Filter Results By:
Products
Applications
Manufacturers
IP Security
-
product
Chamber Controllers & Software
Designed off of our previous controller platform with familiar features in an improved interface, added functionality for ease and fewer steps to accomplish your daily testing needs. Remotely monitor and control your chambers and receive text/email alarms. From the home screen users can now manually control, run or stop a profile and view a snapshot of current activity like actual/setpoint values, alarm, datalogging, profile, security, IP address information and more.
-
product
RZ/G1 32-bit MPUs
The RZ/G1 high-performance 32-bit processors have 1GHz+ Arm® Cortex®-A cores, a 3D graphics engine, a full high-definition (HD) video engine, secure IP, high-speed interfaces such as PCIe, SATA and Gigabit Ethernet, and other functions necessary for embedded devices in the industrial segment.
-
product
Processor IP
Security
Security IP designed to protect against a variety of different vulnerabilities.
-
product
RA Family Of Arm-based MCUs
RA4
The RA4 Series bridges the needs for reasonable low power with the demand for connectivity and performance. These MCUs deliver up to 48MHz of CPU performance using an ArmⓇ CortexⓇ-M4 core with up to 256kB of embedded flash memory. The series offers a wide set of peripherals, including USB, CAN, ADC, capacitive touch, a segment LCD controller, and additional security IP integration, making it suitable for industrial equipment, home appliances, office equipment, healthcare products, and meters.
-
product
Industrial & Security
Kromek's custom configurations of Cadmium Zinc Telluride (CZT) based detector tiles and linear arrays can be implemented into custom Advanced Imaging platforms for various Industry and Security applications.
-
product
Security Devices
Schweitzer Engineering Laboratories, Inc.
Security devices protect perimeters and secure communications within LANs.
-
product
Quantum-Safe Security
CN6000 Series
The Centauris CN6000 encryptors may be upgraded to quantum cryptography through the addition of the Cerberis Quantum Key Distribution (QKD) server to ensure that the solutions are quantum-safe for the long-term protection of sensitive data. This also ensures investment-protection of the encryptors. Such quantum cryptography is provably secure, ensures anti-eavesdropping detection and provides long-term forward secrecy against brute force hacking and attacks by quantum computers.
-
product
Secure Wearable Solutions
From ST31 secure microcontrollers to ST54 solutions integrating NFC controller, secure element and eSIM, ST offers a complete range of solutions for payment, transit and multiple contactless services. ST's technology is ideal for applications that require a card emulation function but are environmentally challenged or have limited space for the antenna.
-
product
IP Pulse
IP Compatible card with 4 programmable pulse generators. TTL or RS422 / RS485 compatible outputs. Programmable pulse - nS to seconds. Programmable count or free
-
product
Network Security
TrustMonitor™
TrustMonitor™ provides continuous monitoring of the trust network by:*(Analyzing content & constraints for validity of credentials*Monitoring that certificate authorities are available to support validation*Easily scaling to incorporate new certificate authorities (no agent required)
-
product
SST Security Assessment
Self-Service Terminal (SST) penetration testing is an activity which identifies vulnerabilities in SST that may potentially exist due to the lack of physical security measures, technical configuration or process controls.
-
product
Cyber Security Assessment
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
product
IP Module
IP-429
ARINC 429 is a versatile standardized bus interface. ARINC 429 is robust featuring Manchester encoding and enough voltage swing to provide excellent noise immunity and reasonable throughput rates. ARINC 429 is the interface of choice for critical applications; for example aircraft instrumentation and control.
-
product
Thermal Security Camera
Elara™ FC-Series O
The Elara™ FC-Series O thermal security camera is one of FLIR’s premium thermal security cameras for perimeter protection. The Elara FC-Series O integrates with external video analytics devices, such as FLIR’s TRK or third party solutions, to classify human or vehicular intrusions. The Elara FC-Series O also offers a wide range of high-performance lenses, with a choice of resolutions, offering greater flexibility for tailoring security systems to specific site conditions.
-
product
PCI Express IP
Rambus silicon-proven, high-performance PCI Express® (PCIe®) 6.0, 5.0, 4.0 and earlier generation digital controllers are optimized for use in SoCs, ASICs and FPGAs. These market-leading solutions for high-performance interfaces address AI/ML, data center and edge applications.
-
product
Cloud Security Testing
RedWolf is the premium cloud-DDoS testing provider globally. We offer an easy-to-use testing system that is either self-serve or guided by RedWolf experts with years of experience helping secure the worlds largest and most complex enterprise networks.
-
product
Cross Domain Security Solutions
Stratign’s Cross Domain Security Solutions are highly trusted, government-accredited network security components that control and, if necessary, block the flow of data between two security domains at all layers.
