-
product
Network Security
PLANET Network Security solution is designed to build a strong and secure network for any commercial and industrial environments. By providing functions like cybersecurity, SPI firewall, VPN, IDP, antispam and antivirus, this collection includes VPN Security Gateway, 5G NR Gateway, Flat-type Smart Router, UTM Content Security Gateway and Wireless VPN Routers. A variety of product lines can satisfy all the demands of enterprises, SMBs, factories, communities and more for the network security including remote management and surveillance of IoT, IIoT and building automation applications.
-
product
Visible Security Cameras - Bullet Cameras
Teledyne FLIR Visible Security Cameras, Bullet Cameras
-
product
App and API Security
Defend against a wide range of multi-vector attacks. Intelligent protection, end to end.
-
product
Quantum-Safe Security
CN9000 Series
The Centauris CN9000 Series is the first commercially available certified high-assurance 100Gbps Ethernet encryptor that supports the most complex fully meshed topologies – enabling 100% security for Big Data, Cloud and data centre services’ ultra-fast networks.
-
product
Security Products
Security is no longer an option; it’s a requirement. As your trusted provider of platform security solutions, our comprehensive portfolio addresses a variety of threat models.
-
product
Open Source Advanced Web Security Testing Platform
IronWASP
IronWASP (Iron Web application Advanced Security testing Platform) is an open source system for web application vulnerability testing. It is designed to be customizable to the extent where users can create their own custom security scanners using it.
-
product
DeepCover Embedded Security in IoT Authenticated Sensing and Notification
MAXREFDES143#
The MAXREFDES143# is an Internet of Things (IoT) embedded security reference design, built to protect an industrial sensing node by means of authentication and notification to a web server. The hardware includes a peripheral module representing a protected sensor node monitoring operating temperature and remaining life of a filter (simulated through ambient light sensing) and an mbed shield representing a controller node responsible for monitoring one or more sensor nodes. The design is hierarchical with each controller node communicating data from connected sensor nodes to a web server that maintains a centralized log and dispatches notifications as necessary. The mbed shield contains a Wi-Fi module, a DS2465 coprocessor with 1-Wire® master function, an LCD, LEDs, and pushbuttons. The protected sensor node contains a DS28E15 authenticator, a DS7505 temperature sensor, and a MAX44009 light sensor. The mbed shield communicates to a web server by the onboard Wi-Fi module and to the protected sensor node with I2C and 1-Wire. The MAXREFDES143# is equipped with a standard shield connector for immediate testing using an mbed board such as the MAX32600MBED#. The simplicity of this design enables rapid integration into any star-topology IoT network requiring the heightened security with low overhead provided by the SHA-256 symmetric-key algorithm.
-
product
Thermal Analytics Security Camera
ELARA™ FC-Series ID
The Elara FC-Series ID is a premium FLIR thermal security camera for perimeter protection. The Elara FC-Series ID includes onboard video analytics capable of classifying human or vehicular intrusions, resulting in fewer false alarms.The Elara FC-Series ID also offers a wide range of high-performance lenses and multiple resolutions, giving greater flexibility in tailoring security systems to specific site conditions.
-
product
API Security Testing
Nowadays, APIs are frequently used for communication between two applications. In this communication, lots of sensitive data is transferred between devices and the server.In order to be protected in the event of a data loss or attack, we must secure our API.
-
product
Network Security Appliances
With the development and popularization of cloud computing technologies, traditional network security providers are repositioning and moving their development efforts from network security solutions that can only handle single point security issues to a new generation of network security solution that are effective in big data and cloud computing environments. ICT equipment providers in the network security industry need network security servers that have massive DPI parsing power, full support for NFV and SDN, and a powerful big data processing engine. This equipment must also support dynamic capacity expansion and scalable IO extension in order to adapt to a more complicated cloud environment.
-
product
Security Labs
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
product
Hardware Security Testing
Day by day, security threads are increasing and now enemies are able to access all data through adding small components of hardware devices to personal devices like mobiles, laptops, and etc.Also, software can be patched, but hardware can never be easily updated; thus, security flaws are increasing dramatically day by day
-
product
Security intelligence & analytics
Detect and prioritize threats that pose the greatest risk. dentify high-risk threats with near real-time correlation and behavioral anomaly detection. Detect vulnerabilities, manage risks and identify high-priority incidents among billions of data points.Gain full visibility into network, application and user activity.
-
product
Global Security Cameras
Our products optimize the reaction time and push the operational envelope!
-
product
Network Security Object Management - AlgoSec AddOns
ObjectFlow
Manage network security objects across your entire multi-vendor network.
-
product
Cyber Security/Network Security Training
Stratign’s Cyber Security/Network Security Training provides cybersecurity professionals with foundational, intermediate, and advanced security skills imparted through experts in the field.
-
product
Industrial & Security
D-Matrix
The D-Matrix Gamma Ray Imager is a fully integrated, photon-counting, pixilated, 12-bit energy discriminating CZT detector/imager.
