Net Security
-
Product
Industrial & Security
D-Matrix
-
The D-Matrix Gamma Ray Imager is a fully integrated, photon-counting, pixilated, 12-bit energy discriminating CZT detector/imager.
-
Product
Visible PTZ Security Cameras
Quasar™ 4K IR PTZ Cameras
-
With crisp 4K video resolution, on-board long-range IR illumination, and 22x or 31x optical zoom options, FLIR Quasar™4K IR PTZ cameras deliver critical situational awareness. Exceptional field of view gives operators the ability to seamlessly monitor key details throughout large areas. The combination of high-performance optics and sensors, exceptional low light visible imaging, and effortless integration with all major third-party VMS and FLIR United VMS makes Quasar 4K IR PTZ cameras an ideal solution for critical infrastructure sites and remote facilities that require close monitoring.
-
Product
ARINC 615/615A Integrated Secure PDL & Transport Solution
PDL-615-XT
-
Avionics Interface Technologies
The PDL-615-XT is a rugged ARINC 615 & ARINC 615A Secure PDL solution integrated with a rugged, portable, storage and transport case.
-
Product
Visible Security Cameras - Specialized Cameras
-
Teledyne FLIR's Specialized Visible Security Cameras
-
Product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 1GE/10GE Appliance
-
Keysight Network Applications and Security
PerfectStorm ONE facilitates network and security proof-of-concepts (POCs) and assessments, all in a compact device. This POC-in-a-box enables enterprises and service providers to select optimal devices and right-size data centers, as well as providing device vendors with a platform to fully showcase their product’s performance, resiliency, and throughput under realworld traffic loads.
-
Product
Visible Security Cameras - Bullet Cameras
-
Teledyne FLIR Visible Security Cameras, Bullet Cameras
-
Product
Network Security Object Management - AlgoSec AddOns
ObjectFlow
-
Manage network security objects across your entire multi-vendor network.
-
Product
100GE Application & Security Test Load Module
CloudStorm
-
Keysight Network Applications and Security
Ixia's CloudStormTM is an industry-first 2.4 terabit application and security test solution that not only meets today’s need, but that of the future. CloudStorm delivers 3X-application and 4X-SSL-emulation scale over any other test system. It helps NEMs shortening their development cycles, and enterprises and data center operators find the right balance between mitigating security risks and delivering high end-user application performance. Emulate multi-terabit DDoS and botnet attacks to future-proof security solutions
-
Product
Portable Security System
Sensor-1
-
The portable security system that fits in the palm of your hand. Sensor-1 detects real-time changes in motion and alerts you when your important items move. Operates independent of the mobile app. Communicates with smartphones, tablets, laptops and desktops.
-
Product
Open Source Service to Help Secure and Trust Your Software
Community Attestation Service / CAS
-
- CAS stores all signatures inside of immudb, the standard for open source immutable databases.- CAS is protected against tampering. All attestation data is integrity-checked and cryptographically verified by the CAS client.- CAS is also protected against MITM attacks. The public key below is checked by every communication.A Software Bill of Materials (SBOM) is a list of components in a piece of software.Like a list of ingredients on food packaging -- where you might consult a label to avoid foods that may cause an allergy -- SBOMs can help companies avoid use of software that may harm their organization.If defects are later found in a specific part, the SBOM makes it easy to locate affected products.
-
Product
High-Performance Application and Security Load Module
PerfectStorm 10/1GE Load Module
-
Keysight Network Applications and Security
Equipped with powerful multi-core, multi-threaded network processors, PerfectStorm 10/1GbE is designed to satisfy the testing needs of manufacturers needing speed flexibility in their testing resources. Networking equipment manufacturers building new equipment or service providers and large enterprises integrating this them benefit from testing and verifying performance and functionality prior to deployment.
-
Product
Virtualized Security Resilience Testing
BreakingPoint VE
-
Keysight Network Applications and Security
Ixia BreakingPoint Virtual Edition (VE) provides real-world application and threat simulation for complete performance and security testing, and its elastic deployment model allows you to achieve security resilience without sacrificing scalability or flexibility.
