Cyber Security
See Also: Cyber, Phishing, Pen Testing, DDoS
-
Product
Thermal Analytics Security Camera
Elara™ FB-Series ID
-
The FLIR Elara™ FB-Series ID thermal security camera uses onboard analytics to classify human or vehicular intrusions, making it ideal for perimeter intrusion detection and sterile-zone monitoring. The Elara™ FB-Series ID can also hand off classified intrusions to FLIR PTZ cameras for autonomous tracking of intruders. Easy to set up, Elara™ FB-Series provide reliable detection with low false alarm rates in challenging environments, bad weather, and complete darkness.
-
Product
High-Performance Application and Security Load Module
PerfectStorm 10/1GE Load Module
-
Keysight Network Applications and Security
Equipped with powerful multi-core, multi-threaded network processors, PerfectStorm 10/1GbE is designed to satisfy the testing needs of manufacturers needing speed flexibility in their testing resources. Networking equipment manufacturers building new equipment or service providers and large enterprises integrating this them benefit from testing and verifying performance and functionality prior to deployment.
-
Product
Tiny Network Appliance With Intel® Celeron® J3355/J3455 For Entry Level SD-WAN And Security Gateway. Ideal For SD-WAN Deployments.
FWA-T011
Network Appliance
Tiny Network Appliance with Intel® Celeron® J3355/J3455Up to 4 x GbE RJ-45 ports4G LTE and Wi-Fi supported (optional)Optional TPM 2.0 or non-TPM supported by requestTiny and fan-less design supported by optional wall/ VESA/ DIN-rail mounting kit
-
Product
Security and Traffic Monitoring System
-
Information System Technologies Inc.
ISTI’s versatile sensor nodes can support multiple sensing types including acoustic, seismic, visible/IR, and scanning laser. Several eye-safe scanning lasers form a distributed wireless sensor network and can continuously and accurately track as well as monitor ground vehicles and personnel in a surveillance area. This system provides super-fine angular and range resolution to precisely locate moving targets. Among other key benefits are: day/night operational capability, continuous monitoring and surveillance without blind spots, 360 degrees field-of-view, large coverage area, multiple closely spaced target tracking, threat classification, and automatic alarm generation. The system can be used in applications such as traffic monitoring, intrusion detection, border control, airport runway collision and incursion avoidance, and perimeter security.
-
Product
Network Security
TrustMonitor™
-
TrustMonitor™ provides continuous monitoring of the trust network by:*(Analyzing content & constraints for validity of credentials*Monitoring that certificate authorities are available to support validation*Easily scaling to incorporate new certificate authorities (no agent required)
-
Product
2U Rackmount Network Appliance With Dual 3rd Gen Intel® Xeon® Scalable Processors, Up To 8 NMC Slots. Ideal For Enterprise Network Security.
FWA-6171
Network Appliance
Dual 3rd Gen Intel® Xeon® Scalable Processors, up to 38 Cores32 x DDR4 ECC RDIMM slotsHot-swap 2.5" disk bays and system fan, redundant PSU, 1 x FH/HL Gen4 PCIe x16 slotRedundant BIOS and BMC imageIPMI v2.0 compliant, with web interface8 x Advantech network module expansions w/ PCIe Gen4 bandwidth
-
Product
Quantum-Safe Security
CN9000 Series
-
The Centauris CN9000 Series is the first commercially available certified high-assurance 100Gbps Ethernet encryptor that supports the most complex fully meshed topologies – enabling 100% security for Big Data, Cloud and data centre services’ ultra-fast networks.
