Net Security
-
Product
Drop Weight Impact Testing Machine
DWTT Series
-
Jinan Testing Equipment IE Corporation
DWTT Drop Weight Impact Testing System is suitable for drop weight tear test of various kinds of ferrite, especially for the test of DWTT for pipeline steel as ASTM-E 436, API-RP 5L3, ASTM-E 208 and DIN EN 10274. DWTT has integrated mechanical, electrical, and automatic control technology, and achieved full automation of feeding, hammer lifting impact, and fracture specimen collection. The load frame has a four-column design, features in stable supporting structure, rigid, dual sliding rails. The Drop Weight Drop Weight Tester is equipped with positioning mechanism, anti-dumping mechanism, safety mechanism, hydraulic buffer devices and security guard net. The impact energy is determined by the lifting height and configuration of different net weights. DWTT Drop Weight Impact Testing System is the essential quality control equipment for pipeline manufacturers, steel mills, iron and steel enterprises, and is also widely used for research institutes.1. Buffer device is equipped to avoid the second impact and absorb the residual energy after breaking the specimen so as to prevent the weigher and anvil from destroying. The installation of safety mechanism, buffer device, and security guard net will effectively secure the testing machine and its operation to extend its life.2. Configuration of the specimen-feeding system, anti-second impact device, and specimen centering mechanism will guarantee a quick, accurate and reliable test.
-
Product
Net Irradiance Meter
LPNET07
-
LPNET07 measures the net radiation across a surface, from near ultraviolet to far infrared.
-
Product
NET and C #
-
The programming software C # under .NET enables the development of test programs and additional components.
-
Product
Security Devices
-
Schweitzer Engineering Laboratories, Inc.
Security devices protect perimeters and secure communications within LANs.
-
Product
NR01 net radiometer
-
Hukseflux Thermal Sensors B.V.
NR01 is a market leading 4-component net radiation sensor, mostly used in scientific-grade energy balance and surface flux studies. It offers 4 separate measurements of solar and longwave radiation, facing both up and down. NR01 owes its popularity to its excellent price / performance ratio and major improvements relative to comparable instruments. These advantages include weight, ease of levelling, solar offsets in the longwave measurement and pyrgeometer heating, reducing measurement errors caused by dew deposition.
-
Product
Network Security
TrustMonitor™
-
TrustMonitor™ provides continuous monitoring of the trust network by:*(Analyzing content & constraints for validity of credentials*Monitoring that certificate authorities are available to support validation*Easily scaling to incorporate new certificate authorities (no agent required)
-
Product
Net Radiation Measurement
NR Lite2
-
The design of the NR Lite2 is unique. The detector is based on a Teflon coated, weather resistant black conical absorber. In contrast to other sensor designs, NR Lite2 requires no fragile plastic domes. This results in a virtually maintenance free design. The vertical stick prevents birds from affecting the output signal.
-
Product
Security Labs
-
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
Product
Modbus Master TCP/IP Component for .NET
WSMBT
-
WSMBT is a powerful and simple to use .Net component that makes it easy to access data from a Modbus slave device connected to the PC's Ethernet network. Simply drop the component on your form and talk to your device with your VB.NET, C# or Managed C++.
-
Product
Security Testing
-
Security/negative testing is typically conducted during development to highlight how a DUT handles abnormal conditions like very high traffic load, different frame sizes (incl. undersized and oversized frames), framed with different IFG settings, various types of errors and deviation of the signal frequency, as well as various DDoS attacks.
-
Product
Defense & Security
-
Protecting populations from nuclear risk. Our instruments precisely detect and monitor radiation in the most critical and challenging situations, empowering military and civil defense teams to keep populations safe.
-
Product
Secure Automotive
-
With cars becoming more connected and therefore more vulnerable to attacks, security has become critical for automotive applications and is at the heart of many concerns. ST is committed to provide secure solutions to address the challenges of this new era of digital technologies.
-
Product
Security Products
-
Security is no longer an option; it’s a requirement. As your trusted provider of platform security solutions, our comprehensive portfolio addresses a variety of threat models.
-
Product
Cyber Security Training
-
Elbit Systems of America's comprehensive attack scenario library reflects the most recent threat landscape. Our cyber security experts continuously update training scenarios with newly discovered attacks and tactics. Versatile network settings and attack scenarios equip cyber security teams with customized training specific to each team's organization.
-
Product
Industrial & Security
-
Kromek's custom configurations of Cadmium Zinc Telluride (CZT) based detector tiles and linear arrays can be implemented into custom Advanced Imaging platforms for various Industry and Security applications.
