Net Security
-
product
Thermal Security Camera with Onboard Analytics
Triton™ F-Series ID
The FLIR Triton™ F-Series ID thermal security cameras set the new standard of perimeter protection for critical infrastructure. The Triton F-Series ID features best-in-class thermal imaging detail and high-performance onboard analytics for classifying human or vehicular intrusions. FLIR’s premium line offers five models with full 640 × 480 thermal resolution, longer detection ranges, and better analytics performance than ever before.
-
product
API Security Testing
In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:
-
product
Secure Access
Schweitzer Engineering Laboratories, Inc.
Devices with secure access authenticate users, control privileges, and create audit trails.
-
product
Secure Smartphone - Salus
Stratign’s Salus Smartphone is a high-end smartphone built from the ground-up and protects you from eavesdropping, malware, data breaches and any attempts to hack or tamper with your mobile communications and data.
-
product
Security Products
Security is no longer an option; it’s a requirement. As your trusted provider of platform security solutions, our comprehensive portfolio addresses a variety of threat models.
-
product
Security Testing
We protect your business from cyber attacksSecure online transactionsPrevent unauthorized accessMinimize the risk of data lossEnhance resistance to DoS attacks
-
product
100GE Application & Security Test Load Module
CloudStorm
Keysight Network Applications and Security
Ixia's CloudStormTM is an industry-first 2.4 terabit application and security test solution that not only meets today’s need, but that of the future. CloudStorm delivers 3X-application and 4X-SSL-emulation scale over any other test system. It helps NEMs shortening their development cycles, and enterprises and data center operators find the right balance between mitigating security risks and delivering high end-user application performance. Emulate multi-terabit DDoS and botnet attacks to future-proof security solutions
-
product
Unit Testing & Mocking Solution for .NET
Isolate
Part of Typemock Isolator,The Complete Unit Testing & Mocking Solution for .NET From mocking to coverage to automated test suggestions
-
product
Hipot & Security Tester
Safety testers (also called hipot testers) ensure the safe use of test items in different working environments and under different operating conditions. There are a variety of solutions, depending on the tests required to meet the relevant industry standards. Many test units offer a combination of functionality and performance.
-
product
Security Policy Change Automation
FireFlow
Confidently automate your security policy change process - from planning through risk analysis, implementation and validation.
-
product
Security Gateways
Schweitzer Engineering Laboratories, Inc.
Security gateways combine cybersecurity capabilities to create secure access paths through security perimeters.
-
product
Security and Traffic Monitoring System
Information System Technologies Inc.
ISTI’s versatile sensor nodes can support multiple sensing types including acoustic, seismic, visible/IR, and scanning laser. Several eye-safe scanning lasers form a distributed wireless sensor network and can continuously and accurately track as well as monitor ground vehicles and personnel in a surveillance area. This system provides super-fine angular and range resolution to precisely locate moving targets. Among other key benefits are: day/night operational capability, continuous monitoring and surveillance without blind spots, 360 degrees field-of-view, large coverage area, multiple closely spaced target tracking, threat classification, and automatic alarm generation. The system can be used in applications such as traffic monitoring, intrusion detection, border control, airport runway collision and incursion avoidance, and perimeter security.
-
product
Perimeter Security And Coastal Surveillance Systems
These systems comprise of Radars and Cameras and can give early warming to the commanders about any intrusion/breach of perimeter of any restricted area. These can be integrated with jammers to tackle drone threats too.
-
product
Application Security Platform
Sentinel
WhiteHat Sentinel is a Software-as-a-Service (SaaS) platform that enables your business to quickly deploy a scalable application security program across the entire software development lifecycle (SDLC). Combining advanced scanning technology with the world’s largest application security research team, we accurately identify your vulnerabilities and scale to meet any demand without slowing you down.
-
product
Omnisens Securing Power Cable Integrity
https://www.omnisens.com/uploads/1/2/0/5/120592129/published/omnisens-cobra-logo-white-2014-06-10.png?1546958203
In both underground and subsea cables incipient faults often result in temperature events. Using optical fibers integrated into the power cable or laid close by, Distributed Temperature Sensing (DTS) helps detect changes and faults allowing the operator to intervene before the cable fails. It is suitable for deployment in any cable where an optical fiber is present, including HVDC, HVAC, export, inter-array, transmission and distribution.
