-
Product
Expert-Level Vulnerability Assessments
Vanguard Analyzer
-
Vanguard Integrity Professionals
Vanguard Analyzer™ provides Vanguard expertise on z/OS Security Server. Analyzer delivers expert-level vulnerability assessments of z/OS Security Server configuration controls and security settings with the ability to produce audit results in minutes. Vanguard Analyzer™ provides risk analysis and mitigation requirements in easy to read panels. System auditors can review Analyzer findings in order of priority and mitigate accordingly. Do you have access to expert-level assessment based on severity and vulnerabilities? Are your security analyst armed with invaluable interpretation of assessment findings? Can you provide your company with a detailed explanation, easy to understand risk statements and corrective actions that need to be followed step-by-step?
-
Product
WordPress Vulnerability Scanner
WPScan
-
WPScan is a free, for non-commercial use, black box WordPress vulnerability scanner written for security professionals and blog maintainers to test the security of their sites.
-
Product
Vulnerability Assessment And Penetration Testing
VA&PT
-
If new web applications are installed into your organization’s network, you have shifted your business physically to another network, or if your site requires IT governance and regulatory compliance, you should opt for Penetration Testing.
-
Product
Autonomous PNT Performance and Vulnerability Test Suite
PANACEA
-
PANACEA is an autonomous GNSS performance and threat environment simulator system designed to control simulation hardware and collect data from up to 32 GNSS receivers simultaneously.
-
Product
P1 Vulnerability Knowledge Base
VKB
-
With more than 1800 identified & listed vulnerabilities P1 Security Vulnerability Knowledge Base (VKB) is a unique telecom-dedicated Vulnerability Database, with absolutely no other equivalent on the market. It is the result of years of expertise and vulnerability assessments successfully led by our engineers on the Core & Radio Networks & Network Elements of many of the biggest Telecom operators in the World.
-
Product
Telephone And Line Analyzer
TALAN™ 3.0
-
The TALAN 3.0 Telephone and Line Analyzer represents advanced capability to detect and locate illicit tampering and security vulnerabilities on digital, analog, and VoIP telephone systems. New hardware provides the ability to test twisted pairs against modern telecommunication threats including shield and ground.
-
Product
Intelligent Blind Spot Detection Module
TREK-154
-
AI-based detection and identification of vulnerable road users (VRUs) and vehicles using inner wheel difference technology. Compliant with BSIS, R158, and R159 regulations, 180° ultra-wide detection range. Adjustable alarm areas allow flexible deployment across vehicles of varying heights and types.
-
Product
3D AOI with Revolutionary New 3D Measurement
Zenith
-
The Zenith 3D AOI system measures the true profilometricshape of components, solder joints, patterns and even foreignmaterial on assembled PCBs with true 3 dimensional measurement, overcoming the shortcomings and vulnerabilities of 2D AOI.
-
Product
Security Testing Service
-
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
Product
Website Penetration Testing
-
The vulnerabilities in a website need to be proactively fixed before the weaknesses are exploited by hackers, which in turn may lead to loss in customer’s confidence. We at Precise Testing Solution provide extensive planning to conduct website penetration. We check for holes in CRM, extranets, and internal network applications.
-
Product
Cybersecurity Penetration Testing Assessments
Tripwire Professional Services
-
Organizations do all that they can to protect their critical cyber assets, but they don’t always systematically test their defenses. Penetration tests—otherwise known as pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems. Whether we are testing an application or network environment, Tripwire’s pen testing will not only identify vulnerabilities, but it will also demonstrate them through exploitation—definitively determining if unauthorized access or other malicious activity is possible.
-
Product
Crypto Libraries Test Suite open source
Project Wycheproof
-
A set of security tests for identifying cryptographic vulnerabilities. Project Wycheproof tests crypto libraries against known attacks.
-
Product
Dual Projection 3D In-Line Solder Inspection System
KY8030-2
-
The new KY8030-2 delivers 2x fasterinspection without compromising performanceand accuracy.Using patented dual projection, the systemeliminates the critical Shadow problem thatall 3D SPI systems can be vulnerable to.Easy UI and SPC Plus are included in the systempackage in order to help users achieve faster& easier printer process optimization
-
Product
Acoustic Compound Protection System
ACOMPRIS
-
Static kind of infrastructure is often vulnerable to attacks by either small arms fire (SAF) or mortars. The objects could be for instance a military forward operating base, an embassy or a post from the United Nations. As attacks may occur all the time, persistent and affordable protection is required. Especially when inhibited by civilians, ease of operations use and maintenance become more important. Often installed in remote places far away from the electricity grid, power consumption is an issue.
-
Product
SWIR Imagers
-
SWIR imagers (short wavelength infrared) are an important group of surveillance electro-optical imagers due several reasons. First, advances in InGaAs technology enabled design of relatively low cost SWIR imagers. Second, InGaAs imagers are very sensitive and can generate images of observed scenery even at dark nights. Third, SWIR imagers are less vulnerable to bad atmospheric conditions than TV/LLLTV cameras working in visible/near infrared band. Fourth, SWIR imagers can generate hi-res images even if they are built using much smaller optics than used for design of thermal imagers.
