Application Security
vulnerabilities identification and remediation software.
-
product
Secure Wearable Solutions
From ST31 secure microcontrollers to ST54 solutions integrating NFC controller, secure element and eSIM, ST offers a complete range of solutions for payment, transit and multiple contactless services. ST's technology is ideal for applications that require a card emulation function but are environmentally challenged or have limited space for the antenna.
-
product
Secure Automotive
With cars becoming more connected and therefore more vulnerable to attacks, security has become critical for automotive applications and is at the heart of many concerns. ST is committed to provide secure solutions to address the challenges of this new era of digital technologies.
-
product
Security Testing
We protect your business from cyber attacksSecure online transactionsPrevent unauthorized accessMinimize the risk of data lossEnhance resistance to DoS attacks
-
product
Multi-Protocol Wireless Application Networking System with Open, Integrated, Secure & Scalable System for Data Aggregation & Viewing
Ion
Jacobs’ vendor agnostic architecture was designed and implemented with the goal of an open Industrial Internet of Things (IoT) solution. ion© adapts and applies technology that enables our customers to gain efficiencies and savings, through connecting our client’s sites then collecting and displaying data in a unified interface. This provides custom insights to our clients, empowering them to ensure safety and respond quickly. The Jacobs ion© solution has been operationally deployed for over a decade and enables innovative approaches for data accuracy, data timeliness, and safety — greatly improving information flow and productivity.
-
product
Security and Traffic Monitoring System
Information System Technologies Inc.
ISTI’s versatile sensor nodes can support multiple sensing types including acoustic, seismic, visible/IR, and scanning laser. Several eye-safe scanning lasers form a distributed wireless sensor network and can continuously and accurately track as well as monitor ground vehicles and personnel in a surveillance area. This system provides super-fine angular and range resolution to precisely locate moving targets. Among other key benefits are: day/night operational capability, continuous monitoring and surveillance without blind spots, 360 degrees field-of-view, large coverage area, multiple closely spaced target tracking, threat classification, and automatic alarm generation. The system can be used in applications such as traffic monitoring, intrusion detection, border control, airport runway collision and incursion avoidance, and perimeter security.
-
product
Mobile Application Testing
Mobile Application testing involves the testing of applications in mobile devices. The applications are tested for functionality, performance, usability, etc.
-
product
Secure Access
Schweitzer Engineering Laboratories, Inc.
Devices with secure access authenticate users, control privileges, and create audit trails.
-
product
Thermal Security Camera
Elara™ FC-Series O
The Elara™ FC-Series O thermal security camera is one of FLIR’s premium thermal security cameras for perimeter protection. The Elara FC-Series O integrates with external video analytics devices, such as FLIR’s TRK or third party solutions, to classify human or vehicular intrusions. The Elara FC-Series O also offers a wide range of high-performance lenses, with a choice of resolutions, offering greater flexibility for tailoring security systems to specific site conditions.
-
product
Pulse Generator Applications
Quantum Composers offers a diverse family of pulse generators, or pattern generators, test equipment used to produce pulses, or rectangular waves, at an adjustable repetition rate, pulse width, amplitude, polarity, rise time and delay.
-
product
Anite Application Testing
Verify higher level protocols and application enablers for a more effective roll-out of LTE-IMS based services to end-usersPerform rapid and cost-effective application testing associated with device acceptance test plans mandated by major mobile operators such as China Mobile, Verizon Wireless, AT&T and T-MobileGain access to comprehensive IMS LTE test plans mandated by standardization organizations such as GCF and PTCRB
-
product
Application Solutions
Here you will be able to find our most commonly asked questions. If the question you are looking to be answered is not here please do not hesitate to Contact Us.Still have questions? Feel free to contact us.
-
product
Embedded Security
Efficient, reliable, and intuitive: The world-leading end-to-end embedded security builder.
-
product
Clutch and Brake Applications
Customizable to your needs, CTS offers products and capabilities ranging from a simple switch to a dual output sensor and is an industry leader in pedal position technology. From accelerator to clutch and brake, rotary or linear, contacting or non-contacting (Hall-effect), whatever your need, we have a solution.
