Filter Results By:
Products
Applications
Manufacturers
Application Security
vulnerabilities identification and remediation software.
-
product
100GE Application & Security Test Load Module
CloudStorm
Keysight Network Applications and Security
Ixia's CloudStormTM is an industry-first 2.4 terabit application and security test solution that not only meets today’s need, but that of the future. CloudStorm delivers 3X-application and 4X-SSL-emulation scale over any other test system. It helps NEMs shortening their development cycles, and enterprises and data center operators find the right balance between mitigating security risks and delivering high end-user application performance. Emulate multi-terabit DDoS and botnet attacks to future-proof security solutions
-
product
Seeker Interactive Application Security Testing
IAST
The industry's first IAST solution with active verification and sensitive-data tracking for web-based applications. See how Seeker helps development, QA, DevOps, and security teams automate the security testing of modern web applications and services.
-
product
Mobile Application Security
ImmuniWeb®
ImmuniWeb® Mobile is a part of ImmuniWeb Application Security Testing Platform dedicated to comprehensive security testing of mobile applications. Based on proprietary machine-learning SAST and DAST mobile application testing technology, it also provides thorough testing of the mobile backend.
-
product
Security Testing Service
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
product
Application Security Testing Solution
CxIAST
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.
-
product
Enterprise-Wide Application and Security Testing
PerfectStorm ONE
Keysight Network Applications and Security
Enterprises and government organizations are making major investments in consolidating and rebuilding data centers and enterprise -wide networks. The stakes have never been so high to get it right the first time.
-
product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 10GE/40GE Appliance
Keysight Network Applications and Security
Building upon the terabit-scale PerfectStorm platform, PerfectStorm ONE™ appliances offers enterprises, service providers, and technology vendors a revolutionary solution for generating stateful applications and malicious traffic, simulating millions of real-world end-user environments to test and validate infrastructure, a single device, or an entire system.
-
product
Scalable for High Performance Application and Security Needs
PerfectStorm 40/10GE Load Module
Keysight Network Applications and Security
Equipped with powerful multi-core, multi-threaded network processors, PerfectStorm 40 GbE is designed to satisfy the testing needs of manufacturers needing speed flexibility in their testing resources. Networking equipment manufacturers building new equipment or service providers and large enterprises integrating this them benefit from testing and verifying performance and functionality prior to deployment.
-
product
Application Security Platform
Sentinel
WhiteHat Sentinel is a Software-as-a-Service (SaaS) platform that enables your business to quickly deploy a scalable application security program across the entire software development lifecycle (SDLC). Combining advanced scanning technology with the world’s largest application security research team, we accurately identify your vulnerabilities and scale to meet any demand without slowing you down.
-
product
Digital Spectroscopy
CAEN SyS is the new Systems & Spectroscopy Division of CAEN Spa. Such Division relies upon an extremely strong foundational knowledge of nuclear measurement instrumentation in developing Radiation Measurements Systems and Spectroscopy Solutions. These systems and solutions are perfectly suited to operations involving Nuclear Fuel Facilities, Nuclear Power Plants, Measurements Laboratories, and Security Applications.
-
product
Agile Application Performance & Security Resilience Test Tool
Developer
Keysight Network Applications and Security
Ixia Developer is an agile application performance and security resilience test tool that helps developers find bugs early in the development cycle. Ixia Developer features an integrated debugger that helps locate the primary source of defects. An easy-to-use, fast, and responsive web-based user interface significantly reduces the time it takes to move from test configuration to actual packets on the network. And by leveraging a robust ATI engine, Ixia Developer always includes the most up-to-date apps and security strikes.
-
product
100GbE Application and Security Load Module
PerfectStorm 100GE 1-Port Load Module
Keysight Network Applications and Security
PerfectStorm is a highly modular hardware test platform enabling equipment providers, service providers and enterprises the ability to create real-world, high-stress conditions and user behavior to push new equipment and networks to their limits.
-
product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 1GE/10GE Appliance
Keysight Network Applications and Security
PerfectStorm ONE facilitates network and security proof-of-concepts (POCs) and assessments, all in a compact device. This POC-in-a-box enables enterprises and service providers to select optimal devices and right-size data centers, as well as providing device vendors with a platform to fully showcase their product’s performance, resiliency, and throughput under realworld traffic loads.
