-
Product
WordPress Vulnerability Scanner
WPScan
-
WPScan is a free, for non-commercial use, black box WordPress vulnerability scanner written for security professionals and blog maintainers to test the security of their sites.
-
Product
P1 Vulnerability Knowledge Base
VKB
-
With more than 1800 identified & listed vulnerabilities P1 Security Vulnerability Knowledge Base (VKB) is a unique telecom-dedicated Vulnerability Database, with absolutely no other equivalent on the market. It is the result of years of expertise and vulnerability assessments successfully led by our engineers on the Core & Radio Networks & Network Elements of many of the biggest Telecom operators in the World.
-
Product
Vulnerability Assessment And Penetration Testing
VA&PT
-
If new web applications are installed into your organization’s network, you have shifted your business physically to another network, or if your site requires IT governance and regulatory compliance, you should opt for Penetration Testing.
-
Product
Wideband True RMS AC Voltmeter
323
-
The Ballantine 323 True RMS analog ac voltmeter uses advanced true rms circuitry to achieve square law response from rugged, fast responding silicon diode detectors with no thermal lag and overload vulnerability inherent in thermocouple devices.
-
Product
Penetration Testing Services
-
All web and mobile applications are vulnerable to attack. You are going to get hacked – it's not "if", it's "when." Before it happens, you want to make sure you have a mature security system in place. Our specialists in software security testing have a background in IT and software development, know different types of exploits, and have experience in performing thousands of pen tests. We get hired to hack into systems and determine weaknesses.
-
Product
Security Testing Services
-
By testing the flaws in software, our security testing services seek to remove vulnerabilities before the software is deployed or purchased. By focusing on the different layers of an information system across the database, infrastructure, network, and access channels such as mobile, security testing looks at making the applications free from vulnerabilities. We assist online service providers, website owners, and independent software vendors to manage application security risks. We offer a comprehensive range of white, grey, or black-box model security testing based on your stage in the development cycle.
-
Product
Application Penetration Testing:
-
Penetration testing (or pen testing) is a simulated security exercise in which ethical hackers attempts to exploit the vulnerabilities of an application system (web or mobile). The objective of this exercise is to identify any possible loopholes present in the system’s defence mechanism which the real hackers could take advantage of. QA Mentor practices the following stages while exercising this:
-
Product
P1 Telecom Auditor
PTA
-
PTA provides network discovery, security scanning and auditing for SS7/SIGTRAN, GPRS/GTP-C, LTE/Diameter and 5G protocol stacks. PTA enables Security and Telecom Engineers to discover the security level of their networks and assess the vulnerabilities of signaling Network Elements. It also provides CIOs, CTOs & VPs of Engineering, decision makers and top management, the ability to control the evolution of their Core Networks™ security using a dashboard of key indicators.
-
Product
Crypto Libraries Test Suite open source
Project Wycheproof
-
A set of security tests for identifying cryptographic vulnerabilities. Project Wycheproof tests crypto libraries against known attacks.
-
Product
SWIR Imagers
-
SWIR imagers (short wavelength infrared) are an important group of surveillance electro-optical imagers due several reasons. First, advances in InGaAs technology enabled design of relatively low cost SWIR imagers. Second, InGaAs imagers are very sensitive and can generate images of observed scenery even at dark nights. Third, SWIR imagers are less vulnerable to bad atmospheric conditions than TV/LLLTV cameras working in visible/near infrared band. Fourth, SWIR imagers can generate hi-res images even if they are built using much smaller optics than used for design of thermal imagers.
-
Product
Static Analysis Tool
CodeSonar
-
Automated static analysis designed for zero-tolerance defect environments. CodeSonar, GrammaTech''s flagship static analysis software, identifies programming bugs that can result in system crashes, memory corruption, leaks, data races, and security vulnerabilities. By analyzing both source code and binaries, CodeSonar empowers developers to eliminate the most costly and hard-to-find defects early in the application development lifecycle.
-
Product
Acoustic Compound Protection System
ACOMPRIS
-
Static kind of infrastructure is often vulnerable to attacks by either small arms fire (SAF) or mortars. The objects could be for instance a military forward operating base, an embassy or a post from the United Nations. As attacks may occur all the time, persistent and affordable protection is required. Especially when inhibited by civilians, ease of operations use and maintenance become more important. Often installed in remote places far away from the electricity grid, power consumption is an issue.
-
Product
Application Security Testing Solution
CxIAST
-
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.
-
Product
FLy-Away Kits
-
Complete Solutions for Cyber Operations,Transportable Private Cloud, Edge Computing A Fly-Away Kit (FAK) or Expeditionary Kit is a self-contained suite of equipment (hardware and software) for DoD and federal civilian Cyber Protection Teams (CPTs) and forward operations to operate both in tactical (field-deployed) and back-office environments. The FAK suite of cyber tools or cloud/server applications include tools to conduct vulnerability analysis, incident response, and other cyber-analytic functions, and are suitable for operation on both classified and unclassified networks.
-
Product
Ada Source Code Analyzer
CodePeer
-
CodePeer is an Ada source code analyzer that detects run-time and logic errors. It assesses potential bugs before program execution, serving as an automated peer reviewer, helping to find errors efficiently and early in the development life-cycle. It can also be used to perform impact analysis when introducing changes to the existing code, as well as helping vulnerability analysis. Using control-flow, data-flow, and other advanced static analysis techniques, CodePeer detects errors that would otherwise only be found through labor-intensive debugging.
