Application Security
vulnerabilities identification and remediation software.
-
product
Real-Time End-to-End Service and Application
NexusNETVIEW
the most scalable & reliable real-time end-to-end service and application monitoring, analytics, and automation platform for communication service providers
-
product
Security Gateways
Schweitzer Engineering Laboratories, Inc.
Security gateways combine cybersecurity capabilities to create secure access paths through security perimeters.
-
product
MS Windows Application
NET-NMSC
The NET-NSMC Client is a MS Windows application that communicates with the NET-ESVR remotely and in any place with Internet access. Multiple users can access the NET-xTVMS system at the same time. The Client is the main and only interface to the system. It provides realtime status information from the server such as:
-
product
"All Weather" IoT Application Image Sensors
IoT Series
Innovation combined with SmartAEC ® function , ultra-low power consumption design enables "all-weather" application terminals to achieve extremely fast startup.
-
product
Enclosed Fanless Industrial Embedded Computer with NXP® i.MX8M Application Processor
SYS-444Q
The SYS-444Q is a rugged enclosed fanless embedded computer system with NXP’s i.MX8M industrial application processor with quad-core Arm Cortex®-A53 for low-power processing. This rugged system has dual Ethernet, industrial I/O, expansion options, TPM 2.0 hardware security, and options for wireless connectivity. The processor supports industry-leading video processing along with an M4 microcontroller for real-time subsystems making it an ideal fit for industrial IoT applications requiring highly reliable performance in harsh conditions such as digital signage, industrial automation, energy management, building automation, and others.
-
product
Linear Regulators (Application Specific)
Renesas' low cost linear regulators generate a low voltage bias supply from intermediate distributed voltages commonly used in telecom and datacom applications. These devices may be used as start-up or as continuous low power regulators.
-
product
Security Policy Change Automation
FireFlow
Confidently automate your security policy change process - from planning through risk analysis, implementation and validation.
-
product
High Volume / Double-Side Applications
APS 80D
Simultaneous, double-sided probing of up to 8" wafersPowerful, user-friendly control and monitoring softwarePlanarization of needle sets and constant preset needle loadPattern recognition systemRobot handling systemConfigurable to voltages in excess of 5 kV for specialized applications
-
product
Cyber Security & Intelligence
We are a leading supplier of cyber, intelligence, and security capabilities to government agencies, and a growing supplier of cyber and network security capabilities to commercial customers.
-
product
Application Penetration Testing:
Penetration testing (or pen testing) is a simulated security exercise in which ethical hackers attempts to exploit the vulnerabilities of an application system (web or mobile). The objective of this exercise is to identify any possible loopholes present in the system’s defence mechanism which the real hackers could take advantage of. QA Mentor practices the following stages while exercising this:









