Filter Results By:
Products
Applications
Manufacturers
Application Security
vulnerabilities identification and remediation software.
- Pickering Interfaces Inc.
product
Pickering Software Drivers and Applications
We provide driver packages for LXI and PXI products offering seamless installation and support of all popular Programming languages such as C/C++, LabVIEW™, LabVIEW RT, .NET, VB, LabWindows/CVI, MATLAB®, Python, ATEasy, TestStand™, Veristand™ and Switch Executive™ (via the IVI driver).
-
product
CCD and Imaging Front Ends
Analog Devices is the premier supplier of high performance analog front-end devices in CCD/CIS imaging and time-of-flight applications. Many leading manufacturers of security cameras, machine vision cameras, high-resolution scanners, and other imaging systems depend on ADI’s products to deliver the highest performance with the lowest power dissipation in the market.
-
product
Software Analytics in the Cloud
Know the risks, the technical debt, the security flaws, the performance issues… create automatic action plans and analyze their progress. Make better decisions, faster, with Kiuwan Software Analytics! Kiuwan is the Optimyth cloud solution for the Certification, Management and Government of the quality and productivity of the source code of your business critical application portfolios.
-
product
Industrial & Security
Kromek's custom configurations of Cadmium Zinc Telluride (CZT) based detector tiles and linear arrays can be implemented into custom Advanced Imaging platforms for various Industry and Security applications.
-
product
Business Application
Business Application testing encompasses verification and validation services to support Quality Assurance and Control of business applications. Application testing ensures that all aspects of the application like its functionality, integration, performance, security, and usability are working as expected.
-
product
Mid-Range Pan/Tilt Multi-Sensor
DefendIR
The Ranger® MS-UC DefendIR is an industry-leading mid-range thermal imager that can see in complete darkness and through a multitude of environmental conditions, including smoke, rain, snow, dust, and dense fog. The Ranger DefendIR is ideally suited for day and night perimeter security, maritime surveillance, and DHS/DoD applications. The ruggedized housing is environmentally sealed and certified to meet NEMA4X and IP66 specifications, standing up to the most challenging weather and temperature conditions.
-
product
AIOT Software, Distribution & Services
Advantech Embedded Software provides a wide variety of IoT solutions you need from IoT devices operation management software to cloud platform services that help customers build, manage, and deploy applications on a global network with preferred IoT frameworks as well as IoT security services, including backup recovery, embedded BIOS, OS, API Library and integrated service platforms on WISE-PaaS Marketplace.
-
product
Robust DIN-rail Fanless Embedded System With 7th Gen Intel® Core™ I7/i5/i3 & Celeron® Processor And Dual Modular I/O Expansion Design
ICO500-518
The ICO500-518 featuring flexible I/O expansion, sufficient storage and network capability is well-suited for transportation, public utility, smart building, solar energy, as well as factory automation fields. By bundling Axiomtek’s intelligent AMS software solution for device monitoring and remote management, the ICO500-518 is able to implement environment signal monitoring, edge analytics and remote device management in the IIoT world. It has also passed the EN 50121-4 certified for railway applications. The rugged high computing edge gateway has scalable CPU options with the 7th gen Intel® Core™ i7/i5/i3 (codename: Kaby Lake-U) or Celeron® processors and supports one DDR4-2133 SO-DIMM slot for up to 16GB of system memory. The ICO500-518 features basic benefits whether low latency or cost efficiency; moreover, offering much more other advantages for IIoT applications. It not only supports multiple OT communication protocols that can significantly reduce the effort required to collect data from different field devices, but also provide local intelligence to allow operators respond faster to events that happen at the remote site and minimizes latency between edge devices and the cloud server. Also, with TPM 2.0, this IIoT edge gateway provides tailored levels of security depending on the application needs. Axiomtek’s ICO500-518 has two optional plug-in I/O module slots and four different types of I/O modules to meet different customization requirements. An integrator can choose from four available I/O modules including an 8-port GbE LAN module; 8-port isolated RS-232/422/485 module; 4-port isolated RS-232/422/485 with one isolated DIO (8-in/8-out) module; 8-port isolated CANbus 2.0A/B module to customize the ICO500-518 to fit its specific project requirements. Additionally, the ICO500-518 offers flexible communication options - two full-size PCI Express Mini Card slots and one external SIM card slot for 4G/3G, GPS, LoRaWAN, Wi-Fi and Bluetooth connections. Furthermore, it supports swappable 2.5-inch SATA drive and external CFastTM card to provide sufficient storage capability. For withstanding harsh operating conditions, this IP40-rated embedded box PC offers an extended operating temperature range of -40°C to 70°C, a wide range DC input of 12V to 48V with OVP, UVP, OCP, RPP power protection, and up to 3G vibration endurance.
