Filter Results By:
Products
Applications
Manufacturers
-
product
Drop Weight Impact Testing Machine
DWTT Series
Jinan Testing Equipment IE Corporation
DWTT Drop Weight Impact Testing System is suitable for drop weight tear test of various kinds of ferrite, especially for the test of DWTT for pipeline steel as ASTM-E 436, API-RP 5L3, ASTM-E 208 and DIN EN 10274. DWTT has integrated mechanical, electrical, and automatic control technology, and achieved full automation of feeding, hammer lifting impact, and fracture specimen collection. The load frame has a four-column design, features in stable supporting structure, rigid, dual sliding rails. The Drop Weight Drop Weight Tester is equipped with positioning mechanism, anti-dumping mechanism, safety mechanism, hydraulic buffer devices and security guard net. The impact energy is determined by the lifting height and configuration of different net weights. DWTT Drop Weight Impact Testing System is the essential quality control equipment for pipeline manufacturers, steel mills, iron and steel enterprises, and is also widely used for research institutes.1. Buffer device is equipped to avoid the second impact and absorb the residual energy after breaking the specimen so as to prevent the weigher and anvil from destroying. The installation of safety mechanism, buffer device, and security guard net will effectively secure the testing machine and its operation to extend its life.2. Configuration of the specimen-feeding system, anti-second impact device, and specimen centering mechanism will guarantee a quick, accurate and reliable test.
-
product
Cloud Security
Cloud Security Assessment is the most critical phase before the product is finally deployed and Product is finally ready to handle real-world cyber security threats.
-
product
Defense & Security
Protecting populations from nuclear risk. Our instruments precisely detect and monitor radiation in the most critical and challenging situations, empowering military and civil defense teams to keep populations safe.
-
product
Quantum-Safe Security
CN8000 Series
The CN8000 harnesses the power of quantum mechanics to help ensure secure communications – the encryption keys are generated by IDQ’s Quantum Random Number Generator to guarantee inherent and provable randomness. The CN8000 can also be upgraded to be quantum-safe via the Cerberis QKD Blade (quantum cryptography) to ensure long-term protection of the data in transit.
-
product
Net Toner and Probe Kit
1EA680
Cable tracer is designed to trace wires without damaging the instalations and much more.
-
product
Application Security Platform
Sentinel
WhiteHat Sentinel is a Software-as-a-Service (SaaS) platform that enables your business to quickly deploy a scalable application security program across the entire software development lifecycle (SDLC). Combining advanced scanning technology with the world’s largest application security research team, we accurately identify your vulnerabilities and scale to meet any demand without slowing you down.
-
product
Security
When it comes to transferring confidential and sensitive CAD and result data via the Internet, high security requirements are demanded and necessary. SimScale offers you a highly secure workspace that constantly protects your data so you don’t have to worry.
-
product
Net Chaser Ethernet Speed Certifier
#TNC950AR
The Net Chaser Ethernet Speed Certifier and Network Testeroffers a complete solution to test and speed certify the data-carrying capabilities of Ethernet network cables up to 1 Gb and s by testing for noise in the network, detecting faults in the cable wiring, and ensuring that cables are able to support the speed capabilities of […]
-
product
Quantum-Safe Security
CN9000 Series
The Centauris CN9000 Series is the first commercially available certified high-assurance 100Gbps Ethernet encryptor that supports the most complex fully meshed topologies – enabling 100% security for Big Data, Cloud and data centre services’ ultra-fast networks.
-
product
Unit Testing & Mocking Solution for .NET
Isolate
Part of Typemock Isolator,The Complete Unit Testing & Mocking Solution for .NET From mocking to coverage to automated test suggestions
-
product
Security Labs
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
product
Cyber Security/Network Security Training
Stratign’s Cyber Security/Network Security Training provides cybersecurity professionals with foundational, intermediate, and advanced security skills imparted through experts in the field.
-
product
Embedded Security
Efficient, reliable, and intuitive: The world-leading end-to-end embedded security builder.
