Application Security
vulnerabilities identification and remediation software.
-
product
Quantum-Safe Security
CN9000 Series
The Centauris CN9000 Series is the first commercially available certified high-assurance 100Gbps Ethernet encryptor that supports the most complex fully meshed topologies – enabling 100% security for Big Data, Cloud and data centre services’ ultra-fast networks.
-
product
Security Testing Service
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
product
Laser Applications
Quantum Composers offers a diverse family of lasers, laser systems, and modules, including DPSS, Nd: YAG, and pulsed lasers. Our MiniJewel and MicroJewel lasers are now available in 2 different energy options to allow customers to tailor the laser to their specific applications.
-
product
Communication Security
Shoghi Communications design and development specific Military Grade Crypto System , Shoghi provids end-to-end communication Security (COMSEC) and secure information transfer. Shoghi has strong experience in creating customer specific Algorithms and Key management schemes. All the hardware, inspite of all the complexities can be loaded by the customer themselves with their own algorithm, to enhance the whole security environment.We are known for our open source designs and crypto validated equipment supply to our military customers. In case of any specific design or development, please feel free to get in touch with our team
-
product
AlgoSec Platform - Secure Application Connectivity
AlgoSec
Use automation to speed up and tighten your security policies.
-
product
CANdo Application
The CANdo Application software is designed to work in conjunction with the CANdo Interface, to provide a simple, yet powerful tool for viewing & analysing the traffic on a CAN network.
-
product
Security Products
Security is no longer an option; it’s a requirement. As your trusted provider of platform security solutions, our comprehensive portfolio addresses a variety of threat models.
-
product
Security Policy Change Automation
FireFlow
Confidently automate your security policy change process - from planning through risk analysis, implementation and validation.
-
product
Ethernet Switch & Secure Router
VPX3-685
Curtiss-Wright Defense Solutions
The VPX3-685 is a fully-featured Layer-2/Layer-3 managed Ethernet router with a highly integrated security subsystem. Enabling the vision of Network Centric connectivity, the VPX3-685 Secure Ethernet Network Router provides an accelerated path to secure network-ready architectures that can interoperate seamlessly within the Global Information Grid (GIG).
-
product
API Security Testing
In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:
-
product
Pressure Transmitters For Industrial Applications
Series 21 Y
KELLER AG für Druckmesstechnik
The Y-line transmitters have an extremely small temperature error. This is achieved using an additional circuit containing a temperature sensor that subdivides the temperature range into fields that are 1,5 Kelvin (K) wide.
-
product
Thermal Analytics Security Camera
Elara™ FB-Series ID
The FLIR Elara™ FB-Series ID thermal security camera uses onboard analytics to classify human or vehicular intrusions, making it ideal for perimeter intrusion detection and sterile-zone monitoring. The Elara™ FB-Series ID can also hand off classified intrusions to FLIR PTZ cameras for autonomous tracking of intruders. Easy to set up, Elara™ FB-Series provide reliable detection with low false alarm rates in challenging environments, bad weather, and complete darkness.
-
product
Secure Hardware Platforms
With our STSECURE portfolio, STMicroelectronics offers secure microcontrollers that answer the market needs for advanced security. We deliver hardware-certified solutions based on advanced flash technology, with our latest generation implementing an ARM® SecurCore® processor.
-
product
Fixed Surveillance System for Perimeter Security
Argus
Argus is a fixed, rugged, preconfigured wide area surveillance system. Combining a best-in-class radar and thermal camera with Command and Control software, Argus is designed to detect and track multiple threats both near and far in the most demanding weather conditions 24 /7. When compared to other perimeter security solutions, Argus has the lowest initial cost per kilometer of secured space as well as the lowest lifetime cost.
-
product
Security Testing
Security/negative testing is typically conducted during development to highlight how a DUT handles abnormal conditions like very high traffic load, different frame sizes (incl. undersized and oversized frames), framed with different IFG settings, various types of errors and deviation of the signal frequency, as well as various DDoS attacks.
