Cyber Security
See Also: Cyber, Phishing, Pen Testing, DDoS
-
Product
Full-HD Mini Dome Security Camera
FLIR ARIEL™ CM-3202
-
The Ariel CM-3202 mini dome camera offers 1080p video and fast frame rates in high-motion, low light scenes. True wide dynamic range (WDR) on the CM-3202 captures sharp video in complex environments, such as critical infrastructure sites, commercial offices, and large campuses. With a strong H.265 built-in motion processing architecture, the Ariel CM-3202 mini dome delivers predictable, efficient streaming and storage, reducing utility costs and total cost of ownership (TCO).
-
Product
High-Performance Application and Security Load Module
PerfectStorm 10/1GE Load Module
-
Keysight Network Applications and Security
Equipped with powerful multi-core, multi-threaded network processors, PerfectStorm 10/1GbE is designed to satisfy the testing needs of manufacturers needing speed flexibility in their testing resources. Networking equipment manufacturers building new equipment or service providers and large enterprises integrating this them benefit from testing and verifying performance and functionality prior to deployment.
-
Product
Open Source Service to Help Secure and Trust Your Software
Community Attestation Service / CAS
-
- CAS stores all signatures inside of immudb, the standard for open source immutable databases.- CAS is protected against tampering. All attestation data is integrity-checked and cryptographically verified by the CAS client.- CAS is also protected against MITM attacks. The public key below is checked by every communication.A Software Bill of Materials (SBOM) is a list of components in a piece of software.Like a list of ingredients on food packaging -- where you might consult a label to avoid foods that may cause an allergy -- SBOMs can help companies avoid use of software that may harm their organization.If defects are later found in a specific part, the SBOM makes it easy to locate affected products.
-
Product
Security Vehicles
-
When you need to set up robust security operations in a temporary or outdoor location, our security vehicles can provide a tried and tested solution. For use at festivals, public ceremonies, sports events and other outdoor functions, our mobile check point and scan truck will help keep your guests or members of the public safe from security threats.
-
Product
Security Testing Service
-
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
Product
Secure Hardened Android Phone
-
Shoghi has designed a totally Secure Hardened Android phone, which comes with a Specialized Operating system to prevent Hackers from remotely compromising your device , from all major vulnerabilities and exploits including protection from zero-days.
-
Product
2U Rackmount Network Appliance With Dual 3rd Gen Intel® Xeon® Scalable Processors, Up To 8 NMC Slots. Ideal For Enterprise Network Security.
FWA-6171
Network Appliance
Dual 3rd Gen Intel® Xeon® Scalable Processors, up to 38 Cores32 x DDR4 ECC RDIMM slotsHot-swap 2.5" disk bays and system fan, redundant PSU, 1 x FH/HL Gen4 PCIe x16 slotRedundant BIOS and BMC imageIPMI v2.0 compliant, with web interface8 x Advantech network module expansions w/ PCIe Gen4 bandwidth
-
Product
Security Testing Services
-
By testing the flaws in software, our security testing services seek to remove vulnerabilities before the software is deployed or purchased. By focusing on the different layers of an information system across the database, infrastructure, network, and access channels such as mobile, security testing looks at making the applications free from vulnerabilities. We assist online service providers, website owners, and independent software vendors to manage application security risks. We offer a comprehensive range of white, grey, or black-box model security testing based on your stage in the development cycle.
-
Product
ARINC 615/615A Tablet PC Secure PDL Solution
PDL-615
-
Avionics Interface Technologies
The PDL-615 is a secure rugged, portable, tablet PC based ARINC 615 & ARINC 615A PDL solution.
-
Product
Cyber Forensics
-
Cyber Forensics deals in safeguarding the digital evidence gathered during the cyber attack, identifying the duration of the attack, and locating the geographical location of the attack followed by mapping them.
