Application Security
vulnerabilities identification and remediation software.
-
Product
Bulkhead Penetrator for Subsea Applications with 4, 7, or 12 Circuits, 30 A
P1.7-30 Electrical Penetrator
-
ODI's P1.7-30 penetrators meet the same electrical performance characteristics as Nautilus connectors and are used where the need to mate and demate is not necessary, generally at the second end of a pressure-balanced oil-filled (PBOF) assembly with a Nautilus connector at the opposite end. The Penetrator is typically attached directly to a vessel, which can be either pressure balanced or at 1 ATM.
-
Product
Business Application
-
Business Application testing encompasses verification and validation services to support Quality Assurance and Control of business applications. Application testing ensures that all aspects of the application like its functionality, integration, performance, security, and usability are working as expected.
-
Product
Security and Traffic Monitoring System
-
Information System Technologies Inc.
ISTI’s versatile sensor nodes can support multiple sensing types including acoustic, seismic, visible/IR, and scanning laser. Several eye-safe scanning lasers form a distributed wireless sensor network and can continuously and accurately track as well as monitor ground vehicles and personnel in a surveillance area. This system provides super-fine angular and range resolution to precisely locate moving targets. Among other key benefits are: day/night operational capability, continuous monitoring and surveillance without blind spots, 360 degrees field-of-view, large coverage area, multiple closely spaced target tracking, threat classification, and automatic alarm generation. The system can be used in applications such as traffic monitoring, intrusion detection, border control, airport runway collision and incursion avoidance, and perimeter security.
-
Product
DDS-Based Platform for Autonomous Robotic Applications
NeuronSDK
-
ADLINK’s Neuron SDK is an integrated software package for fast prototyping of robotics applications on ROS 2. Neuron SDK is a comprehensive and user-friendly solution that guides you through the process of prototyping and testing robot applications on ROS 2 with ease. For advanced use cases, Neuron SDK is equipped with Neuron Comm which includes DDS and shared memory mechanism to further make communication more reliable.
-
Product
Network Security
TrustMonitor™
-
TrustMonitor™ provides continuous monitoring of the trust network by:*(Analyzing content & constraints for validity of credentials*Monitoring that certificate authorities are available to support validation*Easily scaling to incorporate new certificate authorities (no agent required)
-
Product
Application Specific Board Bundles
AppliPaks
-
AppliPaks are fully integrated, custom configured board level embedded computing board sets combining an OpenVPX, VME, VME64x or CompactPCI single board computer with your choice of storage and / or I/O mezzanine cards, operating systems and device drivers.
-
Product
Break The Rules Of Power, Size And Cost In Your Connectivity And Acceleration Applications
ECP5 / ECP5-5G
-
*Up to 3.2 Gbps SERDES rate with ECP5, and up to 5 Gbps with ECP5-5G*Up to 4 channels per device in dual channel blocks for higher granularity*Enhanced DSP blocks provide 2x resource improvement for symmetrical filters*Single event upset (SEU) mitigation support*Programmable IO support for LVCMOS 33/25/18/15/12, XGMII, LVTTL, LVDS, Bus-LVDS, 7:1 LVDS, LVPECL and MIPI D-PHY input/output interfaces
-
Product
Application Specific LC System
Reducing Sugar Analysis System
-
The Nexera reducing sugar analysis system uses Shimadzu’s unique post-column boric acid-arginine fluorescence derivatization method. Unlike the refractive index detectors and evaporative light scattering detectors (ELSD) commonly used for sugar analysis, this system reduces the effects of impurities and offers both high sensitivity and a wide dynamic range. As a result, sugars contained in samples can be analyzed simultaneously, without dilution even when there are significant concentration differences.
-
Product
2U Rackmount Network Appliance With Dual 3rd Gen Intel® Xeon® Scalable Processors, Up To 8 NMC Slots. Ideal For Enterprise Network Security.
FWA-6171
Network Appliance
Dual 3rd Gen Intel® Xeon® Scalable Processors, up to 38 Cores32 x DDR4 ECC RDIMM slotsHot-swap 2.5" disk bays and system fan, redundant PSU, 1 x FH/HL Gen4 PCIe x16 slotRedundant BIOS and BMC imageIPMI v2.0 compliant, with web interface8 x Advantech network module expansions w/ PCIe Gen4 bandwidth
-
Product
MS Windows Application
NET-NMSC
-
The NET-NSMC Client is a MS Windows application that communicates with the NET-ESVR remotely and in any place with Internet access. Multiple users can access the NET-xTVMS system at the same time. The Client is the main and only interface to the system. It provides realtime status information from the server such as:
-
Product
Quantum-Safe Security
CN9000 Series
-
The Centauris CN9000 Series is the first commercially available certified high-assurance 100Gbps Ethernet encryptor that supports the most complex fully meshed topologies – enabling 100% security for Big Data, Cloud and data centre services’ ultra-fast networks.
-
Product
Cybersecurity and Compliance Solution
Application Audit
-
Application Audit, Compuware's mainframe cybersecurity and compliance solution, enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Using Application Audit, security staff can: Deter insider threats by capturing and analyzing start-to-finish user session activity. Integrate user behavior intelligence with popular SIEM engines to analyze the overall application environment. Support criminal/legal investigations with complete and credible forensics. Fulfill compliance mandates regarding protection of sensitive data. The Value of Application Audit. Provides deep insight into user behavior including data viewed, by whom and which applications were used to access it. Enables immediate analysis through the automatic delivery of data to SIEM platforms such as Splunk and QRadar, either directly or in combination with CorreLog zDefenderTM for z/OS or Syncsort Ironstream. Delivers granular intelligence and reporting capabilities needed to comply with regulations such as HIPAA and GDPR as well as security policies. Eliminates dependency on specialized mainframe knowledge. Separates the system administrator's duties from mainframe-inexperienced auditor's responsibilities with a web UI, so that no single person is in a position to engage in malicious activities without detection.
