-
product
Security Labs Community Edition
*Hack and Patch Real Applications- Get hands-on experience with top vulnerabilities and see the fix impact in a live app, in real-time.*Level-Up Your Coding Approach- Add secure coding to your list of skills by fixing issues that you face regularly, in the languages you’re most comfortable with. *Complete Labs in Minutes- With labs under 10 minutes, you can learn fast and gauge your progress in real-time for quick feedback.
-
product
Security Consulting
Our Managed Security Services can dramatically improve your ongoing security posture through more frequent, cost effective security assessments, helping you to identify, assess and manage risk.
-
product
Application Security Testing Solution
CxIAST
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.
-
product
NETWORK SECURITY
Network Critical Solutions Limited
Network Critical gives all your security systems complete, uncompromising visibility into what’s happening on the network. Get better overall ROI by improving performance of existing security systems to keep pace with increasing network speed and complexity, while gaining the insight needed to better detect, contain and recover from breaches fast.
-
product
Mobile Application Security
ImmuniWeb®
ImmuniWeb® Mobile is a part of ImmuniWeb Application Security Testing Platform dedicated to comprehensive security testing of mobile applications. Based on proprietary machine-learning SAST and DAST mobile application testing technology, it also provides thorough testing of the mobile backend.
-
product
Network Test and Security
Ensuring high performance of wired, Wi-Fi, and 3G/4G/LTE and 5G networks in both pre-deployment and real-world environments while enabling dynamic security intelligence to help stay one step ahead of attacks.
-
product
Visible PTZ Security Cameras
Quasar™ 4K IR PTZ Cameras
With crisp 4K video resolution, on-board long-range IR illumination, and 22x or 31x optical zoom options, FLIR Quasar™4K IR PTZ cameras deliver critical situational awareness. Exceptional field of view gives operators the ability to seamlessly monitor key details throughout large areas. The combination of high-performance optics and sensors, exceptional low light visible imaging, and effortless integration with all major third-party VMS and FLIR United VMS makes Quasar 4K IR PTZ cameras an ideal solution for critical infrastructure sites and remote facilities that require close monitoring.
-
product
API Security Testing
In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:
-
product
Modernized Navstar Security Algorithm (MNSA) M-code Testing
SimMNSA
The M-code signal is part of the security architecture that all new Military GPS User Equipment (MGUE) has been required to use since 2017. Until recently, testing with non-classified AES-encryption and replay of M-code Satellite Data Sets (SDS) have been the only methods authorized for GPS M-code receiver testing using a constellation simulator.
-
product
Cross Domain Security Solutions
Stratign’s Cross Domain Security Solutions are highly trusted, government-accredited network security components that control and, if necessary, block the flow of data between two security domains at all layers.
-
product
Quantum-Safe Security
CN8000 Series
The CN8000 harnesses the power of quantum mechanics to help ensure secure communications – the encryption keys are generated by IDQ’s Quantum Random Number Generator to guarantee inherent and provable randomness. The CN8000 can also be upgraded to be quantum-safe via the Cerberis QKD Blade (quantum cryptography) to ensure long-term protection of the data in transit.
-
product
IT Security & Anti-Virus Testing Services
The AV-TEST Institute is a leading international and independent service provider in the fields of IT security and anti-virus research. The aim of the research work carried out by AV-TEST is to directly detect the latest malware, to analyse it using state-of-the-art methods and to inform our customers of the top-quality results obtained.
-
product
Multi-Protocol Wireless Application Networking System with Open, Integrated, Secure & Scalable System for Data Aggregation & Viewing
Ion
Jacobs’ vendor agnostic architecture was designed and implemented with the goal of an open Industrial Internet of Things (IoT) solution. ion© adapts and applies technology that enables our customers to gain efficiencies and savings, through connecting our client’s sites then collecting and displaying data in a unified interface. This provides custom insights to our clients, empowering them to ensure safety and respond quickly. The Jacobs ion© solution has been operationally deployed for over a decade and enables innovative approaches for data accuracy, data timeliness, and safety — greatly improving information flow and productivity.
-
product
Cable Assembly, 37-Pin D-Type, Male to Unterminated With Ferrules, 2m, HV
40-972-037-2m-MU-HV
The 37-Pin D-Type HV Cable assemblies are constructed from 7/0.2 (24AWG) Tinned Copper Wire with PTFE Type C insulation. The connector assembly can be secured to the mating part by a screwlock. The 37-Pin Female connector options of this product can be directly mated to a corresponding Pickering Interfaces switching product.
-
product
20-Pin GMCT Cable, Male to Male, 10A, 2m
A020GMR-020GMR-0B200
The 20-Pin GMCT cable assembly is constructed from 19/0.254 (18AWG) Tinned Copper Wire with PFA insulation. Screwlocks are provided to secure the connectors to their associated products. The 20-Pin Female connector option of this cable assembly is suited for direct connection to Pickering Interfaces products.
-
product
3-Pin Power D-Type Cable, Female to Female, 1m
40-970-403-1m-FF
The 3-Pin Power D-Type cable assembly is constructed from 50/0.26mm2 (14 AWG) Tinned Copper Wire with PVC insulation. Screwlocks are provided to secure the connectors to their associated products.