-
Product
Ethernet Switch & Secure Router
VPX3-685
-
Curtiss-Wright Defense Solutions
The VPX3-685 is a fully-featured Layer-2/Layer-3 managed Ethernet router with a highly integrated security subsystem. Enabling the vision of Network Centric connectivity, the VPX3-685 Secure Ethernet Network Router provides an accelerated path to secure network-ready architectures that can interoperate seamlessly within the Global Information Grid (GIG).
-
Product
1U Network Appliance With 12th/13th/14th Gen Intel® Core Processors For Network Security And Management For Network Security Applications.
FWA-3034
Network Appliance
12th/13th/14th Gen Intel Core Processors, up to 24 Cores/32 Threads, Hybrid Performance & Efficiency CoresDDR5 UDIMM with up to 64GB2 x 1GbE SFP, 8 x 2.5GbE RJ-45, 2 x 10GbE SFP+ with two pairs of LAN bypass2 x internal 2.5” SATA SSDs/HDDsIPMI v2.0 compliant BMC1 x Advantech network module expansion
-
Product
Cyber Crisis Simulator
-
When responding to a cyber crisis, the C-Suite no longer works in a silo. Executive management continuously collaborates with incident response and SOC teams to make well-informed decisions. But tabletop exercises and conventional crisis simulation platforms do not prepare for this new reality.
-
Product
IT Security & Anti-Virus Testing Services
-
The AV-TEST Institute is a leading international and independent service provider in the fields of IT security and anti-virus research. The aim of the research work carried out by AV-TEST is to directly detect the latest malware, to analyse it using state-of-the-art methods and to inform our customers of the top-quality results obtained.
-
Product
Enterprise-Wide Application and Security Testing
PerfectStorm ONE
-
Keysight Network Applications and Security
Enterprises and government organizations are making major investments in consolidating and rebuilding data centers and enterprise -wide networks. The stakes have never been so high to get it right the first time.
-
Product
Rackmount Network Appliance With Dual AMD EPYC™ 9004 Processors For Gateway And NGFW. Ideal For High-Performance Network Security.
FWA-6183
Network Appliance
Dual AMD EPYC™ 9004 Processors, up to 256 Cores16 x DDR5 ECC RDIMM slotsHot-swap 2.5" disk bays and system fan, redundant PSU, 1 x HH/HL Gen5 PCIe x16 slotIntegrated security features with secure boot, memory encryption, virtualization, and multi-key encryptionIPMI v2.0 compliant, with web interface8 x Advantech network module expansions w/ PCIe Gen5 bandwidth
-
Product
Tiny Network Appliance With Intel® Celeron® J3355/J3455 For Entry Level SD-WAN And Security Gateway. Ideal For SD-WAN Deployments.
FWA-T011
Network Appliance
Tiny Network Appliance with Intel® Celeron® J3355/J3455Up to 4 x GbE RJ-45 ports4G LTE and Wi-Fi supported (optional)Optional TPM 2.0 or non-TPM supported by requestTiny and fan-less design supported by optional wall/ VESA/ DIN-rail mounting kit
-
Product
High Core Density 2U Network Appliance With Security And Acceleration Features Ready. Ideal For Network Security And Crypto Acceleration Workloads.
FWA-6080
Network Appliance
Single AMD EPYC™ 7003 Processors, up to 64 Cores16 x DDR4 ECC RDIMM slotsHot-swap 2.5" disk bays and system fan, redundant PSU, 2 x HH/HL Gen4 PCIe x16 slotIntegrated security features with secure boot, memory encryption, and virtualizationIPMI v2.0 compliant, with web interface8 x Advantech network module expansions w/ PCIe Gen4 bandwidth
-
Product
Trusted & Secure Servers
-
A part of the EnterpriseSeries™ product line, Mercury’s RES Trust servers employ U.S. designed and manufactured motherboards with embedded Intel® processors and composable BuiltSECURE™ framework to deliver trusted performance for the most security-imperative mission critical applications. RES Trust servers can be configured with a variety of nation-state-level security features. System security features enable customer Foreign Military Sales (FMS) or Direct Commercial Sales (DCS) program success.