-
Product
Perimeter Security And Coastal Surveillance Systems
-
These systems comprise of Radars and Cameras and can give early warming to the commanders about any intrusion/breach of perimeter of any restricted area. These can be integrated with jammers to tackle drone threats too.
-
Product
Security Testing Service
-
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
Product
Security Policy Change Automation
FireFlow
-
Confidently automate your security policy change process - from planning through risk analysis, implementation and validation.
-
Product
Rackmount Network Appliance With Dual AMD EPYC™ 9004 Processors For Gateway And NGFW. Ideal For High-Performance Network Security.
FWA-6183
Network Appliance
Dual AMD EPYC™ 9004 Processors, up to 256 Cores16 x DDR5 ECC RDIMM slotsHot-swap 2.5" disk bays and system fan, redundant PSU, 1 x HH/HL Gen5 PCIe x16 slotIntegrated security features with secure boot, memory encryption, virtualization, and multi-key encryptionIPMI v2.0 compliant, with web interface8 x Advantech network module expansions w/ PCIe Gen5 bandwidth
-
Product
API Security Testing
-
In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:
-
Product
Custom IoT Application Development Services
-
Our innovative approach has been successfully delivered top-quality enrich IoT solutions for connected devices to our clients. Our expertise IoT team always follows best practices of the IoT ecosystem for delivering high-speed IoT applications with seamless connectivity with multiple 3rd party systems. #text-1076059564 { font-size: 1.35rem; text-align: left;}
-
Product
Pressure Transmitter For Industrial Applications, Ratiometric Output
Series 21 C
-
KELLER AG für Druckmesstechnik
The C-series transmitters are noted for their ability to deliver high accuracy over a wide temperature range. This is achieved by means of mathematical modelling of the sensor characteristics and digital compensation. In order to do this, each transmitter is gauged over pressure and temperature, programmed and checked after calibration in the same test set-up.
-
Product
Secure Voice & Data Communications in EURO-ISDN
ELCRODAT 6-2
-
Rohde & Schwarz ELCRODAT products protect voice and data communications in digital and analog armed forces and government networks in all German and NATO security classifications.The ELCRODAT 6-2 is the first encryption unit approved for transmitting information classified as TOP SECRET that uses a public key method for key agreement. Together with the public key method, the noise generator in the encryption unit enables mutual authentication and key agreement. New session keys are generated in the encryption unit for each connection. The keys do not leave the units and are deleted after the session for maximum security.
-
Product
Web Application / Services Testing Tool
JMeter™
-
The Apache Software Foundation
Apache JMeter may be used to test performance both on static and dynamic resources (Webservices (SOAP/REST), Web dynamic languages - PHP, Java, ASP.NET, Files, etc. -, Java Objects, Data Bases and Queries, FTP Servers and more). It can be used to simulate a heavy load on a server, group of servers, network or object to test its strength or to analyze overall performance under different load types. You can use it to make a graphical analysis of performance or to test your server/script/object behavior under heavy concurrent load.
-
Product
Radar level sensors: applications & products
-
Our radar level sensors offer reliable, fast level measurement with micrometer-level accuracy. This opens up new applications for level measurement – for example, in the level control of molten steel or aluminum for the metal industry or in the high-precision flow measurement of bulk material on conveyor belts for the mining industry.
-
Product
DC Power Supply With Scope, Arbitrary Waveform Generator, Automotive Application Features, And PathWave BenchVue Software Bundle
E36154ABVX
DC Power Supply
The Keysight E36154ABVX consists of a Keysight E36154A DC power supply, a Keysight E36150ADVU Scope View and arbitrary waveform generation (AWG) capabilities, a Keysight E36150ATMU Automotive Standards Testing Capabilities with Enhanced Programming Speed, ISO Preset Library, Playback Simulation and E-Logging features, and Keysight BV9200B PathWave BenchVue advanced power control analysis software. The E36154A includes single-output and auto-range capabilities, 30V, 80 A, 800 W, and LAN and USB interfaces.
-
Product
Network and Application Monitoring
IxChariot
-
Instant performance assessment of complex networks from pre- to post-deployment
-
Product
Applications Services
-
DXC is your trusted partner to help you simplify, modernize, and accelerate mission-critical applications that support business agility and growth. Take advantage of the latest digital platforms with both custom and packaged applications, ensure resiliency, launch new products and enter new markets with minimal disruption.
-
Product
Electronic Tensile Strength Tester Pull Force Test Chamber Applicable Industri
-
Shenzhen Chuangxin Instruments Co., Ltd.
This machine can test various materials (both finished and semi-finished products ) of tensile strength ,compressive strength and elongation ,can do stripping ,tear strength ,flexural ,compression test and etc. It can connect up to the computer and display or printout the test times , test value , max. value , etc . Also it can make various report forms according to the requirements .
-
Product
Electrical Receiver Conformance Test Application for OIF-CEI 4.0
M809256CB
-
OIF-CEI 4.0 receiver test application for OIF-CEI 56G very short reach, medium reach, and long reach PAM4.
-
Product
Edge Analytics Applicance
REA-C1000
-
Grab your audience’s attention and increase their engagement with intelligent video analytics technology. No matter where the speaker is standing, the handwriting extraction feature ensures that any words and diagrams written on a board or screen remain in full view to the audience — via AR (augmented reality). The Chromakey-less CG Overlay feature enables the presenter to deliver impactful supporting content, in real-time without a dedicated studio or specialized content creators.





