-
product
API Security Testing
Nowadays, APIs are frequently used for communication between two applications. In this communication, lots of sensitive data is transferred between devices and the server.In order to be protected in the event of a data loss or attack, we must secure our API.
-
product
Modbus Master TCP/IP Component for .NET
WSMBT
WSMBT is a powerful and simple to use .Net component that makes it easy to access data from a Modbus slave device connected to the PC's Ethernet network. Simply drop the component on your form and talk to your device with your VB.NET, C# or Managed C++.
-
product
Security intelligence & analytics
Detect and prioritize threats that pose the greatest risk. dentify high-risk threats with near real-time correlation and behavioral anomaly detection. Detect vulnerabilities, manage risks and identify high-priority incidents among billions of data points.Gain full visibility into network, application and user activity.
-
product
Net Irradiance Meter
LPNET07
LPNET07 measures the net radiation across a surface, from near ultraviolet to far infrared.
-
product
Airspace Security Platform
DroneTracker
The airspace security platform that detects, classifies, and mitigates all drone threats. DroneTracker aggregates sensor information about potential threats, recognizing and classifying drones of all kinds. Its web-based interface shows live threats, real-time drone flight paths, and records forensic details including video evidence. The RF Sensor detects drones and remote controls by their radio frequency (RF) signatures.
-
product
Enterprise-Wide Application and Security Testing
PerfectStorm ONE
Keysight Network Applications and Security
Enterprises and government organizations are making major investments in consolidating and rebuilding data centers and enterprise -wide networks. The stakes have never been so high to get it right the first time.
-
product
Thermal Analytics Security Camera
Elara™ FB-Series ID
The FLIR Elara™ FB-Series ID thermal security camera uses onboard analytics to classify human or vehicular intrusions, making it ideal for perimeter intrusion detection and sterile-zone monitoring. The Elara™ FB-Series ID can also hand off classified intrusions to FLIR PTZ cameras for autonomous tracking of intruders. Easy to set up, Elara™ FB-Series provide reliable detection with low false alarm rates in challenging environments, bad weather, and complete darkness.
-
product
100GbE Application and Security Load Module
PerfectStorm 100GE 1-Port Load Module
Keysight Network Applications and Security
PerfectStorm is a highly modular hardware test platform enabling equipment providers, service providers and enterprises the ability to create real-world, high-stress conditions and user behavior to push new equipment and networks to their limits.
-
product
Seeker Interactive Application Security Testing
IAST
The industry's first IAST solution with active verification and sensitive-data tracking for web-based applications. See how Seeker helps development, QA, DevOps, and security teams automate the security testing of modern web applications and services.
-
product
Application Security Testing Solution
CxIAST
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.
-
product
Embedded Security Solution
With the coming Internet of Thing (IoT) era, more and more devices are connected together and it makes security become a significant issue. Now, the tailored security solutions can meet the specific design requirements for data and devices protection in embedded applications, and we will launch more security solution in the near future.
-
product
Hipot & Security Tester
Safety testers (also called hipot testers) ensure the safe use of test items in different working environments and under different operating conditions. There are a variety of solutions, depending on the tests required to meet the relevant industry standards. Many test units offer a combination of functionality and performance.
-
product
NET and C #
The programming software C # under .NET enables the development of test programs and additional components.
-
product
Net Radiometer
An on-board 24-bit A to D converter makes measurements and provides a digital SDI-12 output. This eliminates the need for multiple analog datalogger channels to measure each of the four components of net radiation.
-
product
Cyber Security and Digital Data Protection
As security demands evolve, Applied Computer Technologies provides a layered and progressive approach to security. Organizations without a sufficient security footprint are being affected and held ransom, operations disrupted, and business reputations damaged. We've partnered with some amazing and innovative companies to offer our clients the best cyber security and protection available today. Our integrated security products include next generation firewalls; ransomware and crypto malware; secure connectivity; Email, encryption, archiving, and SPAM filtering; Web and content filtering; and data integrity & theft prevention.