-
Product
Security Testing Services
-
By testing the flaws in software, our security testing services seek to remove vulnerabilities before the software is deployed or purchased. By focusing on the different layers of an information system across the database, infrastructure, network, and access channels such as mobile, security testing looks at making the applications free from vulnerabilities. We assist online service providers, website owners, and independent software vendors to manage application security risks. We offer a comprehensive range of white, grey, or black-box model security testing based on your stage in the development cycle.
-
Product
Application Security Platform
Sentinel
-
WhiteHat Sentinel is a Software-as-a-Service (SaaS) platform that enables your business to quickly deploy a scalable application security program across the entire software development lifecycle (SDLC). Combining advanced scanning technology with the world’s largest application security research team, we accurately identify your vulnerabilities and scale to meet any demand without slowing you down.
-
Product
Ocean Surface Monitor
Current Monitor™
-
sigma S6 Current Monitor™ is a radar-based monitoring system that delivers ocean surface current data from moving stations and both current and bathymetry from fixed locations with high spatial resolution. This greatly improves the management of marine-based activities such as predicting oil slick drift patterns, enhancing navigational safety, and protecting vulnerable coastlines.
-
Product
Static Code Analysis Tool
Klockwork
-
Klocwork integrates seamlessly into desktop IDEs, build systems, continuous integration tools, and any team's natural workflow. Mirroring how code is developed at any stage, Klocwork prevents defects and finds vulnerabilities on-the-fly, as code is being written.
-
Product
Network Security Testing
-
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
Product
Secure Hardened Android Phone
-
Shoghi has designed a totally Secure Hardened Android phone, which comes with a Specialized Operating system to prevent Hackers from remotely compromising your device , from all major vulnerabilities and exploits including protection from zero-days.
-
Product
Power Tester
PS-200
-
It is important to keep your graphic cards powered, but you want to make sure that your graphic cards aren’t overpowered. Not all power supply units have power surge protection, so your graphic cards may be vulnerable to damages from over voltage or over current. Protect your graphic cards now with the new PS-200.
-
Product
Static Analyzer
Julia
-
Julia Static Analyzer is best in class for finding defects and security vulnerabilies in C#, Java and Android applications (for C and C++ languages, please have a look to GrammaTech CodeSonar). By using Julia Static Analyzer, you reduce development and maintenance costs and eliminate risks related to security vulnerabilities and privacy leaks. The powerful analysis technology ensures a maximum precision of results. With advanced dashboarding you can flexibly transform the data into useful information for the different stakeholders.
-
Product
Veracode ELearning
-
When it comes to software, developers are the only ones who can really fix the vulnerabilities in their code. But many lack the requisite skills to identify and remediate vulnerabilities. Existing training materials are often lengthy, irrelevant to the organization’s preferred coding languages, or just plain unengaging.
-
Product
SilverCreek SNMP Tests
-
Set up in less than five minutes - Windows or LinuxCustomize tests via Wizards, Script Generators, and moreAutomate operation with unambiguous test resultsIntegrate with other test harnesses and test toolsIncludes conformance, compliance, vulnerability, robustness, stress, and performance testingInvestigate failures and quickly resolve them with powerful diagnostic and analysis tools
-
Product
Security Labs
-
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
Product
Veracode Static Analysis
SAST
-
*Find Flaws Accurately, at ScaleScan over 100 languages and frameworks quickly and accurately.*Prioritize and Fix Flaws FastRapidly find and fix vulnerabilities with real-time feedback and reduce flaws introduced in new code by up to 60% with IDE scans.*Deliver a Frictionless Developer ExperienceCode confidently with contextual learning and easy integration with over 40 developer tools and custom APIs.*Streamline Governance, Risk Management, and ComplianceManage and measure the security posture of your applications with enterprise-wide security policies, robust reporting, and comprehensive analytics.
-
Product
Application Penetration Testing:
-
Penetration testing (or pen testing) is a simulated security exercise in which ethical hackers attempts to exploit the vulnerabilities of an application system (web or mobile). The objective of this exercise is to identify any possible loopholes present in the system’s defence mechanism which the real hackers could take advantage of. QA Mentor practices the following stages while exercising this:
-
Product
Veracode Dynamic Analysis
DAST
-
Identify and Fix Critical Runtime Vulnerabilities in Web Applications and APIs.* Identify Vulnerabilities in Runtime Environments. Simultaneously scan hundreds of web apps and APIs to find vulnerabilities quickly - including pre-production and staging environments behind a firewall.*Prioritize and Fix Flaws Quickly, A <5% false positive rate allows teams to focus on the vulnerabilities that matter. Detailed, actionable remediation guidance means flaws are fixed faster.*Contribute to a Successful DevSecOps ProgramDynamic scans can be viewed in the Veracode Platform alongside other application security tests, providing multi-faceted insights into the entire security program. Insights and analytics can be used to further improve your DevSecOps program.
-
Product
P1 Telecom Auditor
PTA
-
PTA provides network discovery, security scanning and auditing for SS7/SIGTRAN, GPRS/GTP-C, LTE/Diameter and 5G protocol stacks. PTA enables Security and Telecom Engineers to discover the security level of their networks and assess the vulnerabilities of signaling Network Elements. It also provides CIOs, CTOs & VPs of Engineering, decision makers and top management, the ability to control the evolution of their Core Networks™ security using a dashboard of key indicators.





