-
Product
Network Security Appliances
-
With the development and popularization of cloud computing technologies, traditional network security providers are repositioning and moving their development efforts from network security solutions that can only handle single point security issues to a new generation of network security solution that are effective in big data and cloud computing environments. ICT equipment providers in the network security industry need network security servers that have massive DPI parsing power, full support for NFV and SDN, and a powerful big data processing engine. This equipment must also support dynamic capacity expansion and scalable IO extension in order to adapt to a more complicated cloud environment.
-
Product
AlgoSec Platform - Secure Application Connectivity
AlgoSec
-
Use automation to speed up and tighten your security policies.
-
Product
Control, Monitor, Security and Power Management for ATEs
-
Subset of 6TL's FastATE modules designed for the control, monitoring, security, and power management of ATEs (automated test equipment).
-
Product
Advanced Sensors & Security Systems
-
Applied Research Associates, Inc.
ARA has provided security services since the mid-1980s and today provides tools to maximize physical security that are highly scalable and affordable, offering our government and commercial customers advanced perimeter security, threat pattern analysis, and intrusion detection. We integrate our detection and assessment capabilities to provide a real-time, complete operational picture to keep personnel and assets secure, day and night. Our engineers are experts in design and integration of multiple sensor types and other intrusion detection systems to create customizable, integrated mobile security systems.
-
Product
1U Rackmount Network Appliance With 4th/5th Generation Intel® Xeon® Scalable Processor For NFV And SD-WAN. Ideal For Enterprise Network Security.
FWA-5072
Network Appliance
Single 4th/5th Gen Intel® Xeon® Scalable Processors, up to 60 Cores16 x DDR5 ECC RDIMM slotsHot-swap system fan and redundant PSU, 2 x Internal 2.5" disk bays, 1 x HH/HL PCIe Gen4 x16 slotIntel® QAT with up to 200G crypto supportIPMI v2.0 compliant with web interface4 x Advantech network module expansions w/ PCIe Gen5 bandwidth
-
Product
Virtualized Security Resilience Testing
BreakingPoint VE
-
Keysight Network Applications and Security
Ixia BreakingPoint Virtual Edition (VE) provides real-world application and threat simulation for complete performance and security testing, and its elastic deployment model allows you to achieve security resilience without sacrificing scalability or flexibility.
-
Product
Intelligent Checked Baggage Security
-
We offer advanced technology for checked baggage screening in our portfolio of explosives detection systems. We provide high resolution, 3D images of passenger bags and parcels to rapidly identify prohibited and dangerous items in real time.
-
Product
Cyber Threat Assessment Program
-
Scientific Research Corp. STI Division
SRC provides threat assessment support focused on cyber threats that may impact the ability to wirelessly link with other systems. This activity supports the development of test and evaluation capabilities important to not only identifying current deficiencies but also for developing next generation systems.
-
Product
Cyber Drill And Blue Team Exercise Stimulation
-
LGMS Security Team will approach the Cyber Drill as a simulation of the possible occurrences during a cyber incident. Based on the defined scenario, LGMS Security Team will perform a technical simulation so as to accurately capture the responses of client’s team in responding to such incidents.In order to obtain the best results, LGMS Security Team will only use information that can be obtained either through public information or by any means of deception techniques.
-
Product
2U Rackmount Network Appliance With 4th/5th Generation Intel® Xeon® Scalable Processor For NFV. Ideal For Enterprise Network Security.
FWA-6072
Network Appliance
Single 4th/5th Gen Intel® Xeon® Scalable Processor, up to 60 Cores16 x DDR5 ECC RDIMM slotsHot-swap 2.5" disk bays and system fan, redundant PSU, 1 x FH/HL Gen4 PCIe x16 slotIntel® QAT with up to 200G Crypto supportIPMI v2.0 compliant, with web interface8 x Advantech network module expansions w/ PCIe Gen5 bandwidth





























