Cyber Security
See Also: Cyber, Phishing, Pen Testing, DDoS
-
Product
GleanPackets
-
Identifying cyber security risks and solving network performance problems are becoming primary concerns for enterprises and small businesses. Many companies record network traffic and store the PCAP files for security forensics at a later time, but it is excruciatingly difficult to manage PCAP files and dig through mountains of information to find the relevant data. Searching through multiple large PCAP files and opening up each one with an analysis program is like looking for a needle in many haystacks. GleanPackets search is a powerful, affordable, and easy to use packet search engine that exports PCAP files to your favorite 3rd party web and mobile applications and network appliances via our REST API. Our user friendly interface will guide you through your searches, enabling you to find the the data you need quickly and painlessly. GleanPackets Search is available in several forms.
-
Product
Industrial Ethernet
-
PLANET Industrial Ethernet equipment is compliant with various industrial protocols and ITS certifications such as MQTT, Modbus, SCADA, EtherCAT EN50155 and E-Mark to meet all the transmission needs, be it Information, Control or Device. PLANET features ERPS Ring, IEEE 1588 PTP, Layer 3 routing, 10G transmissions, cybersecurity and more to ensure high performance and security of our comprehensive Industrial Ethernet collection.
-
Product
Cybersecurity Penetration Testing Assessments
Tripwire Professional Services
-
Organizations do all that they can to protect their critical cyber assets, but they don’t always systematically test their defenses. Penetration tests—otherwise known as pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems. Whether we are testing an application or network environment, Tripwire’s pen testing will not only identify vulnerabilities, but it will also demonstrate them through exploitation—definitively determining if unauthorized access or other malicious activity is possible.
-
Product
Engineering Data Analytics
-
ESI’s Data Analytics solution platform INENDI is a specialized set of solutions that combines state of the art Engineering Data Analytics and management approaches, intuitive visualization and efficient investigation methodologies to allow for a fast discovery of the unknown in large high-dimensional datasets.With INENDI, ESI brings its long-standing innovative capability and its expertise in designing solutions tailored for professionals who need to solve difficult high-value problems into the Cyber Security market.
-
Product
Cyber Assurance
-
As the Internet of Things (IoT) continues to expand, connecting more and more of our world through communication devices, a growing trend has emerged: cyber security threats.
-
Product
Bus Analyzer Software
AltaView
Analyzer
Alta’s Windows avionics analyzer product, AltaView, provides the most modern technologies for MIL-STD-1553 and ARINC-429 network activity and data analysis. Win XP/Server/7/8/10 Compatible and VMware with ENET/NLINE Ethernet. Ideal for Cybersecurity Testing.
-
Product
Cyber Protection System
-
Raytheon’s Cyber Protection System enables enterprises to go beyond traditional CSOC monitoring and establish a response center capable of situational awareness, proactive defense and rapid response. Cyber test ranges: Test the cyber resilience of hardware, software, and networks. Penetration/Malware/Forensics Fly Away Kits: Provide mobile environments to perform testing and analysis at remote facilities. Lab environments: Analyze malware, perform penetration testing and conduct forensics at enterprise scale so analysts can determine the best way to manage them.
-
Product
Industrial & Security
D-Matrix
-
The D-Matrix Gamma Ray Imager is a fully integrated, photon-counting, pixilated, 12-bit energy discriminating CZT detector/imager.
-
Product
Cyber
-
General Dynamics Global Imaging Technologies
The Cyber Domain crosses and integrates with all domains - Land, Sea, Air and Space. We’re designing, building and delivering data protection products and solutions, and web-based SaaS to rapidly strengthen the mission and help our customers successfully navigate the cyber domain.
-
Product
Cyber Crisis Simulator
-
When responding to a cyber crisis, the C-Suite no longer works in a silo. Executive management continuously collaborates with incident response and SOC teams to make well-informed decisions. But tabletop exercises and conventional crisis simulation platforms do not prepare for this new reality.
-
Product
Security Devices
-
Schweitzer Engineering Laboratories, Inc.
Security devices protect perimeters and secure communications within LANs.
-
Product
Security Testing
-
Security/negative testing is typically conducted during development to highlight how a DUT handles abnormal conditions like very high traffic load, different frame sizes (incl. undersized and oversized frames), framed with different IFG settings, various types of errors and deviation of the signal frequency, as well as various DDoS attacks.
-
Product
Global Security Cameras
-
Our products optimize the reaction time and push the operational envelope!