-
Product
Roughness Testers
-
Roughness is an important parameter when trying to find out whether a surface is suitable for a certain purpose. Rough surfaces often wear out more quickly than smoother surfaces. Rougher surfaces are normally more vulnerable to corrosion and cracks, but they can also aid in adhesion. A roughness tester is used to quickly and accurately determine the surface texture or surface roughness of a material. A roughness tester shows the measured roughness depth (Rz) as well as the mean roughness value (Ra) in micrometers or microns (µm). Measuring the roughness of a surface involves applying a roughness filter. Different international standards and surface texture or surface finish specifications recommend the use of different roughness filters. For example, a Gaussian filter often is recommended in ISO standards.
-
Product
Application Security Platform
Sentinel
-
WhiteHat Sentinel is a Software-as-a-Service (SaaS) platform that enables your business to quickly deploy a scalable application security program across the entire software development lifecycle (SDLC). Combining advanced scanning technology with the world’s largest application security research team, we accurately identify your vulnerabilities and scale to meet any demand without slowing you down.
-
Product
Security Testing Service
-
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
Product
Security Testing
-
As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.
-
Product
Static Code Analysis for Embedded Software
GrammaTech CodeSonar®
-
CodeSonar is GrammaTech´s flagship static analysis software. Able to analyze both source code and binary code, it is specifically designed for zero-tolerance defect environments. With its advanced static analysis engine, CodeSonar is one of the most effective tools for eliminating the most costly and hard-to-find software defects early in the application development lifecycle. Compared with other tools, CodeSonar identifies twice as many defects that result in system crashes, leaks, data races, memory corruptions and security vulnerabilities.
-
Product
Veracode Static Analysis
SAST
-
*Find Flaws Accurately, at ScaleScan over 100 languages and frameworks quickly and accurately.*Prioritize and Fix Flaws FastRapidly find and fix vulnerabilities with real-time feedback and reduce flaws introduced in new code by up to 60% with IDE scans.*Deliver a Frictionless Developer ExperienceCode confidently with contextual learning and easy integration with over 40 developer tools and custom APIs.*Streamline Governance, Risk Management, and ComplianceManage and measure the security posture of your applications with enterprise-wide security policies, robust reporting, and comprehensive analytics.
-
Product
eBIRST™ – Switching System Test Tools
-
Switching systems are an important part of many test systems, however, the switching system is in a vulnerable place. When accidents happen that can cause a faulty device, you need a way to get the system up and running again with a minimum of effort and operator skills.
-
Product
Cybersecurity Penetration Testing Assessments
Tripwire Professional Services
-
Organizations do all that they can to protect their critical cyber assets, but they don’t always systematically test their defenses. Penetration tests—otherwise known as pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems. Whether we are testing an application or network environment, Tripwire’s pen testing will not only identify vulnerabilities, but it will also demonstrate them through exploitation—definitively determining if unauthorized access or other malicious activity is possible.
-
Product
Expert-Level Vulnerability Assessments
Vanguard Analyzer
-
Vanguard Integrity Professionals
Vanguard Analyzer™ provides Vanguard expertise on z/OS Security Server. Analyzer delivers expert-level vulnerability assessments of z/OS Security Server configuration controls and security settings with the ability to produce audit results in minutes. Vanguard Analyzer™ provides risk analysis and mitigation requirements in easy to read panels. System auditors can review Analyzer findings in order of priority and mitigate accordingly. Do you have access to expert-level assessment based on severity and vulnerabilities? Are your security analyst armed with invaluable interpretation of assessment findings? Can you provide your company with a detailed explanation, easy to understand risk statements and corrective actions that need to be followed step-by-step?
-
Product
Isolated RS-232
-
Analog Devices offers a wide range of RS-232 transceivers to suit many applications. As RS-232 cable networks and the systems to them can be vulnerable to voltage spikes and ground loops, we have developed a number of innovations that protect against these issues and create an isolated RS-232 environment. We accomplish this through our isoPower® integrated dc-to-dc converters, as well as our iCoupler® technology, which enable the power isolation and signal isolation required for system reliability in a noisy environment.
-
Product
Web Application Penetration Testing
-
Web Application Penetration Testing – to identify, analyze, and report vulnerabilities in a given web application. LGMS adopts a robust technology and process-based approach supported by a well-documented methodology to identify potential security flaws in the web application and the underlying environment.
-
Product
AI-Powered Thermal Traffic Sensor
TrafiSense AI
-
Designed to reliably detect and classify road users, TrafiSense AI is an intelligent thermal imaging sensor for traffic monitoring in complex urban environments. Featuring AI algorithms built on 25+ years of traffic detection and best-in-class thermal imaging, TrafiSense AI delivers continuous vision and data collection for safer, more efficient cities. Capable of tracking multiple objects in any lighting condition, the advanced edge-based AI technology effectively controls intersections, helps protect vulnerable road users, and gathers detailed traffic data for better city planning decisions.
-
Product
P1 Vulnerability Knowledge Base
VKB
-
With more than 1800 identified & listed vulnerabilities P1 Security Vulnerability Knowledge Base (VKB) is a unique telecom-dedicated Vulnerability Database, with absolutely no other equivalent on the market. It is the result of years of expertise and vulnerability assessments successfully led by our engineers on the Core & Radio Networks & Network Elements of many of the biggest Telecom operators in the World.
-
Product
3D AOI with Revolutionary New 3D Measurement
Zenith
-
The Zenith 3D AOI system measures the true profilometricshape of components, solder joints, patterns and even foreignmaterial on assembled PCBs with true 3 dimensional measurement, overcoming the shortcomings and vulnerabilities of 2D AOI.
-
Product
Website Penetration Testing
-
The vulnerabilities in a website need to be proactively fixed before the weaknesses are exploited by hackers, which in turn may lead to loss in customer’s confidence. We at Precise Testing Solution provide extensive planning to conduct website penetration. We check for holes in CRM, extranets, and internal network applications.





