-
product
Secure Smartphone - Salus
Stratign’s Salus Smartphone is a high-end smartphone built from the ground-up and protects you from eavesdropping, malware, data breaches and any attempts to hack or tamper with your mobile communications and data.
-
product
Security Products
Security is no longer an option; it’s a requirement. As your trusted provider of platform security solutions, our comprehensive portfolio addresses a variety of threat models.
-
product
Security Testing
As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.
-
product
Wireless IP Surveillance Camera
ENVIROMUX-IPCAM-W
View and control the camera from the ENVIROMUX web interface, the camera web interface, included software, or with a compatible cell phone. With the ENVIROMUX-2D/5D/16D, a triggered snapshot can be forwarded in alert e-mails. A snapshot can be triggered by any programmed event (motion detection, door open/close, glass break, smoke, liquid detection, etc.). Image sensor: 1/4" progressive scan CMOS sensor. Video Streaming: simultaneous Motion JPEG and MPEG-4. Frame rate: 30fps at 640x480 (VGA) resolution. Lens: F2.0, 4.0 mm (0.16 in). RJ45 connector. Wireless models: wireless IEEE 802.11 b/g up to 54 Mbps. Regulatory approvals: CE, FCC, RoHS.
-
product
IP Gateway
SFT3508F/SFT3508F-10 (SFT3508F-M)
Hangzhou Softel Optic Co., Ltd.
*8 Data ports ( SFT3508F/SFT3508F-M) :First Data port: IP out over HTTP, UDP (SPTS), HLS and RTMPData CH1-7 ports: IP in over HTTP, UDP (SPTS), RTP (SPTS), RTSP and HLSIP out over HTTP, HLS and RTMP (Unicast)*10 Data ports ( SFT3508F-10) :First Data port: IP out over HTTP, UDP (SPTS), HLS and RTMPData CH1-9 ports: IP in over HTTP, UDP (SPTS), RTP (SPTS), RTSP and HLSIP out over HTTP, HLS and RTMP (Unicast)*Support TS files uploading through Web management*Support IP anti- jitter function*Support adding scrolling caption, welcome words, boot image and boot video (this function is only applicable to IP out application and the STB/Android TV must be installed SOFTEL IPTV APK)*Support downloading SOFTEL IPTV APK directly from this device *Support about 80 HD/SD programs (Bitrate:2Mbps) When HTTP/RTP/RTSP/HLS is converted into UDP (Multicast),the actual application shall prevail, and suggest maximum 80% CPU utilization*Support program playing with APK downloaded android STB and TV, maximum 150 terminals
-
product
IP and Port Monitoring Software
CallerIP
IP and Port monitoring. See all incoming and outgoing connections made to your computer. Including process names, remote and internal port numbers and much more. Automated alerts bring your attention to illegal connections. Automated Alerting. Set up alerts to warn you of intruders and hack attempts. CallerIP can send an email, display a warning dialog and/or append a log file. CallerIP Server. CallerIP server allows you to view all incoming and outgoing connections to your computer from any browser in the world. CallerIP plots all connecting IP locations on a world map. IP origin shown on world map. All connecting IP address locations are shown on a world map.
-
product
Network Security Testing
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
product
End Point IP Core
PCIe
The highly configurable PCIe End point IP core supports x1, x2, and x4 lane with a selection of 32/64-bit data path. Depending on design requirements, a maximum of 8 VCs and 8 TCs are supported. The IP core consists of many useful features that can be included to enhance system performance and to address special design needs in different applications. The data link layer allows the configuration of infinite credits to boost the flow control efficiency. By-pass mode, cut-through mode, and store-and-forward mode are other optional items. The transport layer features include configurable ECRC generation and checking, support for up to 64 configurable outstanding non-posted requests, and configurable payload size from 128 to 4 Kbytes
-
product
Vision Standard IP Cores
S2I’s Vision Standard IP Cores solutions are delivered as a working reference design along with FPGA IP cores. This minimizes development time and allows for top-notch performance at a small footprint, while leaving enough flexibility to customize the design. Sensor to Image cores are compact and leave enough space in the FPGA for your application.
-
product
FPGA Toolkits & IP
Curtiss-Wright Defense Solutions
Our tools and source code for use with our Xilinx Virtex and Kintex-based FPGA products include- FusionXF simplifies the development of FPGA-based application code by allowing developers to concentrate on their application without needing to worry about system integration of the hardware and operating system interface. The DDC family of IP cores supports decimation from 2 to 64 in complex mode and 2 to 32 in real mode





























