Filter Results By:
Products
Applications
Manufacturers
-
product
Shoghi Microsites
Shoghi Communications focusing on usage of Strategic Communications solutions, to the defense and government entities worldwide. Our pristine capabilities in the fields of Intelligence Surveillance and Reconnaissance Systems, Electronic Warfare, Cyber Intelligence, COMSEC, Satellite Imaging, Avionics and Trainings, Supports Countries Defense, Space, and Homeland Security agencies
-
product
Cyber Labs
Building your cybersecurity team’s skills starts with foundational building blocks: theory, tools, attacker tactics, soft skills and more. Each of our cyber labs delivers a specific building block to build individual skills in shorter training sessions.Following individual completion of Cyber Labs your team be prepared with a robust foundation, allowing them to proceed to live-fire cyber range exercises where they will practice and apply these skills as a team, in real-world, simulated incidents.
-
product
Web Application Firewall
WAF
Your website security solution needs to keep up with the changing cyber threat. Protect your website with Cloudbric’s cloud WAF to block unknown and modified attacks.
-
product
RTOS
LynxOS
The embedded market is exploding with the dawn of the “Internet of Things”. The basic idea being that almost everything will ultimately be connected to the internet and these embedded devices are becoming more complex. This means they need to run more full functioned operating systems, with connectivity and popular human interfaces, require more processing power, including multi-core chips, and are likely to be exposed to the same types of cyber attacks that we are facing in our corporate and personal computers.Lynx Software Technologies addresses these needs with our high performance LynxOS operating systems and tools based on open standards. Our new powerful RTOS security features allow embedded developers to design their systems to be more secure before they are connected to the internet.
-
product
Distributed Control Systems
As the heart of plant-level digitalization, ABB's Distributed Control Systems (DCS) are designed to transform your multi-faceted, 24/7 process operations. Our market-leading control architecture constantly monitors and drives plant productivity, maximizing asset utilization, process efficiency and production quality. A focus on availability, safety and cyber security ensures the protection of your people, assets and equipment. And by maintaining tight controls over raw material consumption, plant energy levels and waste by-products, ABB DCS solutions help to significantly reduce environmental impact.
-
product
Cyber Assurance
As the Internet of Things (IoT) continues to expand, connecting more and more of our world through communication devices, a growing trend has emerged: cyber security threats.
-
product
4x 3U OpenVPX MOSA Actuator Interface Unit
SIU34-AIUVARM-01
SIU34-AIUVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Actuator Interface Units (AIU) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
Security Gateways
Schweitzer Engineering Laboratories, Inc.
Security gateways combine cybersecurity capabilities to create secure access paths through security perimeters.
-
product
DDoS Detection and Mitigation
Increasingly, business is done online. This increases the risk of exposure to costly service interruptions caused by cyberattacks. Distributed Denial of Service (DDoS) attacks have emerged as one of the most common and impactful attack vectors aimed at business networks. Today, DDoS attacks account for 40% of all cybersecurity incidents, with some organisations facing multiple attacks per day. With the average throughput of volumetric attacks rising by over 3X in the last decade, DDoS prevention has become essential for any organisation that relies on its network infrastructure to do business.
-
product
Cyber Security Assessment
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
product
Industrial Ethernet
PLANET Industrial Ethernet equipment is compliant with various industrial protocols and ITS certifications such as MQTT, Modbus, SCADA, EtherCAT EN50155 and E-Mark to meet all the transmission needs, be it Information, Control or Device. PLANET features ERPS Ring, IEEE 1588 PTP, Layer 3 routing, 10G transmissions, cybersecurity and more to ensure high performance and security of our comprehensive Industrial Ethernet collection.
-
product
PacStar IQ-Core Software
Curtiss-Wright Defense Solutions
Our PacStar IQ-Core® Software provides an intuitive user interface that makes communications setup and operation quick and easy to learn. It reduces configuration errors by assisting organizations in maintaining uptime, performance, and compliance with cybersecurity requirements, and simplifies troubleshooting with tools for both entry-level and advanced network administrators.
-
product
Operational Technology (OT) Networking
Schweitzer Engineering Laboratories, Inc.
OT networking solutions provide communications with the performance, cybersecurity, and ruggedness required for demanding operational applications.
-
product
Bus Analyzer Software
AltaView
Alta’s Windows avionics analyzer product, AltaView, provides the most modern technologies for MIL-STD-1553 and ARINC-429 network activity and data analysis. Win XP/Server/7/8/10 Compatible and VMware with ENET/NLINE Ethernet. Ideal for Cybersecurity Testing.
-
product
4x 3U OpenVPX MOSA Mission Computer
SIU34-MCVARM-01
SIU34-MCVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Mission Computers (MC) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
Network Security
PLANET Network Security solution is designed to build a strong and secure network for any commercial and industrial environments. By providing functions like cybersecurity, SPI firewall, VPN, IDP, antispam and antivirus, this collection includes VPN Security Gateway, 5G NR Gateway, Flat-type Smart Router, UTM Content Security Gateway and Wireless VPN Routers. A variety of product lines can satisfy all the demands of enterprises, SMBs, factories, communities and more for the network security including remote management and surveillance of IoT, IIoT and building automation applications.