-
Product
API Security Testing
-
Nowadays, APIs are frequently used for communication between two applications. In this communication, lots of sensitive data is transferred between devices and the server.In order to be protected in the event of a data loss or attack, we must secure our API.
-
Product
Portable Security System
Sensor-1
-
The portable security system that fits in the palm of your hand. Sensor-1 detects real-time changes in motion and alerts you when your important items move. Operates independent of the mobile app. Communicates with smartphones, tablets, laptops and desktops.
-
Product
Security & Search Systems
-
Discreet and robust gamma radiation detector, specifically designed for law enforcement and first responders to interdict nuclear and radioactive materials.
-
Product
Cloud Security Testing
-
Using a cloud infrastructure is no more a new phenomenon in the digital world. Businesses use it as a basic practice now a days due to numerous benefits associated with it. Hence, it should be a top most priority for the businesses to secure their cloud infrastructure as that’s the nucleus of their business from all aspects. In cloud security testing, the cloud infrastructure is screened to identify security risks and the areas which can be exploited by the attackers. Cloud security testing is mainly performed to ensure that cloud infrastructure can protect the confidential information of an organization. QA Mentor adopts three different approaches during the cloud security testing process:
-
Product
Secure Wearable Solutions
-
From ST31 secure microcontrollers to ST54 solutions integrating NFC controller, secure element and eSIM, ST offers a complete range of solutions for payment, transit and multiple contactless services. ST's technology is ideal for applications that require a card emulation function but are environmentally challenged or have limited space for the antenna.
-
Product
Hipot & Security Tester
-
Safety testers (also called hipot testers) ensure the safe use of test items in different working environments and under different operating conditions. There are a variety of solutions, depending on the tests required to meet the relevant industry standards. Many test units offer a combination of functionality and performance.
-
Product
Network Security Validation Platform
FireDrill
-
AttackIQ FireDrill is a game changing platform that seamlessly integrates into any existing network, delivering immediate visibility into your security program so you can mitigate risk, and maximize security ROI.
-
Product
Defense & Security
-
Protecting populations from nuclear risk. Our instruments precisely detect and monitor radiation in the most critical and challenging situations, empowering military and civil defense teams to keep populations safe.
-
Product
Network Test and Security
-
Ensuring high performance of wired, Wi-Fi, and 3G/4G/LTE and 5G networks in both pre-deployment and real-world environments while enabling dynamic security intelligence to help stay one step ahead of attacks.
-
Product
Cyber Drill And Blue Team Exercise Stimulation
-
LGMS Security Team will approach the Cyber Drill as a simulation of the possible occurrences during a cyber incident. Based on the defined scenario, LGMS Security Team will perform a technical simulation so as to accurately capture the responses of client’s team in responding to such incidents.In order to obtain the best results, LGMS Security Team will only use information that can be obtained either through public information or by any means of deception techniques.
-
Product
Embedded Security
-
Efficient, reliable, and intuitive: The world-leading end-to-end embedded security builder.
-
Product
Security Testing Services
-
By testing the flaws in software, our security testing services seek to remove vulnerabilities before the software is deployed or purchased. By focusing on the different layers of an information system across the database, infrastructure, network, and access channels such as mobile, security testing looks at making the applications free from vulnerabilities. We assist online service providers, website owners, and independent software vendors to manage application security risks. We offer a comprehensive range of white, grey, or black-box model security testing based on your stage in the development cycle.
-
Product
AlgoSec Platform - Secure Application Connectivity
AlgoSec
-
Use automation to speed up and tighten your security policies.
-
Product
Hardware Security For Programmable System Control
Mach-NX
-
*Up to 8.4K LC of user logic, 2669 kbits of user flash memory and dual boot flash feature*Up to 379 programmable I/O supporting 1.2/1.5/1.8/2.5/3.3 I/O voltages*Secure enclave supports 384-bit cryptography, including SHA, HMAC, and ECC*Configuration of PFR and security functions through Lattice Propel simplifies developer experience*Highly reliable. Low power and 3X better SER performance to comparable CMOS technologies
-
Product
Quantum-Safe Security
CN8000 Series
-
The CN8000 harnesses the power of quantum mechanics to help ensure secure communications – the encryption keys are generated by IDQ’s Quantum Random Number Generator to guarantee inherent and provable randomness. The CN8000 can also be upgraded to be quantum-safe via the Cerberis QKD Blade (quantum cryptography) to ensure long-term protection of the data in transit.





