-
product
4-Pin Power D-Type Female to Unterminated With Cut Ends
40-972-404-1m-FU
The 4-Pin Power D-Type Connector to Unterminated Cable Assy is constructed from PVC insulated 56/0.3 (12AWG) Copper wire. The connector can be secured to the product by screwlocks and the unterminated connections are coded to match the connector pin designation.
-
product
Personnel Tracker
NEON
NEON Personnel Tracker is an enterprise-class indoor location solution for industrial, security, public safety, and defense applications. NEON Personnel Tracker uses TRX''s patented NEON Indoor Location Software to deliver 3D location to the NEON Command software, providing clear visualization of personnel as they operate indoors or in other places were GPS does not work. Centralized, cloud-connected configuration tools enable easy 3D building creation and tools to add and geo-reference floor plans.
-
product
ConnectIQ
ConnectIQ is a no-code, cloud-native data enablement platform designed specifically for banks and financial services organisations. It provides faster scalability, enhanced data protection features, and accelerated data delivery while ensuring secure data sharing and exchange. Designed for on-premises, cloud and hybrid architectures, ConnectIQ enables rich data insights with data integrity at its core.
-
product
8-Pin Power D-Type Cable, Male to Unterminated, Ferrules, 1m
A008PM5-F-5A100
The 8-Pin Power D-Type Connector to Unterminated Cable Assy is constructed from PVC insulated 56/0.3 (12AWG) Copper wire. The connector can be secured to the product by screwlocks and the unterminated connections are coded to match the connector pin designation.
-
product
Cable Assembly 44-Pin D-Type Female to Unterminated With Tinned Ends, 0.5m
A044HF4-T-0A050
The 44-Pin Connector to Unterminated Cable Assy is constructed from PFA insulated 7/0.15 (26AWG) Silver Plated Copper Wire. The connector can be secured to the product by screwlocks.
-
product
Pneumatic Contact, ITA, Ferruless Fitting, for 3/8" OD, 1/4" [9.5 x 6 mm] ID Tubing
610132101
Primary mating contact 610131101.Pneumatic Connectors are available with either ferruless polytube fittings (3/8" tubing OD) or hose barb (3/8" tubing ID). Ferruless fittings securely attach tubing without hose clamp - which is recommended for the hose barb type (hose clamp not included). The 1/8" ID connectors are available with hose barb.
-
product
Cable Assembly, 200-Pin LFH, Male (Male Screwlocks) to 4x50-Pin D-Type Male, 1m
40-971B-200D-1m-MM
This male rear exit to D-type 1m long cable assembly is suited for direct connection to all Pickering Interfaces products using the 200-Pin LFH connector. It is constructed from 4 bundles of 50-wire round/flat ribbon cables, terminated with 50-pin male D-type connectors. The connector can be secured to the product by screwlocks. The cable assembly can be used with Pickering's 50-Pin D-Type connector blocks (refer to 90-005D). Each of the four D-type cables is numbered to allow identification.
-
product
Network Surveillance System
The network backbone contains a wealth of information that can be monitored and collected to support diagnostic, troubleshooting, and fraud prevention activities. Surveillance of network characteristics is becoming more important than ever before. Few important aspects of network surveillance include, Performance Monitoring, Security, Fraud Prevention, Physical Layer monitoring, Billing Verification, Remote Protocol Analysis, Failure Prediction, Traffic Engineering, Call Quality Monitoring and Troubleshooting.
-
product
Structured Wiring
Structured wiring refers to a whole-house network of audio, video, data, telephone, television, home automation or security signals. This wiring can be installed when a home is being built. It may be put in during a remodel. Structured wiring can also be added on its own.
-
product
Auditability
Schweitzer Engineering Laboratories, Inc.
Security devices collect critical event information to simplify audit reporting.
-
product
20-Pin GMCT Cable, Male to Unterminated, Ferrules, 10A, 1m
A020GMR-F-0C100
The 20-Pin GMCT cable assembly is constructed from 19/0.254 (18AWG) Tinned Copper Wire with PFA insulation. Screwlocks are provided to secure the connector to associated product. The unterminated connections are coded to match the connector pin designation. Users may need to make their own cable strain relief arrangements when using this product and should ensure appropriate electrical safety precautions are observed.
-
product
Line Protection
Schweitzer Engineering Laboratories, Inc.
SEL transmission line protection relays provide subcycle line differential and multizone distance protection for a secure, reliable, and high-speed solution. Their fault-locating capabilities allow you to efficiently dispatch line crews to quickly isolate line problems and restore service faster.
-
product
Cable Assembly, 78-Pin D-Type, Female to Unterminated With Tinned Ends
A078HF4-T-0A200
A 78-Pin D-Type to Unterminated cable assembly constructed from 7/0.15 (26AWG) Silver Plated Copper Wire. Screwlocks are provided to secure the cable connector to associated products. Has a 45 degree cable exit away from pin 1.





