-
Product
Secure Voice & Data Communications in EURO-ISDN
ELCRODAT 6-2
-
Rohde & Schwarz ELCRODAT products protect voice and data communications in digital and analog armed forces and government networks in all German and NATO security classifications.The ELCRODAT 6-2 is the first encryption unit approved for transmitting information classified as TOP SECRET that uses a public key method for key agreement. Together with the public key method, the noise generator in the encryption unit enables mutual authentication and key agreement. New session keys are generated in the encryption unit for each connection. The keys do not leave the units and are deleted after the session for maximum security.
-
Product
Secure Hardware Platforms
-
With our STSECURE portfolio, STMicroelectronics offers secure microcontrollers that answer the market needs for advanced security. We deliver hardware-certified solutions based on advanced flash technology, with our latest generation implementing an ARM® SecurCore® processor.
-
Product
Hipot & Security Tester
-
Safety testers (also called hipot testers) ensure the safe use of test items in different working environments and under different operating conditions. There are a variety of solutions, depending on the tests required to meet the relevant industry standards. Many test units offer a combination of functionality and performance.
-
Product
Hybrid Network Security Policy Management
AlgoSec Cloud
-
Across cloud, SDN, on-premises and anything in between - one platform to manage it all.
-
Product
Cyber Security Assessment
-
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
Product
Security Consulting
-
Our Managed Security Services can dramatically improve your ongoing security posture through more frequent, cost effective security assessments, helping you to identify, assess and manage risk.
-
Product
Security Testing Consultancy
-
QA Mentor provides an End-to-End security testing services through the array of preventive measures, proven methodology and framework, use of best tools identified through POCs (proof of concepts) and an excellent infrastructure which is using evolving technologies. The backbone of all of these are the industry and project experience QA Mentor and its highly qualified & certified Security Testing Consultants. Our consultants closely work with our customers to assess their system, conduct POC to identify the relevant preventive measure and tools to be used and guide the IT teams of the businesses with a clearly defined roadmap to be followed to secure their systems.
-
Product
Cloud Security Testing
-
RedWolf is the premium cloud-DDoS testing provider globally. We offer an easy-to-use testing system that is either self-serve or guided by RedWolf experts with years of experience helping secure the worlds largest and most complex enterprise networks.
-
Product
Net Toner and Probe Kit
1EA680
-
Cable tracer is designed to trace wires without damaging the instalations and much more.
-
Product
Control, Monitor, Security and Power Management for ATEs
-
Subset of 6TL's FastATE modules designed for the control, monitoring, security, and power management of ATEs (automated test equipment).
-
Product
Unit Testing & Mocking Solution for .NET
Isolate
-
Part of Typemock Isolator,The Complete Unit Testing & Mocking Solution for .NET From mocking to coverage to automated test suggestions
-
Product
Network Security Testing
-
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
Product
Aviation Security
-
Aviation is highly regulated, from ICAO Annex 17 to National Security Programs. Due to its high profile and the subsequent multitude of threats, regulation safeguards travel security. Our expertise will support your business, by supplying market leading X-Ray and Metal detection products along with maintenance, that meet the regulator requirements and best fit your business.
-
Product
Modernized Navstar Security Algorithm (MNSA) M-code Testing
SimMNSA
-
The M-code signal is part of the security architecture that all new Military GPS User Equipment (MGUE) has been required to use since 2017. Until recently, testing with non-classified AES-encryption and replay of M-code Satellite Data Sets (SDS) have been the only methods authorized for GPS M-code receiver testing using a constellation simulator.
-
Product
Quantum-Safe Security
CN9000 Series
-
The Centauris CN9000 Series is the first commercially available certified high-assurance 100Gbps Ethernet encryptor that supports the most complex fully meshed topologies – enabling 100% security for Big Data, Cloud and data centre services’ ultra-fast networks.
-
Product
SST Security Assessment
-
Self-Service Terminal (SST) penetration testing is an activity which identifies vulnerabilities in SST that may potentially exist due to the lack of physical security measures, technical configuration or process controls.
-
Product
Net Irradiance Meter
LPNET07
-
LPNET07 measures the net radiation across a surface, from near ultraviolet to far infrared.
-
Product
Network Test and Security
-
Ensuring high performance of wired, Wi-Fi, and 3G/4G/LTE and 5G networks in both pre-deployment and real-world environments while enabling dynamic security intelligence to help stay one step ahead of attacks.





























