI-12 output. This eliminates the need for multiple analog datalogger channels to measure each of the four components of net radiation.
-
product
Cyber Security & Intelligence
We are a leading supplier of cyber, intelligence, and security capabilities to government agencies, and a growing supplier of cyber and network security capabilities to commercial customers.
-
product
Advanced High-Performance Logging & Tracing for .NET, Java & Delph
SmartInspect
SmartInspect is an advanced .NET logging, Java logging and Delphi logging tool for debugging and monitoring software applications. Identify and fix software bugs faster. Monitor and analyze applications in real-time. Find solutions to user-reported issues. Debug production systems while they run.
-
product
Perimeter Security And Coastal Surveillance Systems
These systems comprise of Radars and Cameras and can give early warming to the commanders about any intrusion/breach of perimeter of any restricted area. These can be integrated with jammers to tackle drone threats too.
-
product
Hardware Security For Programmable System Control
Mach-NX
*Up to 8.4K LC of user logic, 2669 kbits of user flash memory and dual boot flash feature*Up to 379 programmable I/O supporting 1.2/1.5/1.8/2.5/3.3 I/O voltages*Secure enclave supports 384-bit cryptography, including SHA, HMAC, and ECC*Configuration of PFR and security functions through Lattice Propel simplifies developer experience*Highly reliable. Low power and 3X better SER performance to comparable CMOS technologies
-
product
NET and C #
The programming software C # under .NET enables the development of test programs and additional components.
-
product
Net Pyrradiometer
CN1-R
The Middleton CN1-R Net Pyrradiometer measures the net total radiation flux (solar, terrestrial, and atmospheric) downward and upward through a horizontal surface. It is suitable for solar energy studies in agriculture and meteorology.
-
product
Unit Testing & Mocking Solution for .NET
Isolate
Part of Typemock Isolator,The Complete Unit Testing & Mocking Solution for .NET From mocking to coverage to automated test suggestions
-
product
Secure CDN
Increase your conversion with our global CDN infrastructure to speed up your website load times and provide the highest streaming quality to your customers. Through improved loading times, it has been shown that conversion rates can be improved up to 2,5 times. You also benefit from the highest possible security and compliance for your content. Secure CDN combines all the benefits in one innovative solution.
-
product
Security & Defence
At Kromek we design, develop, produce, and distribute products and solutions for the Security & Defence sectors, including, but not limited to defence, border control, homeland security and emergency services.
-
product
100GE Application & Security Test Load Module
CloudStorm
Keysight Network Applications and Security
Ixia's CloudStormTM is an industry-first 2.4 terabit application and security test solution that not only meets today’s need, but that of the future. CloudStorm delivers 3X-application and 4X-SSL-emulation scale over any other test system. It helps NEMs shortening their development cycles, and enterprises and data center operators find the right balance between mitigating security risks and delivering high end-user application performance. Emulate multi-terabit DDoS and botnet attacks to future-proof security solutions
-
product
ARINC 615/615A Integrated Secure PDL & Transport Solution
PDL-615-XT
Avionics Interface Technologies
The PDL-615-XT is a rugged ARINC 615 & ARINC 615A Secure PDL solution integrated with a rugged, portable, storage and transport case.
-
product
Cloud Security Solutions
Online threats are constantly changing. Offering protection against the largest and most sophisticated attacks, Akamai helps you safeguard your websites and other Internet-facing applications from the risks of downtime and data theft. Built on the Akamai Intelligent Platform, Akamai Cloud Security Solutions provide the scale to stop the largest Distributed Denial-of-Service (DDoS) and web application attacks without reducing performance, as well as intelligence into the latest threats and the expertise to adapt to shifting tactics and attack vectors.
-
product
Voice Systems for Safe, Secure, & Efficient Communications
Rohde & Schwarz offers flexible and cost-effective communications system solutions that meet all scalability and reliability requirements for civil and defense use cases regardless of the application domain - in the air, on the ground or at sea Multi-redundant, IP based voice communications systems ensure safe, secure and efficient voice communication, combining state-of-the-art, flexible and resilient IP based architecture with strong security mechanisms.
-
product
Network Security Object Management - AlgoSec AddOns
ObjectFlow
Manage network security objects across your entire multi-vendor network.
-
product
Cyber Security/Network Security Training
Stratign’s Cyber Security/Network Security Training provides cybersecurity professionals with foundational, intermediate, and advanced security skills imparted through experts in the field.
-
product
Intelligent Checked Baggage Security
We offer advanced technology for checked baggage screening in our portfolio of explosives detection systems. We provide high resolution, 3D images of passenger bags and parcels to rapidly identify prohibited and dangerous items in real time.
-
product
Cyber Security Assessment
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
product
3U VPX Virtual Secure Router
VSR347D
The VSR347D takes advantage of Abaco’s SBC347D hardware with an optimized environment running Juniper Networks’ vSRX Virtual Firewall, providing high levels of network security and performance in a single 3U VPX slot.
-
product
Hardware Security Testing
Day by day, security threads are increasing and now enemies are able to access all data through adding small components of hardware devices to personal devices like mobiles, laptops, and etc.Also, software can be patched, but hardware can never be easily updated; thus, security flaws are increasing dramatically day by day
-
product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 10GE/40GE Appliance
Keysight Network Applications and Security
Building upon the terabit-scale PerfectStorm platform, PerfectStorm ONE™ appliances offers enterprises, service providers, and technology vendors a revolutionary solution for generating stateful applications and malicious traffic, simulating millions of real-world end-user environments to test and validate infrastructure, a single device, or an entire system.
-
product
Quantum-Safe Security
CN8000 Series
The CN8000 harnesses the power of quantum mechanics to help ensure secure communications – the encryption keys are generated by IDQ’s Quantum Random Number Generator to guarantee inherent and provable randomness. The CN8000 can also be upgraded to be quantum-safe via the Cerberis QKD Blade (quantum cryptography) to ensure long-term protection of the data in transit.





