-
product
Cloud Security Testing
Using a cloud infrastructure is no more a new phenomenon in the digital world. Businesses use it as a basic practice now a days due to numerous benefits associated with it. Hence, it should be a top most priority for the businesses to secure their cloud infrastructure as that’s the nucleus of their business from all aspects. In cloud security testing, the cloud infrastructure is screened to identify security risks and the areas which can be exploited by the attackers. Cloud security testing is mainly performed to ensure that cloud infrastructure can protect the confidential information of an organization. QA Mentor adopts three different approaches during the cloud security testing process:
-
product
Pull tester for security testing
SAFOR 2000
The Safor portable tester is an accurate unit, designed for testing the pulling force of fixings prior to being put into service. Easily prevent accidents by testing on site the fixings to install end brackets and safety harness eyebolts.
-
product
Web Application Testing in Ruby
Watir
An open source Ruby library for automating tests. Watir interacts with a browser the same way people do: clicking links, filling out forms and validating text. It drives Internet Explorer, Firefox, Chrome, Opera and Safari, and is available as a RubyGems gem.
-
product
Infotainment Test for Automotive Applications
Multimedia operating interfaces are complex control and display devices for functions such as entertainment, telephony, on-board computers and vehicle settings. The functional test of such complex control units and their networking within the vehicle architecture presents a particular challenge in every phase of the product design process.
-
product
Mobile Application Penetration Testing
A Mobile application is an application that runs on mobile devices. It has become a dominant and popular business tool today. Corporates are empowering mobile devices by offering more and more services on mobile and handheld devices. Unfortunately, mobile devices like notebook computers, PDAs, Pocket PCs, smartphones, and BlackBerrys are all attractive targets for malicious attackers. By accessing your corporate network via email, VPNs, and other means of remote access, a successful compromise can result in the exposure of Personally Identifiable Information, corporate secrets, customer data, and additional sensitive information.
-
product
Global Security Cameras
Our products optimize the reaction time and push the operational envelope!
-
product
Web Application Firewall
WAF
Your website security solution needs to keep up with the changing cyber threat. Protect your website with Cloudbric’s cloud WAF to block unknown and modified attacks.
-
product
Phase Noise Measurement Application
N9068A
One-button measurements for analyzing phase noise in frequency domain (log plot) and time domain (spot frequency)Compatible with phase noise measurement personality in Keysight PSA and ESA spectrum analyzers Runs inside the PXA, MXA, EXA signal analyzers and MXE EMI receiver
-
product
Vectorless Test Applications
NanoVTEP
Vectorless test solution with miniaturized amplifier to help improve test coverage.
-
product
Automation OT Application Platform
Schweitzer Engineering Laboratories, Inc.
The SEL Blueframe application platform and its enabled applications help you maximize the use of system data and provide you with a scalable and customizable solution that accommodates your system schemes today and in the future.
-
product
Cyber Security & Intelligence
We are a leading supplier of cyber, intelligence, and security capabilities to government agencies, and a growing supplier of cyber and network security capabilities to commercial customers.
-
product
Mobile Application Testing
Mobile compatibility testing covers aspects of platform fragmentation, physical characteristics, and the App Store review guidelines.
-
product
Cryogenic Applications
Over the last 20 years the Celadon Engineering team has developed an expertise in cryogenic materials which has resulted in a solid reputation in the industry for producing extremely stable cryogenic on-wafer probe card as well as DUT probing solutions. These custom cryogenic probe card solutions are widely used to test Space, Military, Medical and Quantum Computing products. Celadon’s cryogenic solutions vary from standard VersaTile™ footprints which interface to positioners to innovative custom PCB based designs to allow for flexibility when testing at these very cold temperatures. Lakeshore cryogenic wire is used in standard DC solutions for high density cableout designs to support high pin count applications. During the development process, Celadon works closely with the cryogenic prober vendor to ensure the integrated solution is optimized for current and future testing needs.





