-
product
Secure Hardware Platforms
With our STSECURE portfolio, STMicroelectronics offers secure microcontrollers that answer the market needs for advanced security. We deliver hardware-certified solutions based on advanced flash technology, with our latest generation implementing an ARM® SecurCore® processor.
-
product
Application Security Testing Solution
CxIAST
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.
-
product
Power, Environmental, Security & Connectivity Hardware
Panduit power distribution, environmental, and connectivity hardware products improve availability, scalability, power, cooling efficiency, and product quality, which also minimizes network downtime and increases data center productivity.
-
product
Hybrid Network Security Policy Management
AlgoSec Cloud
Across cloud, SDN, on-premises and anything in between - one platform to manage it all.
-
product
Kalypso-Military Grade Secure Messaging Application
Secure Messenger Application (Code name : Kalypso) is a revolutionary Application designed to provide its users with end-to-end secure communication (Text, Voice and Video) using proprietary robust communication protocol / 256 bit military grade encryption algorithm with an On Premises Server.
-
product
Security Labs Community Edition
*Hack and Patch Real Applications- Get hands-on experience with top vulnerabilities and see the fix impact in a live app, in real-time.*Level-Up Your Coding Approach- Add secure coding to your list of skills by fixing issues that you face regularly, in the languages you’re most comfortable with. *Complete Labs in Minutes- With labs under 10 minutes, you can learn fast and gauge your progress in real-time for quick feedback.
-
product
Visible PTZ Security Cameras
Quasar™ 4K IR PTZ Cameras
With crisp 4K video resolution, on-board long-range IR illumination, and 22x or 31x optical zoom options, FLIR Quasar™4K IR PTZ cameras deliver critical situational awareness. Exceptional field of view gives operators the ability to seamlessly monitor key details throughout large areas. The combination of high-performance optics and sensors, exceptional low light visible imaging, and effortless integration with all major third-party VMS and FLIR United VMS makes Quasar 4K IR PTZ cameras an ideal solution for critical infrastructure sites and remote facilities that require close monitoring.
-
product
Advanced High-Performance Logging & Tracing for .NET, Java & Delph
SmartInspect
SmartInspect is an advanced .NET logging, Java logging and Delphi logging tool for debugging and monitoring software applications. Identify and fix software bugs faster. Monitor and analyze applications in real-time. Find solutions to user-reported issues. Debug production systems while they run.
-
product
Secure CDN
Increase your conversion with our global CDN infrastructure to speed up your website load times and provide the highest streaming quality to your customers. Through improved loading times, it has been shown that conversion rates can be improved up to 2,5 times. You also benefit from the highest possible security and compliance for your content. Secure CDN combines all the benefits in one innovative solution.
-
product
Net Series 1 Gigabit Ethernet
The standard NET Series design uses rugged stainless steel connector bodies with a naval bronze engaging nut. The use of metal key and Acme threads on the mating interface allows for easy mating and un-mating of the connectors, no matter where they are located. In addition to the contact spacing, which is optimized for this application, one of the keys to achieving the 1 Gbit/s transmission rates is in the unique terminations for both the cable and bulkhead connectors. These cable terminations can be performed at a number of the Teledyne Oil & Gas worldwide manufacturing and support locations.
-
product
App and API Security
Defend against a wide range of multi-vector attacks. Intelligent protection, end to end.
-
product
Industrial & Security
Kromek's custom configurations of Cadmium Zinc Telluride (CZT) based detector tiles and linear arrays can be implemented into custom Advanced Imaging platforms for various Industry and Security applications.
-
product
Net Toner and Probe Kit
1EA680
Cable tracer is designed to trace wires without damaging the instalations and much more.
-
product
Scalable for High Performance Application and Security Needs
PerfectStorm 40/10GE Load Module
Keysight Network Applications and Security
Equipped with powerful multi-core, multi-threaded network processors, PerfectStorm 40 GbE is designed to satisfy the testing needs of manufacturers needing speed flexibility in their testing resources. Networking equipment manufacturers building new equipment or service providers and large enterprises integrating this them benefit from testing and verifying performance and functionality prior to deployment.





























