Cyber Security
See Also: Cyber, Phishing, Pen Testing, DDoS
-
Product
SST Security Assessment
-
Self-Service Terminal (SST) penetration testing is an activity which identifies vulnerabilities in SST that may potentially exist due to the lack of physical security measures, technical configuration or process controls.
-
Product
Security Products
-
Security is no longer an option; it’s a requirement. As your trusted provider of platform security solutions, our comprehensive portfolio addresses a variety of threat models.
-
Product
Cyber Threat Assessment Program
-
Scientific Research Corp. STI Division
SRC provides threat assessment support focused on cyber threats that may impact the ability to wirelessly link with other systems. This activity supports the development of test and evaluation capabilities important to not only identifying current deficiencies but also for developing next generation systems.
-
Product
Industrial & Security
-
Kromek's custom configurations of Cadmium Zinc Telluride (CZT) based detector tiles and linear arrays can be implemented into custom Advanced Imaging platforms for various Industry and Security applications.
-
Product
Quantum-Safe Security
CN4000 Series
-
The CN4000 series are the ideal optimized, high-performance encryptors for Small to Medium Enterprises (SME). They also enable an ideal cost effective “encrypt everywhere” solution for Large Enterprises. Despite their small form-factor, the CN4000 Series encryptors have the same robust security credentials as the rack-mounted models.
-
Product
Security Testing
-
For an application to be successful, it has to ensure the security of the customer’s data, which in turn helps to gain the trust of the customers, avoid legal battles, and enables growth in business.
-
Product
Secure Access
-
Schweitzer Engineering Laboratories, Inc.
Devices with secure access authenticate users, control privileges, and create audit trails.
-
Product
Checkpoint Security System
ConneCT
System
The ConneCTTM Checkpoint Security System is an advanced aviation security explosive detection system (EDS) engineered to deliver superior threat detection, dramatically improved passenger throughput, and low total cost of ownership.
-
Product
Network Security Object Management - AlgoSec AddOns
ObjectFlow
-
Manage network security objects across your entire multi-vendor network.
-
Product
Application Security Platform
Sentinel
-
WhiteHat Sentinel is a Software-as-a-Service (SaaS) platform that enables your business to quickly deploy a scalable application security program across the entire software development lifecycle (SDLC). Combining advanced scanning technology with the world’s largest application security research team, we accurately identify your vulnerabilities and scale to meet any demand without slowing you down.
-
Product
Thermal Security Camera
Elara™ FC-Series O
-
The Elara™ FC-Series O thermal security camera is one of FLIR’s premium thermal security cameras for perimeter protection. The Elara FC-Series O integrates with external video analytics devices, such as FLIR’s TRK or third party solutions, to classify human or vehicular intrusions. The Elara FC-Series O also offers a wide range of high-performance lenses, with a choice of resolutions, offering greater flexibility for tailoring security systems to specific site conditions.
-
Product
Security Vehicles
-
When you need to set up robust security operations in a temporary or outdoor location, our security vehicles can provide a tried and tested solution. For use at festivals, public ceremonies, sports events and other outdoor functions, our mobile check point and scan truck will help keep your guests or members of the public safe from security threats.
-
Product
Secure Smartphone - Salus
-
Stratign’s Salus Smartphone is a high-end smartphone built from the ground-up and protects you from eavesdropping, malware, data breaches and any attempts to hack or tamper with your mobile communications and data.
-
Product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 10GE/40GE Appliance
-
Keysight Network Applications and Security
Building upon the terabit-scale PerfectStorm platform, PerfectStorm ONE™ appliances offers enterprises, service providers, and technology vendors a revolutionary solution for generating stateful applications and malicious traffic, simulating millions of real-world end-user environments to test and validate infrastructure, a single device, or an entire system.
-
Product
Secure Flexible and Automated Hybrid Cloud Infrastructure
KnackStack
-
KnackStack introduces flexible and automated hybrid cloud infrastructure as a service for cloud agnostic deployments and automation. It's designed for the U.S. nation's most secure applications to automate data management and security.
-
Product
Trusted & Secure Servers
-
A part of the EnterpriseSeries™ product line, Mercury’s RES Trust servers employ U.S. designed and manufactured motherboards with embedded Intel® processors and composable BuiltSECURE™ framework to deliver trusted performance for the most security-imperative mission critical applications. RES Trust servers can be configured with a variety of nation-state-level security features. System security features enable customer Foreign Military Sales (FMS) or Direct Commercial Sales (DCS) program success.
-
Product
Security Labs Community Edition
-
*Hack and Patch Real Applications- Get hands-on experience with top vulnerabilities and see the fix impact in a live app, in real-time.*Level-Up Your Coding Approach- Add secure coding to your list of skills by fixing issues that you face regularly, in the languages you’re most comfortable with. *Complete Labs in Minutes- With labs under 10 minutes, you can learn fast and gauge your progress in real-time for quick feedback.
-
Product
Open Source Service to Help Secure and Trust Your Software
Community Attestation Service / CAS
-
- CAS stores all signatures inside of immudb, the standard for open source immutable databases.- CAS is protected against tampering. All attestation data is integrity-checked and cryptographically verified by the CAS client.- CAS is also protected against MITM attacks. The public key below is checked by every communication.A Software Bill of Materials (SBOM) is a list of components in a piece of software.Like a list of ingredients on food packaging -- where you might consult a label to avoid foods that may cause an allergy -- SBOMs can help companies avoid use of software that may harm their organization.If defects are later found in a specific part, the SBOM makes it easy to locate affected products.
-
Product
Thermal Security Camera with Onboard Analytics
Triton™ F-Series ID
-
The FLIR Triton™ F-Series ID thermal security cameras set the new standard of perimeter protection for critical infrastructure. The Triton F-Series ID features best-in-class thermal imaging detail and high-performance onboard analytics for classifying human or vehicular intrusions. FLIR’s premium line offers five models with full 640 × 480 thermal resolution, longer detection ranges, and better analytics performance than ever before.
-
Product
E2E Security Connector
-
The E2E Security Connector is a cloud solution for enhancing the security level of your system. It provides secure generation and management of confidential data during the pre-personalization process of your connected devices as well as different protection schemes for its application and data transportation layer.
-
Product
Security Consulting
-
Our Managed Security Services can dramatically improve your ongoing security posture through more frequent, cost effective security assessments, helping you to identify, assess and manage risk.
-
Product
Visible Security Cameras - Specialized Cameras
-
Teledyne FLIR's Specialized Visible Security Cameras
-
Product
Advanced Sensors & Security Systems
-
Applied Research Associates, Inc.
ARA has provided security services since the mid-1980s and today provides tools to maximize physical security that are highly scalable and affordable, offering our government and commercial customers advanced perimeter security, threat pattern analysis, and intrusion detection. We integrate our detection and assessment capabilities to provide a real-time, complete operational picture to keep personnel and assets secure, day and night. Our engineers are experts in design and integration of multiple sensor types and other intrusion detection systems to create customizable, integrated mobile security systems.
-
Product
SQL Secure
-
SQL Secure dramatically reduces the complexity and manual effort required to analyze, audit, and manage SQL Server security. It allows Database Administrators (DBAs) to confidently answer the critical question: “Who has access to what, where, and how?”—across on-premises and cloud-based SQL Server environments.
-
Product
Security Testing Service
-
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
Product
Network Centric Secure Router
-
The system utilizes a 26-port layer 2/3 Gigabit Ethernet switch with embedded 32-bit CPU.It supports combinations of up to 26 SGMII ports consisting of 12 GbE Cu PHYs, 12 SGMII interfaces, two of which support 1G/2.5G, and up to three QSGMII ports. One of the SGMII ports can be dedicated to the CPU for packet insertion and extraction. The devices meet IEEE 802.3az requirements for green energy efficient Ethernet.
-
Product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 1GE/10GE Appliance
-
Keysight Network Applications and Security
PerfectStorm ONE facilitates network and security proof-of-concepts (POCs) and assessments, all in a compact device. This POC-in-a-box enables enterprises and service providers to select optimal devices and right-size data centers, as well as providing device vendors with a platform to fully showcase their product’s performance, resiliency, and throughput under realworld traffic loads.
-
Product
Intelligent Checked Baggage Security
-
We offer advanced technology for checked baggage screening in our portfolio of explosives detection systems. We provide high resolution, 3D images of passenger bags and parcels to rapidly identify prohibited and dangerous items in real time.
-
Product
Visible Security Cameras - Dome Cameras
-
Teledyne FLIR Visible Security Cameras - Dome Cameras





