-
product
Quantum-Safe Security
CN6000 Series
The Centauris CN6000 encryptors may be upgraded to quantum cryptography through the addition of the Cerberis Quantum Key Distribution (QKD) server to ensure that the solutions are quantum-safe for the long-term protection of sensitive data. This also ensures investment-protection of the encryptors. Such quantum cryptography is provably secure, ensures anti-eavesdropping detection and provides long-term forward secrecy against brute force hacking and attacks by quantum computers.
-
product
Thermal Surveillance Systems
Zhejiang ULIRvisionTechnology Co., LTD
Thermal security camera system is widely used in areas where security and monitoring are required for timely detection of abnomal situations in order to prevent further damage. Below are two typical type of cameras for thermal surveillance and the importance of thermal imager for security in various application fields.
-
product
Cable Assembly 15-Pin D-Type, Male to Male, 2m
40-970-015-2m-MM
The 15-Pin D-Type cable assembly is constructed from 19/0.18 (21AWG) Tinned Copper Wire with PFA insulation. Male screwlocks are provided to secure the connectors to their associated products. The 15-Pin Female connector option of this cable assembly is suited for direct connection to Pickering Interfaces products.
-
product
Cable Assy 25-Pin D-Type Male To Female 0.5m
40-970-025-0.5m-MF
The 25-Pin D-Type cable assembly is constructed from 19/0.18 (21AWG) Tinned Copper Wire with PFA insulation. male Screwlocks are provided to secure the connectors to their associated products.
-
product
Cable Assembly 15-Pin D-Type, Female to Unterminated With Ferrules, 1m
40-972-015-1m-FU
The 15-Pin Connector to Unterminated Cable Assy is constructed from PFA insulated 19/0.18 (21AWG) Tinned Copper Wire. The connector can be secured to the associated product by screwlocks. The unterminated connections are coded to match the connector pin designation and include crimped on ferrules to ensure the wire strands cannot break when they are terminated. When using this product additional cable strain relief arrangements may be necessary and appropriate electrical safety precautions should be observed.
-
product
Fluid Property Sensors
TE Connectivity (TE) offers distinct fluid property sensor technologies to measure fluids. Our tuning fork technology is coupled with efficient software algorithms for accurate measurement of viscosity, density, and dielectric constant. Dedicated applications for our DEF sensors include oils quality sensors (engine, hydraulic, transmission), fluid monitoring, and others. Our urea quality SCR sensors, based on Ultrasonic Technology (UST), perform an analysis of the Diesel Exhaust Fluid (DEF) fluid to provide urea concentration and secure mis-filling protection to the Selective Catalytic Reduction systems. Our highly reliable reed switch technology is combined with temperature measurement for DEF level sensing.
-
product
Land Mobile Radio
Land Mobile Radio systems are commonly used for critical communications by public safety organizations such as police, firefighters, and other emergency response organizations. In addition to the public safety sector, LMR systems are also commonly used in the commercial world in various industries including industrial, transportation, utilities, security, and logistics. LMR systems typically consist of handheld portable radios, vehicle mounted mobile radios, fixed base stations and repeaters, and network infrastructure.
-
product
Air
General Dynamics Global Imaging Technologies
Air superiority calls for highly-trained and experienced pilots, equipped with the very best technology. From high assurance mission computers to on board weapons systems, sensor processing to trusted communications, we deliver the absolute latest in secure avionics.
-
product
CyberC4®:Proxy
Kratos Defense & Security Solutions, Inc.
Kratos CyberC4:Proxy enables secure transactions across security domains in on-premise/hybrid/cloud environments. CyberC4:Proxy is adaptable with a flexible framework, which allows for tailoring to support 3rd party satellite ground equipment.
-
product
Cable Assembly, 78-Pin D-Type, Female to Unterminated With Ferrules
40-972-078-2m-FU
A 78-Pin D-Type to Unterminated cable assembly constructed from 7/0.15 (26AWG) Silver Plated Copper Wire. Screwlocks are provided to secure the cable connector to associated products. Has a 45 degree cable exit away from pin 1. The 78-Pin Female connector option of this cable assembly is suited for direct connection to Pickering Interfaces products.
-
product
3-Pin Power D-Type Cable, Male to Male, 0.5m
40-970-403-0.5m-MM
The 3-Pin Power D-type cable assembly is constructed from 50/0.26mm2 (14 AWG) Tinned Copper Wire with PVC insulation. Screwlocks are provided to secure the connectors to their associated products.
-
product
Social Engineering With Physical & Logical Attack
LGMS Security Team will approach the Social Engineering assessment as an intelligence operation. During the course of assessment, LGMS Security Team will base on clear objectives to breach the security controls using information that has been obtained through deception including phishing emails, sending of malicious parcels (CD or thumb-drives), and social engineering phone calls.





