-
product
Network Packet Brokers
Vision E40 / E100
Keysight Network Applications and Security
These new cost-effective and scalable solutions help IT teams supporting hyperscale and microscale data centers, resolve application performance bottlenecks, trouble shoot problems, and improve data center automation, as well as better utilize network analysis and security tools. Today’s hyperscale data centers, which are designed for expansion, as well as micro data centers, which often sit on the network edge closer to end users for an improved experience, can create significant challenges for IT organizations. These challenges range from poor network performance due to increasing size and complexity, to security issues resulting from insufficient visibility into incident detection and resolution. Many IT organizations use multiple network monitoring tools, and need to efficiently transport network traffic from thousands of network locations. Ixia’s solutions for highly scalable and expanding data centers. Ixia’s Vision portfolio of NPBs provides intelligent, sophisticated, and programmable network flow optimization, delivering comprehensive visibility and security coverage. The new Vision Edge 40 and Vision Edge 100 offer real-time visibility, insight, and security into high density hyperscale and microscale data centers, even as they expand. Each is capable of inline and out-of-band deployments, and delivers control, coverage, and performance to protect and improve crucial networking, data center, and cloud business assets.
-
product
Enterprise-Wide Application and Security Testing
PerfectStorm ONE
Keysight Network Applications and Security
Enterprises and government organizations are making major investments in consolidating and rebuilding data centers and enterprise -wide networks. The stakes have never been so high to get it right the first time.
-
product
Avionics Solutions
Shoghi is one of the growing companies dealing in Civil and Military Aircraft (both fixed and Rotary) aviation life-cycle support services. Our mission is to let our customers focus on their core operations as we concentrate maintaining the utmost high operational readiness and mission capability of their all kinds of aircraft requirements. Our goal is to be the sole solution provider to our customers for all their MRO, Spares and Training requirements.Fixed wing and rotary wing UAVs with optical and thermal surveillance capabilities for military, homeland security, border control and other government organizations of countries are offered for multitude of military, security and disaster management applications. Primary and Secondary Surveillance radars for airports are offered with the latest capabilities for a full-fledged airport control operations
-
product
Storage Servers
The Impact-S storage servers have been specifically designed to meet the requirements of IP surveillance applications such as DVR, NVR and IP CCTV systems. For more information on our security automation capabilities using our storage servers, please visit our Security Automation division section for security storage servers.
-
product
Pyroelectric IR Detectors and Sensors
Excelitas Pyroelectric Infrared Detectors define the leading edge of motion detection technology, offering a variety of both digital and analog Pyroelectric IR Detectors to serve a wide range of applications in smart home, smart city, IOT, burglary detection and security systems. With Pyroelectrics available in Single-, Dual- and Quad-Element configurations we offer you a wider range of different sized infrared sensor surfaces, which directly translates to enhanced performance and sensitivity. Excelitas sensors are representing the innovative forefront in mid-IR sensor devices. The family of DigiPyros enables smart home and smart sensing applications with low current requirements.
