Cyber Security
See Also: Cyber, Phishing, Pen Testing, DDoS
-
Product
Quantum-Safe Security
CN6000 Series
-
The Centauris CN6000 encryptors may be upgraded to quantum cryptography through the addition of the Cerberis Quantum Key Distribution (QKD) server to ensure that the solutions are quantum-safe for the long-term protection of sensitive data. This also ensures investment-protection of the encryptors. Such quantum cryptography is provably secure, ensures anti-eavesdropping detection and provides long-term forward secrecy against brute force hacking and attacks by quantum computers.
-
Product
Security Testing Consultancy
-
QA Mentor provides an End-to-End security testing services through the array of preventive measures, proven methodology and framework, use of best tools identified through POCs (proof of concepts) and an excellent infrastructure which is using evolving technologies. The backbone of all of these are the industry and project experience QA Mentor and its highly qualified & certified Security Testing Consultants. Our consultants closely work with our customers to assess their system, conduct POC to identify the relevant preventive measure and tools to be used and guide the IT teams of the businesses with a clearly defined roadmap to be followed to secure their systems.
-
Product
Network Security Appliances
-
Full range network appliances for applications such as NGFW, UTM, DPI, IDS/IPS, comes with scalability, modular design, reliability & manageability.
-
Product
Security Testing
-
As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.
-
Product
Cloud Security Solutions
-
Online threats are constantly changing. Offering protection against the largest and most sophisticated attacks, Akamai helps you safeguard your websites and other Internet-facing applications from the risks of downtime and data theft. Built on the Akamai Intelligent Platform, Akamai Cloud Security Solutions provide the scale to stop the largest Distributed Denial-of-Service (DDoS) and web application attacks without reducing performance, as well as intelligence into the latest threats and the expertise to adapt to shifting tactics and attack vectors.
-
Product
100GE Application & Security Test Load Module
CloudStorm
-
Keysight Network Applications and Security
Ixia's CloudStormTM is an industry-first 2.4 terabit application and security test solution that not only meets today’s need, but that of the future. CloudStorm delivers 3X-application and 4X-SSL-emulation scale over any other test system. It helps NEMs shortening their development cycles, and enterprises and data center operators find the right balance between mitigating security risks and delivering high end-user application performance. Emulate multi-terabit DDoS and botnet attacks to future-proof security solutions
-
Product
Network Security Appliances
-
With the development and popularization of cloud computing technologies, traditional network security providers are repositioning and moving their development efforts from network security solutions that can only handle single point security issues to a new generation of network security solution that are effective in big data and cloud computing environments. ICT equipment providers in the network security industry need network security servers that have massive DPI parsing power, full support for NFV and SDN, and a powerful big data processing engine. This equipment must also support dynamic capacity expansion and scalable IO extension in order to adapt to a more complicated cloud environment.
-
Product
Visible Security Cameras - Bullet Cameras
-
Teledyne FLIR Visible Security Cameras, Bullet Cameras
-
Product
Communication Security
-
Shoghi Communications design and development specific Military Grade Crypto System , Shoghi provids end-to-end communication Security (COMSEC) and secure information transfer. Shoghi has strong experience in creating customer specific Algorithms and Key management schemes. All the hardware, inspite of all the complexities can be loaded by the customer themselves with their own algorithm, to enhance the whole security environment.We are known for our open source designs and crypto validated equipment supply to our military customers. In case of any specific design or development, please feel free to get in touch with our team
-
Product
Control, Monitor, Security and Power Management for ATEs
-
Subset of 6TL's FastATE modules designed for the control, monitoring, security, and power management of ATEs (automated test equipment).
-
Product
Agile Application Performance & Security Resilience Test Tool
Developer
-
Keysight Network Applications and Security
Ixia Developer is an agile application performance and security resilience test tool that helps developers find bugs early in the development cycle. Ixia Developer features an integrated debugger that helps locate the primary source of defects. An easy-to-use, fast, and responsive web-based user interface significantly reduces the time it takes to move from test configuration to actual packets on the network. And by leveraging a robust ATI engine, Ixia Developer always includes the most up-to-date apps and security strikes.
