Cyber Security
See Also: Cyber, Phishing, Pen Testing, DDoS
-
product
CCTV Security Testers
CCTV Security Tester is a kind of multi-function test tool for CCTV and security camera installation professionals. CCTV Camera Tester is developed aiming to CCTV security system installation and maintenance, combining the following function: Optical Fiber Communication test, low power circuit test, video test and PTZ control, and DC12 1A output for camera test, etc. Helps solving varies problem of security system. It could be also used in laboratory tests, equipment maintenance, etc. CCTV Tester is really an ideal multi-function instrument for CCTV Security System, Optical Fiberal Communication, CATV and other optical fiber networks.
-
product
Secure Flexible and Automated Hybrid Cloud Infrastructure
KnackStack
KnackStack introduces flexible and automated hybrid cloud infrastructure as a service for cloud agnostic deployments and automation. It's designed for the U.S. nation's most secure applications to automate data management and security.
-
product
Quantum-Safe Security
CN4000 Series
The CN4000 series are the ideal optimized, high-performance encryptors for Small to Medium Enterprises (SME). They also enable an ideal cost effective “encrypt everywhere” solution for Large Enterprises. Despite their small form-factor, the CN4000 Series encryptors have the same robust security credentials as the rack-mounted models.
-
product
Virtualized Security Resilience Testing
BreakingPoint VE
Keysight Network Applications and Security
Ixia BreakingPoint Virtual Edition (VE) provides real-world application and threat simulation for complete performance and security testing, and its elastic deployment model allows you to achieve security resilience without sacrificing scalability or flexibility.
-
product
Network Centric Secure Router
The system utilizes a 26-port layer 2/3 Gigabit Ethernet switch with embedded 32-bit CPU.It supports combinations of up to 26 SGMII ports consisting of 12 GbE Cu PHYs, 12 SGMII interfaces, two of which support 1G/2.5G, and up to three QSGMII ports. One of the SGMII ports can be dedicated to the CPU for packet insertion and extraction. The devices meet IEEE 802.3az requirements for green energy efficient Ethernet.
-
product
DeepCover Embedded Security in IoT Authenticated Sensing and Notification
MAXREFDES143#
The MAXREFDES143# is an Internet of Things (IoT) embedded security reference design, built to protect an industrial sensing node by means of authentication and notification to a web server. The hardware includes a peripheral module representing a protected sensor node monitoring operating temperature and remaining life of a filter (simulated through ambient light sensing) and an mbed shield representing a controller node responsible for monitoring one or more sensor nodes. The design is hierarchical with each controller node communicating data from connected sensor nodes to a web server that maintains a centralized log and dispatches notifications as necessary. The mbed shield contains a Wi-Fi module, a DS2465 coprocessor with 1-Wire® master function, an LCD, LEDs, and pushbuttons. The protected sensor node contains a DS28E15 authenticator, a DS7505 temperature sensor, and a MAX44009 light sensor. The mbed shield communicates to a web server by the onboard Wi-Fi module and to the protected sensor node with I2C and 1-Wire. The MAXREFDES143# is equipped with a standard shield connector for immediate testing using an mbed board such as the MAX32600MBED#. The simplicity of this design enables rapid integration into any star-topology IoT network requiring the heightened security with low overhead provided by the SHA-256 symmetric-key algorithm.
-
product
Full-HD Mini Dome Security Camera
FLIR ARIEL™ CM-3202
The Ariel CM-3202 mini dome camera offers 1080p video and fast frame rates in high-motion, low light scenes. True wide dynamic range (WDR) on the CM-3202 captures sharp video in complex environments, such as critical infrastructure sites, commercial offices, and large campuses. With a strong H.265 built-in motion processing architecture, the Ariel CM-3202 mini dome delivers predictable, efficient streaming and storage, reducing utility costs and total cost of ownership (TCO).
-
product
Pull tester for security testing
SAFOR 2000
The Safor portable tester is an accurate unit, designed for testing the pulling force of fixings prior to being put into service. Easily prevent accidents by testing on site the fixings to install end brackets and safety harness eyebolts.
-
product
Voice Systems for Safe, Secure, & Efficient Communications
Rohde & Schwarz offers flexible and cost-effective communications system solutions that meet all scalability and reliability requirements for civil and defense use cases regardless of the application domain - in the air, on the ground or at sea Multi-redundant, IP based voice communications systems ensure safe, secure and efficient voice communication, combining state-of-the-art, flexible and resilient IP based architecture with strong security mechanisms.
-
product
Security Testing Services
By testing the flaws in software, our security testing services seek to remove vulnerabilities before the software is deployed or purchased. By focusing on the different layers of an information system across the database, infrastructure, network, and access channels such as mobile, security testing looks at making the applications free from vulnerabilities. We assist online service providers, website owners, and independent software vendors to manage application security risks. We offer a comprehensive range of white, grey, or black-box model security testing based on your stage in the development cycle.
-
product
Cross Domain Security Solutions
Stratign’s Cross Domain Security Solutions are highly trusted, government-accredited network security components that control and, if necessary, block the flow of data between two security domains at all layers.
-
product
Security Consulting
Our Managed Security Services can dramatically improve your ongoing security posture through more frequent, cost effective security assessments, helping you to identify, assess and manage risk.