-
product
100GE Application & Security Test Load Module
CloudStorm
Keysight Network Applications and Security
Ixia's CloudStormTM is an industry-first 2.4 terabit application and security test solution that not only meets today’s need, but that of the future. CloudStorm delivers 3X-application and 4X-SSL-emulation scale over any other test system. It helps NEMs shortening their development cycles, and enterprises and data center operators find the right balance between mitigating security risks and delivering high end-user application performance. Emulate multi-terabit DDoS and botnet attacks to future-proof security solutions
-
product
Public Safety
Schnoor Industrieelektronik GmbH & Co. KG
Reliability, performance as well as quick, simple operation is of special importance in the range of public safety, police, fire brigades and rescue services. Schnoor Industrieelektronik develops radio systems, application and migration concepts, corresponding to the safety standard for Security Authorities and Organisations.
-
product
Cyber Security Testing Services
Cyber security testing is often also referred to as pen testing or penetration testing. Such tests validate the cyber security defences of your applications, network infrastructure and even your team members. Our cyber security testers are highly trained and certified ethical hackers.
-
product
RX Family Of 32-bit High Power Efficiency MCUs
RX600
The RX600 Series has an abundant lineup of high-performance microcontrollers with up to 160MHz CPU operation, This Series offers up to 4MB of embedded Flash and 640KB of embedded SRAM, advanced security, connectivity (Ethernet, USB, CAN) and HMI function. The RX600 Series addresses a broad range of applications for IoT endpoints such as white goods, meters, and other industry and consumer area. The RX600 Series can be considered as the mainstream series of the RX Family. Some of the RX600 Series products are tuned for motor control solutions, too.
-
product
PICMG 1.3 Full-size CPU Card With LGA1150 4th Gen Intel® Core™ I7/i5/i3 Processor, Intel® Q87, SATA3, USB 3.0, DVI-D, VGA, DisplayPort And Dual LAN
SHB130
The PICMG 1.3 full-size CPU card, SHB130, designed for the new architecture 4th Generation Intel® Core™ processors (codename: Haswell/Haswell Refresh) with Intel® Q87 chipset on 22nm technology using LGA1150 socket. The outstanding SHB130 with new Intel® architecture delivers up to double the graphics performance over the previous generation. The new graphics solution has high levels of integration to enable new form factors and designs with excellent visual quality built in. In addition, The PICMG 1.3 full-size CPU card comes with two DDR3 1333/1600 MHz unbuffered ECC DIMM slots up to 16 GB of system memory and six SATA 6Gbps ports with RAID 0, 1, 5, 10. The PCI Express 2.0 available on the new Intel® Core™ processor provides flexible x16, x4 or x1 lanes for versatile applications. The high performance SHB130 with improved graphics ability is ideal for applications such as network security, storage server, POS, kiosk, medical, gaming, digital signage, and surveillance security monitoring.
-
product
Security Testing Services
By testing the flaws in software, our security testing services seek to remove vulnerabilities before the software is deployed or purchased. By focusing on the different layers of an information system across the database, infrastructure, network, and access channels such as mobile, security testing looks at making the applications free from vulnerabilities. We assist online service providers, website owners, and independent software vendors to manage application security risks. We offer a comprehensive range of white, grey, or black-box model security testing based on your stage in the development cycle.
-
product
Security Testing
As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.
-
product
GleanPackets
Identifying cyber security risks and solving network performance problems are becoming primary concerns for enterprises and small businesses. Many companies record network traffic and store the PCAP files for security forensics at a later time, but it is excruciatingly difficult to manage PCAP files and dig through mountains of information to find the relevant data. Searching through multiple large PCAP files and opening up each one with an analysis program is like looking for a needle in many haystacks. GleanPackets search is a powerful, affordable, and easy to use packet search engine that exports PCAP files to your favorite 3rd party web and mobile applications and network appliances via our REST API. Our user friendly interface will guide you through your searches, enabling you to find the the data you need quickly and painlessly. GleanPackets Search is available in several forms.