-
Product
Security Labs
-
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
Product
Secure CDN
-
Increase your conversion with our global CDN infrastructure to speed up your website load times and provide the highest streaming quality to your customers. Through improved loading times, it has been shown that conversion rates can be improved up to 2,5 times. You also benefit from the highest possible security and compliance for your content. Secure CDN combines all the benefits in one innovative solution.
-
Product
Modernized Navstar Security Algorithm (MNSA) M-code Testing
SimMNSA
-
The M-code signal is part of the security architecture that all new Military GPS User Equipment (MGUE) has been required to use since 2017. Until recently, testing with non-classified AES-encryption and replay of M-code Satellite Data Sets (SDS) have been the only methods authorized for GPS M-code receiver testing using a constellation simulator.
-
Product
Security Testing
-
We protect your business from cyber attacksSecure online transactionsPrevent unauthorized accessMinimize the risk of data lossEnhance resistance to DoS attacks
-
Product
InfiniStreamNG Platform
-
NETSCOUT’s new InfiniStreamNG™ platform harnesses the power of IP intelligence by mining traffic in real-time to deliver accurate and actionable data for service assurance, cybersecurity and business intelligence applications. The InfiniStreamNG platform fully supports the nGeniusONE® and Iris application suites.
-
Product
App and API Security
-
Defend against a wide range of multi-vector attacks. Intelligent protection, end to end.
-
Product
Power, Environmental, Security & Connectivity Hardware
-
Panduit power distribution, environmental, and connectivity hardware products improve availability, scalability, power, cooling efficiency, and product quality, which also minimizes network downtime and increases data center productivity.
-
Product
Cloud Security Testing
-
RedWolf is the premium cloud-DDoS testing provider globally. We offer an easy-to-use testing system that is either self-serve or guided by RedWolf experts with years of experience helping secure the worlds largest and most complex enterprise networks.
-
Product
ARINC 615/615A Integrated Secure PDL & Transport Solution
PDL-615-XT
-
Avionics Interface Technologies
The PDL-615-XT is a rugged ARINC 615 & ARINC 615A Secure PDL solution integrated with a rugged, portable, storage and transport case.
-
Product
Enhance Secure Control Applications
MachXO3D
-
*Simplifies implementation of hardware security by integrating Root-of-Trust in your platform’s first on, last off device*Supports security throughout the product lifecycle including device manufacturing and transport, platform manufacturing, installation, operation and decommissioning
-
Product
Secure DNS
-
DNS attacks are still a regular occurrence for cybercriminals and many companies are targeted by such attacks not only once a year. With Secure DNS, you not only ensure secure access to your website, but also benefit from extra protection against such attacks.
-
Product
Scalable for High Performance Application and Security Needs
PerfectStorm 40/10GE Load Module
-
Keysight Network Applications and Security
Equipped with powerful multi-core, multi-threaded network processors, PerfectStorm 40 GbE is designed to satisfy the testing needs of manufacturers needing speed flexibility in their testing resources. Networking equipment manufacturers building new equipment or service providers and large enterprises integrating this them benefit from testing and verifying performance and functionality prior to deployment.
-
Product
NETWORK SECURITY
-
Network Critical Solutions Limited
Network Critical gives all your security systems complete, uncompromising visibility into what’s happening on the network. Get better overall ROI by improving performance of existing security systems to keep pace with increasing network speed and complexity, while gaining the insight needed to better detect, contain and recover from breaches fast.
-
Product
Security intelligence & analytics
-
Detect and prioritize threats that pose the greatest risk. dentify high-risk threats with near real-time correlation and behavioral anomaly detection. Detect vulnerabilities, manage risks and identify high-priority incidents among billions of data points.Gain full visibility into network, application and user activity.
-
Product
Cross Domain Security Solutions
-
Stratign’s Cross Domain Security Solutions are highly trusted, government-accredited network security components that control and, if necessary, block the flow of data between two security domains at all layers.
-
Product
Application Security Testing Solution
CxIAST
-
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.
-
Product
Cyber Forensics
-
Cyber Forensics deals in safeguarding the digital evidence gathered during the cyber attack, identifying the duration of the attack, and locating the geographical location of the attack followed by mapping them.





