-
product
Evaluation and prototyping application
Intuitive graphical user interfaceCall and immediately display the result of any Open eVision functionGenerate C++, C# and Visual Basic codeFree of charge
-
product
Hardware Security For Programmable System Control
Mach-NX
*Up to 8.4K LC of user logic, 2669 kbits of user flash memory and dual boot flash feature*Up to 379 programmable I/O supporting 1.2/1.5/1.8/2.5/3.3 I/O voltages*Secure enclave supports 384-bit cryptography, including SHA, HMAC, and ECC*Configuration of PFR and security functions through Lattice Propel simplifies developer experience*Highly reliable. Low power and 3X better SER performance to comparable CMOS technologies
-
product
Cloud Security Testing
Using a cloud infrastructure is no more a new phenomenon in the digital world. Businesses use it as a basic practice now a days due to numerous benefits associated with it. Hence, it should be a top most priority for the businesses to secure their cloud infrastructure as that’s the nucleus of their business from all aspects. In cloud security testing, the cloud infrastructure is screened to identify security risks and the areas which can be exploited by the attackers. Cloud security testing is mainly performed to ensure that cloud infrastructure can protect the confidential information of an organization. QA Mentor adopts three different approaches during the cloud security testing process:
-
product
Vectorless Test Applications
NanoVTEP
Vectorless test solution with miniaturized amplifier to help improve test coverage.
-
product
Photonic Application Suite
N7700A
The N7700A Photonic Application Suite is a collection of advanced and basic software tools for making optical measurements, controlling fiber optic instruments, and analyzing measurement results. Many components are free and some can be licensed.
-
product
Cameras for Mobile Applications
- Programmable to IEC 61131-3 with CODESYS- Robust metal housing for surface or panel mounting- High-performance CAN interface for various communication tasks- E1 type approval (German Federal Motor Transport Authority)
-
product
Cryogenic Lab Applications
Lake Shore products are used in a large variety of applications. Find your application here to see the recommended products.
-
product
Security Testing
Security/negative testing is typically conducted during development to highlight how a DUT handles abnormal conditions like very high traffic load, different frame sizes (incl. undersized and oversized frames), framed with different IFG settings, various types of errors and deviation of the signal frequency, as well as various DDoS attacks.
-
product
Web Application Testing
We provide manual, semi-automated and automated functional testing services to ensure that both front-end and back-end components of the application work properly and as initially designed.
-
product
Application Software
Application software is a key element of a premium measurement system. Applying this software approach to a broad range of radiation detector hardware and data acquisition systems, ORTEC software offers comprehensive nuclear measurement solutions that provide integrated hardware control, analysis, and display in a single, easy-to-use package.
-
product
3U VPX Virtual Secure Router
VSR347D
The VSR347D takes advantage of Abaco’s SBC347D hardware with an optimized environment running Juniper Networks’ vSRX Virtual Firewall, providing high levels of network security and performance in a single 3U VPX slot.
-
product
Network Centric Secure Router
The system utilizes a 26-port layer 2/3 Gigabit Ethernet switch with embedded 32-bit CPU.It supports combinations of up to 26 SGMII ports consisting of 12 GbE Cu PHYs, 12 SGMII interfaces, two of which support 1G/2.5G, and up to three QSGMII ports. One of the SGMII ports can be dedicated to the CPU for packet insertion and extraction. The devices meet IEEE 802.3az requirements for green energy efficient Ethernet.
-
product
GC And GC-MS Application System
Py-GCMS
Pyrolysis gas chromatography mass spectrometry (Py-GCMS) can be used to characterize most materials including insoluble and complex materials at trace levels often without any sample pretreatment e.g. polymers, plastics, rubber, paints, dyes, resins, coatings, cellulose, wood, textiles, oils etc.
-
product
Android Application Testing
As Android apps have become a valuable tool to target more audiences and boost sales, it is vital to have an application that is robust, engaging, and works efficiently with maximum capacity. We at QACraft test all the essential parameters of your android app to ensure that the application is up to the standards and works well to serve the purpose. Our detailed report and several test reports have made us the number one choice in android app testing services in the USA. We have also helped many clients globally to test their android applications for a better business and an improved experience for all the users. Our team makes sure that the app works with high speed without any bugs delivering the topnotch user experience.
-
product
Application Specific Solutions
Circuit Check Application Specific Solutions for automotive, military & aerospace, medical, industrial, and computer networking applications.





