-
product
Thermal Analytics Security Camera
Elara™ FB-Series ID
The FLIR Elara™ FB-Series ID thermal security camera uses onboard analytics to classify human or vehicular intrusions, making it ideal for perimeter intrusion detection and sterile-zone monitoring. The Elara™ FB-Series ID can also hand off classified intrusions to FLIR PTZ cameras for autonomous tracking of intruders. Easy to set up, Elara™ FB-Series provide reliable detection with low false alarm rates in challenging environments, bad weather, and complete darkness.
-
product
Secure Hardened Android Phone
Shoghi has designed a totally Secure Hardened Android phone, which comes with a Specialized Operating system to prevent Hackers from remotely compromising your device , from all major vulnerabilities and exploits including protection from zero-days.
-
product
Cyber Drill And Blue Team Exercise Stimulation
LGMS Security Team will approach the Cyber Drill as a simulation of the possible occurrences during a cyber incident. Based on the defined scenario, LGMS Security Team will perform a technical simulation so as to accurately capture the responses of client’s team in responding to such incidents.In order to obtain the best results, LGMS Security Team will only use information that can be obtained either through public information or by any means of deception techniques.
-
product
Security Labs
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
product
Security Testing Consultancy
QA Mentor provides an End-to-End security testing services through the array of preventive measures, proven methodology and framework, use of best tools identified through POCs (proof of concepts) and an excellent infrastructure which is using evolving technologies. The backbone of all of these are the industry and project experience QA Mentor and its highly qualified & certified Security Testing Consultants. Our consultants closely work with our customers to assess their system, conduct POC to identify the relevant preventive measure and tools to be used and guide the IT teams of the businesses with a clearly defined roadmap to be followed to secure their systems.
-
product
Secure Voice & Data Communications in EURO-ISDN
ELCRODAT 6-2
Rohde & Schwarz ELCRODAT products protect voice and data communications in digital and analog armed forces and government networks in all German and NATO security classifications.The ELCRODAT 6-2 is the first encryption unit approved for transmitting information classified as TOP SECRET that uses a public key method for key agreement. Together with the public key method, the noise generator in the encryption unit enables mutual authentication and key agreement. New session keys are generated in the encryption unit for each connection. The keys do not leave the units and are deleted after the session for maximum security.
-
product
Secure Wearable Solutions
From ST31 secure microcontrollers to ST54 solutions integrating NFC controller, secure element and eSIM, ST offers a complete range of solutions for payment, transit and multiple contactless services. ST's technology is ideal for applications that require a card emulation function but are environmentally challenged or have limited space for the antenna.
-
product
Global Security Cameras
Our products optimize the reaction time and push the operational envelope!
-
product
Cloud Security Testing
RedWolf is the premium cloud-DDoS testing provider globally. We offer an easy-to-use testing system that is either self-serve or guided by RedWolf experts with years of experience helping secure the worlds largest and most complex enterprise networks.
-
product
Communication Security
Shoghi Communications design and development specific Military Grade Crypto System , Shoghi provids end-to-end communication Security (COMSEC) and secure information transfer. Shoghi has strong experience in creating customer specific Algorithms and Key management schemes. All the hardware, inspite of all the complexities can be loaded by the customer themselves with their own algorithm, to enhance the whole security environment.We are known for our open source designs and crypto validated equipment supply to our military customers. In case of any specific design or development, please feel free to get in touch with our team
-
product
Intelligent Chatbot for Network Security Policy Management
AlgoBot
AlgoBot, is an intelligent chatbot that handles network security policy management tasks for you. AlgoBot answers your questions, submitted in plain English, and personally assists with security policy change management processes – without requiring manual inputs or additional research.
-
product
Security & Defence
At Kromek we design, develop, produce, and distribute products and solutions for the Security & Defence sectors, including, but not limited to defence, border control, homeland security and emergency services.
-
product
Industrial & Security
D-Matrix
The D-Matrix Gamma Ray Imager is a fully integrated, photon-counting, pixilated, 12-bit energy discriminating CZT detector/imager.
-
product
NETWORK SECURITY
Network Critical Solutions Limited
Network Critical gives all your security systems complete, uncompromising visibility into what’s happening on the network. Get better overall ROI by improving performance of existing security systems to keep pace with increasing network speed and complexity, while gaining the insight needed to better detect, contain and recover from breaches fast.
-
product
IT Security & Anti-Virus Testing Services
The AV-TEST Institute is a leading international and independent service provider in the fields of IT security and anti-virus research. The aim of the research work carried out by AV-TEST is to directly detect the latest malware, to analyse it using state-of-the-art methods and to inform our customers of the top-quality results obtained.
-
product
Network Security Object Management - AlgoSec AddOns
ObjectFlow
Manage network security objects across your entire multi-vendor network.
-
product
Security Testing
Security/negative testing is typically conducted during development to highlight how a DUT handles abnormal conditions like very high traffic load, different frame sizes (incl. undersized and oversized frames), framed with different IFG settings, various types of errors and deviation of the signal frequency, as well as various DDoS attacks.





