-
Product
Cybersecurity and Compliance Solution
Application Audit
-
Application Audit, Compuware's mainframe cybersecurity and compliance solution, enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Using Application Audit, security staff can: Deter insider threats by capturing and analyzing start-to-finish user session activity. Integrate user behavior intelligence with popular SIEM engines to analyze the overall application environment. Support criminal/legal investigations with complete and credible forensics. Fulfill compliance mandates regarding protection of sensitive data. The Value of Application Audit. Provides deep insight into user behavior including data viewed, by whom and which applications were used to access it. Enables immediate analysis through the automatic delivery of data to SIEM platforms such as Splunk and QRadar, either directly or in combination with CorreLog zDefenderTM for z/OS or Syncsort Ironstream. Delivers granular intelligence and reporting capabilities needed to comply with regulations such as HIPAA and GDPR as well as security policies. Eliminates dependency on specialized mainframe knowledge. Separates the system administrator's duties from mainframe-inexperienced auditor's responsibilities with a web UI, so that no single person is in a position to engage in malicious activities without detection.
-
Product
Perimeter Security And Coastal Surveillance Systems
-
These systems comprise of Radars and Cameras and can give early warming to the commanders about any intrusion/breach of perimeter of any restricted area. These can be integrated with jammers to tackle drone threats too.
-
Product
Security Testing Service
-
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
Product
Security Policy Change Automation
FireFlow
-
Confidently automate your security policy change process - from planning through risk analysis, implementation and validation.
-
Product
Rackmount Network Appliance With Dual AMD EPYC™ 9004 Processors For Gateway And NGFW. Ideal For High-Performance Network Security.
FWA-6183
Network Appliance
Dual AMD EPYC™ 9004 Processors, up to 256 Cores16 x DDR5 ECC RDIMM slotsHot-swap 2.5" disk bays and system fan, redundant PSU, 1 x HH/HL Gen5 PCIe x16 slotIntegrated security features with secure boot, memory encryption, virtualization, and multi-key encryptionIPMI v2.0 compliant, with web interface8 x Advantech network module expansions w/ PCIe Gen5 bandwidth
-
Product
API Security Testing
-
In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:
-
Product
Secure Voice & Data Communications in EURO-ISDN
ELCRODAT 6-2
-
Rohde & Schwarz ELCRODAT products protect voice and data communications in digital and analog armed forces and government networks in all German and NATO security classifications.The ELCRODAT 6-2 is the first encryption unit approved for transmitting information classified as TOP SECRET that uses a public key method for key agreement. Together with the public key method, the noise generator in the encryption unit enables mutual authentication and key agreement. New session keys are generated in the encryption unit for each connection. The keys do not leave the units and are deleted after the session for maximum security.
-
Product
Intelligent Chatbot for Network Security Policy Management
AlgoBot
-
AlgoBot, is an intelligent chatbot that handles network security policy management tasks for you. AlgoBot answers your questions, submitted in plain English, and personally assists with security policy change management processes – without requiring manual inputs or additional research.
-
Product
Fixed Surveillance System for Perimeter Security
Argus
-
Argus is a fixed, rugged, preconfigured wide area surveillance system. Combining a best-in-class radar and thermal camera with Command and Control software, Argus is designed to detect and track multiple threats both near and far in the most demanding weather conditions 24 /7. When compared to other perimeter security solutions, Argus has the lowest initial cost per kilometer of secured space as well as the lowest lifetime cost.
-
Product
2U Rackmount Network Appliance With 4th/5th Generation Intel® Xeon® Scalable Processor For NFV. Ideal For Enterprise Network Security.
FWA-6072
Network Appliance
Single 4th/5th Gen Intel® Xeon® Scalable Processor, up to 60 Cores16 x DDR5 ECC RDIMM slotsHot-swap 2.5" disk bays and system fan, redundant PSU, 1 x FH/HL Gen4 PCIe x16 slotIntel® QAT with up to 200G Crypto supportIPMI v2.0 compliant, with web interface8 x Advantech network module expansions w/ PCIe Gen5 bandwidth
-
Product
Kalypso-Military Grade Secure Messaging Application
-
Secure Messenger Application (Code name : Kalypso) is a revolutionary Application designed to provide its users with end-to-end secure communication (Text, Voice and Video) using proprietary robust communication protocol / 256 bit military grade encryption algorithm with an On Premises Server.



