-
product
Cybersecurity and Compliance Solution
Application Audit
Application Audit, Compuware's mainframe cybersecurity and compliance solution, enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Using Application Audit, security staff can: Deter insider threats by capturing and analyzing start-to-finish user session activity. Integrate user behavior intelligence with popular SIEM engines to analyze the overall application environment. Support criminal/legal investigations with complete and credible forensics. Fulfill compliance mandates regarding protection of sensitive data. The Value of Application Audit. Provides deep insight into user behavior including data viewed, by whom and which applications were used to access it. Enables immediate analysis through the automatic delivery of data to SIEM platforms such as Splunk and QRadar, either directly or in combination with CorreLog zDefenderTM for z/OS or Syncsort Ironstream. Delivers granular intelligence and reporting capabilities needed to comply with regulations such as HIPAA and GDPR as well as security policies. Eliminates dependency on specialized mainframe knowledge. Separates the system administrator's duties from mainframe-inexperienced auditor's responsibilities with a web UI, so that no single person is in a position to engage in malicious activities without detection.
-
product
High-Performance Application and Security Load Module
PerfectStorm 10/1GE Load Module
Keysight Network Applications and Security
Equipped with powerful multi-core, multi-threaded network processors, PerfectStorm 10/1GbE is designed to satisfy the testing needs of manufacturers needing speed flexibility in their testing resources. Networking equipment manufacturers building new equipment or service providers and large enterprises integrating this them benefit from testing and verifying performance and functionality prior to deployment.
-
product
Kalypso-Military Grade Secure Messaging Application
Secure Messenger Application (Code name : Kalypso) is a revolutionary Application designed to provide its users with end-to-end secure communication (Text, Voice and Video) using proprietary robust communication protocol / 256 bit military grade encryption algorithm with an On Premises Server.
-
product
Security Vehicles
When you need to set up robust security operations in a temporary or outdoor location, our security vehicles can provide a tried and tested solution. For use at festivals, public ceremonies, sports events and other outdoor functions, our mobile check point and scan truck will help keep your guests or members of the public safe from security threats.
-
product
Security Testing
We protect your business from cyber attacksSecure online transactionsPrevent unauthorized accessMinimize the risk of data lossEnhance resistance to DoS attacks
-
product
Security & Defence
At Kromek we design, develop, produce, and distribute products and solutions for the Security & Defence sectors, including, but not limited to defence, border control, homeland security and emergency services.
-
product
Security Consulting
Our Managed Security Services can dramatically improve your ongoing security posture through more frequent, cost effective security assessments, helping you to identify, assess and manage risk.
-
product
Security Testing Service
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
product
Cyber Security Training
Elbit Systems of America's comprehensive attack scenario library reflects the most recent threat landscape. Our cyber security experts continuously update training scenarios with newly discovered attacks and tactics. Versatile network settings and attack scenarios equip cyber security teams with customized training specific to each team's organization.
-
product
Laser Applications
Quantum Composers offers a diverse family of lasers, laser systems, and modules, including DPSS, Nd: YAG, and pulsed lasers. Our MiniJewel and MicroJewel lasers are now available in 2 different energy options to allow customers to tailor the laser to their specific applications.
-
product
Industrial & Security
D-Matrix
The D-Matrix Gamma Ray Imager is a fully integrated, photon-counting, pixilated, 12-bit energy discriminating CZT detector/imager.
-
product
Application Software
Radiant's application software packages are used in conjunction with ProMetric® Imaging Colorimeters and Photometers to provide complete solutions for accomplishing specialized testing and calibration tasks in R&D, production lines, or in the field.
-
product
Secure Smartphone - Salus
Stratign’s Salus Smartphone is a high-end smartphone built from the ground-up and protects you from eavesdropping, malware, data breaches and any attempts to hack or tamper with your mobile communications and data.
-
product
Secure DNS
DNS attacks are still a regular occurrence for cybercriminals and many companies are targeted by such attacks not only once a year. With Secure DNS, you not only ensure secure access to your website, but also benefit from extra protection against such attacks.





