-
product
PCIe Mono Industrial Camera
CMOSIS CMV2000
2K camera Applications: In-situ optical inspection camera, fast process capturing, e.g. Golf club swings, Intelligent Transportation Systems (ITS), Open road tolling and Traffic monitoring, Industrial Automation, Machine Vision, Facial Recognition, Motion Capture, Automotive crash testing, OCR/ OCV, 3D scanning, Robotic Arms, Material and Life science Microscopy, Ophthalmology and Retinal imaging, Medical Imaging, Flat panel inspection, Dental, Kiosks, Security, Biometrics
-
product
Multi-Energy Detector Board
X-CARD ME
X-Card ME3 is a stand-alone multi-energy detector board designed for linear X-ray imaging systems. It powers a variety of security and industrial applications that require state-of-the-art material discrimination capability yet cost-effective architectures in comparison with multi-view and CT systems. For example, it is an ideal solution for meeting the requirements of the EDS CBS C2 standard, making it possible to keep laptops and other personal electronics in the hand luggage during the scan.
-
product
ARM Computer
SYS-398S-1G-0
WINSYSTEMS’ SYS-C398S low power single board computer combines high performance multimedia graphics with a rich mix of industrial I/O. The NXP® i.MX 6S processor’s integrated power management provides excellent efficiency and allows operation from -40° to +85°C without active cooling. It is designed for demanding graphical applications in security, transportation, medical, and digital signage.
-
product
Application Penetration Testing:
Penetration testing (or pen testing) is a simulated security exercise in which ethical hackers attempts to exploit the vulnerabilities of an application system (web or mobile). The objective of this exercise is to identify any possible loopholes present in the system’s defence mechanism which the real hackers could take advantage of. QA Mentor practices the following stages while exercising this:
-
product
Beam Directional Power Supply Battery 40 to 120 kV
CP120B
This ultra-light, compact and battery operated constant potential portable X-Ray generator is the perfect tool for specific NDT applications that require repetitive short exposures. Its versatility also makes it the ideal piece of equipment for security applications. In fact, in combination with the FLATSCAN15, the FLATSCAN30 and other digital X-Ray detectors, the CP120B will – thanks to its small focal spot and constant potential X-Ray output – enhance image quality and definitely contribute to a reduced exposure time.
-
product
Cybersecurity Penetration Testing Assessments
Tripwire Professional Services
Organizations do all that they can to protect their critical cyber assets, but they don’t always systematically test their defenses. Penetration tests—otherwise known as pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems. Whether we are testing an application or network environment, Tripwire’s pen testing will not only identify vulnerabilities, but it will also demonstrate them through exploitation—definitively determining if unauthorized access or other malicious activity is possible.
-
product
Robust DIN-rail Fanless Embedded System With Intel® Atom™ Processor E3815 As An Intel® IoT Gateway Solution
ICO300-MI
The ICO300-MI based on Intel® Gateway Technology has been upgraded with Wind River Intelligent Device Platform XT v3.1. The reliable din-rail embedded IoT gateway platform utilizes the low power Intel® Atom™ processor E3815 and supports DDR3L system memory maximum up to 4GB, delivering high performance and low power consumption. It provides enterprise-grade security and intelligent manageability, yet simplifies the development process and gateway deployment for IoT applications. The intelligent ICO300-MI is a perfect solution for industrial IoT applications such as smart energy, smart factory automation, facility monitoring systems and more.
-
product
Embedded Processors
Macom Technology Solutions Holdings Inc.
MACOM’s high-speed, power-efficient family of embedded processing solutions provides the ideal balance for conserving energy and lowering costs while maintaining high performance. Our embedded products provide an optimized solution for a variety of applications including next-generation multifunction printers, enterprise control plane processing, Network-Attached Storage (NAS) systems, wireless routers and access points, and a variety of industrial applications by offering the industry’s most advanced capabilities in power management, security and concurrency.
-
product
Dynamic Analysis
DAST
Dynamic application security testing at the scale and speed modern enterprises need. WhiteHat™ Dynamic rapidly and accurately finds vulnerabilities in websites and applications, with the scale and agility you need to identify security risks across your entire application portfolio.
-
product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 1GE/10GE Appliance
Keysight Network Applications and Security
PerfectStorm ONE facilitates network and security proof-of-concepts (POCs) and assessments, all in a compact device. This POC-in-a-box enables enterprises and service providers to select optimal devices and right-size data centers, as well as providing device vendors with a platform to fully showcase their product’s performance, resiliency, and throughput under realworld traffic loads.