-
Product
Security & Search Systems
-
Discreet and robust gamma radiation detector, specifically designed for law enforcement and first responders to interdict nuclear and radioactive materials.
-
Product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 10GE/40GE Appliance
-
Keysight Network Applications and Security
Building upon the terabit-scale PerfectStorm platform, PerfectStorm ONE™ appliances offers enterprises, service providers, and technology vendors a revolutionary solution for generating stateful applications and malicious traffic, simulating millions of real-world end-user environments to test and validate infrastructure, a single device, or an entire system.
-
Product
Global Security Cameras
-
Our products optimize the reaction time and push the operational envelope!
-
Product
Net Series 1 Gigabit Ethernet
-
The standard NET Series design uses rugged stainless steel connector bodies with a naval bronze engaging nut. The use of metal key and Acme threads on the mating interface allows for easy mating and un-mating of the connectors, no matter where they are located. In addition to the contact spacing, which is optimized for this application, one of the keys to achieving the 1 Gbit/s transmission rates is in the unique terminations for both the cable and bulkhead connectors. These cable terminations can be performed at a number of the Teledyne Oil & Gas worldwide manufacturing and support locations.
-
Product
Security Testing Services
-
By testing the flaws in software, our security testing services seek to remove vulnerabilities before the software is deployed or purchased. By focusing on the different layers of an information system across the database, infrastructure, network, and access channels such as mobile, security testing looks at making the applications free from vulnerabilities. We assist online service providers, website owners, and independent software vendors to manage application security risks. We offer a comprehensive range of white, grey, or black-box model security testing based on your stage in the development cycle.
-
Product
Network Test and Security
-
Ensuring high performance of wired, Wi-Fi, and 3G/4G/LTE and 5G networks in both pre-deployment and real-world environments while enabling dynamic security intelligence to help stay one step ahead of attacks.
-
Product
Security Labs Community Edition
-
*Hack and Patch Real Applications- Get hands-on experience with top vulnerabilities and see the fix impact in a live app, in real-time.*Level-Up Your Coding Approach- Add secure coding to your list of skills by fixing issues that you face regularly, in the languages you’re most comfortable with. *Complete Labs in Minutes- With labs under 10 minutes, you can learn fast and gauge your progress in real-time for quick feedback.
-
Product
Application Security Platform
Sentinel
-
WhiteHat Sentinel is a Software-as-a-Service (SaaS) platform that enables your business to quickly deploy a scalable application security program across the entire software development lifecycle (SDLC). Combining advanced scanning technology with the world’s largest application security research team, we accurately identify your vulnerabilities and scale to meet any demand without slowing you down.
-
Product
API Security Testing
-
Nowadays, APIs are frequently used for communication between two applications. In this communication, lots of sensitive data is transferred between devices and the server.In order to be protected in the event of a data loss or attack, we must secure our API.
-
Product
Secure Hardened Android Phone
-
Shoghi has designed a totally Secure Hardened Android phone, which comes with a Specialized Operating system to prevent Hackers from remotely compromising your device , from all major vulnerabilities and exploits including protection from zero-days.
-
Product
Fixed Surveillance System for Perimeter Security
Argus
-
Argus is a fixed, rugged, preconfigured wide area surveillance system. Combining a best-in-class radar and thermal camera with Command and Control software, Argus is designed to detect and track multiple threats both near and far in the most demanding weather conditions 24 /7. When compared to other perimeter security solutions, Argus has the lowest initial cost per kilometer of secured space as well as the lowest lifetime cost.
-
Product
Secure NFC
-
Mobile security is expanding from the largely deployed SIM technology to the growing NFC, embedded Secure Element (eSE) and embedded SIM (eSIM) technologies in smartphones, tablets, wearables, and laptops. ST provides an exhaustive offer of NFC and eSE/eSIM products to address secure mobile transaction applications such as secure connectivity, payment wireless charging and automotive: from the state-of-the-art ST21NFC to the ST54 integrating the widely deployed ST33.
-
Product
API Security Testing
-
In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:
-
Product
Cloud Security Testing
-
Using a cloud infrastructure is no more a new phenomenon in the digital world. Businesses use it as a basic practice now a days due to numerous benefits associated with it. Hence, it should be a top most priority for the businesses to secure their cloud infrastructure as that’s the nucleus of their business from all aspects. In cloud security testing, the cloud infrastructure is screened to identify security risks and the areas which can be exploited by the attackers. Cloud security testing is mainly performed to ensure that cloud infrastructure can protect the confidential information of an organization. QA Mentor adopts three different approaches during the cloud security testing process:
-
Product
Application Security Testing Solution
CxIAST
-
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.





