-
product
4x 3U OpenVPX MOSA Flight Control Computer
SIU34-FCCVARM-01
SIU34-FCCVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Flight Control Computer (FCC) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
IoT Devices Penetration Testing
There is a rising concern that IoT devices are being developed rapidly without appropriate consideration of the profound security challenges involved, as demonstrated by the various IoT devices hacked in recent years— automobiles, cameras, children's toys, thermostats, and medical devices.With more than a decade of specialized cyber security testing experience combined with our extensive research and development, we can assess and identify both common and complex security vulnerabilities that may be residing within your whole IoT ecosystem.
-
product
5MP HD and 4K UHD Cameras
FLIR Quasar™ Premium Mini-Dome
The FLIR Quasar premium mini-dome camera was designed to provide situational awareness in the most demanding environments, where evidential and forensic video is required. It is offered in a 5MP HD and 4k UHD variant, delivering superior image quality and IR-Illumination for exceptional performance using low bandwidth. Ideal for critical infrastructure sites, remote facilities, or any large requiring close monitoring, the Quasar premium mini-dome is a discreet surveillance option that is NDAA-compliant and utilizes high-end cybersecurity safeguards. Ease of installation, FLIR accessory/mounting ecosystem, and the ability to operate more cameras on the same server all contribute to a lower total cost of ownership. It offers seamless integration with a wide range of video management systems, including United VMS, which brings indoor and outdoor surveillance and perimeter intrusion detection cameras together as part of an end-to-end security solution.
-
product
Cybersecurity
Schweitzer Engineering Laboratories, Inc.
Networks are protected with multiple layers of cybersecurity, including securing access and permissions, detecting malware, encrypting data, and logging events.
-
product
Safety Analysis
Ensure System Safety and Cybersecurity. Dramatically decrease analysis efforts with efficient application of quality, safety, reliability and cybersecurity analysis methods at the system, item, software, hardware and PCB levels.
-
product
4x 3U OpenVPX MOSA Data Concentrator Unit
SIU34-DCUVARM-01
SIU34-DCUVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Data Concentrator Unit (DCU) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
Cyber Security & Intelligence
We are a leading supplier of cyber, intelligence, and security capabilities to government agencies, and a growing supplier of cyber and network security capabilities to commercial customers.
-
product
Cyber Security and Digital Data Protection
As security demands evolve, Applied Computer Technologies provides a layered and progressive approach to security. Organizations without a sufficient security footprint are being affected and held ransom, operations disrupted, and business reputations damaged. We've partnered with some amazing and innovative companies to offer our clients the best cyber security and protection available today. Our integrated security products include next generation firewalls; ransomware and crypto malware; secure connectivity; Email, encryption, archiving, and SPAM filtering; Web and content filtering; and data integrity & theft prevention.
-
product
GleanPackets
Identifying cyber security risks and solving network performance problems are becoming primary concerns for enterprises and small businesses. Many companies record network traffic and store the PCAP files for security forensics at a later time, but it is excruciatingly difficult to manage PCAP files and dig through mountains of information to find the relevant data. Searching through multiple large PCAP files and opening up each one with an analysis program is like looking for a needle in many haystacks. GleanPackets search is a powerful, affordable, and easy to use packet search engine that exports PCAP files to your favorite 3rd party web and mobile applications and network appliances via our REST API. Our user friendly interface will guide you through your searches, enabling you to find the the data you need quickly and painlessly. GleanPackets Search is available in several forms.
-
product
Cyber Security Testing Services
Cyber security testing is often also referred to as pen testing or penetration testing. Such tests validate the cyber security defences of your applications, network infrastructure and even your team members. Our cyber security testers are highly trained and certified ethical hackers.
-
product
Cyber Security/Network Security Training
Stratign’s Cyber Security/Network Security Training provides cybersecurity professionals with foundational, intermediate, and advanced security skills imparted through experts in the field.
-
product
Cybersecurity and Compliance Solution
Application Audit
Application Audit, Compuware's mainframe cybersecurity and compliance solution, enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Using Application Audit, security staff can: Deter insider threats by capturing and analyzing start-to-finish user session activity. Integrate user behavior intelligence with popular SIEM engines to analyze the overall application environment. Support criminal/legal investigations with complete and credible forensics. Fulfill compliance mandates regarding protection of sensitive data. The Value of Application Audit. Provides deep insight into user behavior including data viewed, by whom and which applications were used to access it. Enables immediate analysis through the automatic delivery of data to SIEM platforms such as Splunk and QRadar, either directly or in combination with CorreLog zDefenderTM for z/OS or Syncsort Ironstream. Delivers granular intelligence and reporting capabilities needed to comply with regulations such as HIPAA and GDPR as well as security policies. Eliminates dependency on specialized mainframe knowledge. Separates the system administrator's duties from mainframe-inexperienced auditor's responsibilities with a web UI, so that no single person is in a position to engage in malicious activities without detection.
-
product
Cyber Drill And Blue Team Exercise Stimulation
LGMS Security Team will approach the Cyber Drill as a simulation of the possible occurrences during a cyber incident. Based on the defined scenario, LGMS Security Team will perform a technical simulation so as to accurately capture the responses of client’s team in responding to such incidents.In order to obtain the best results, LGMS Security Team will only use information that can be obtained either through public information or by any means of deception techniques.