Filter Results By:
Products
Applications
Manufacturers
IP Security
-
product
RA Family Of Arm-based MCUs
RA4
The RA4 Series bridges the needs for reasonable low power with the demand for connectivity and performance. These MCUs deliver up to 48MHz of CPU performance using an ArmⓇ CortexⓇ-M4 core with up to 256kB of embedded flash memory. The series offers a wide set of peripherals, including USB, CAN, ADC, capacitive touch, a segment LCD controller, and additional security IP integration, making it suitable for industrial equipment, home appliances, office equipment, healthcare products, and meters.
-
product
Processor IP
Security
Security IP designed to protect against a variety of different vulnerabilities.
-
product
Chamber Controllers & Software
Designed off of our previous controller platform with familiar features in an improved interface, added functionality for ease and fewer steps to accomplish your daily testing needs. Remotely monitor and control your chambers and receive text/email alarms. From the home screen users can now manually control, run or stop a profile and view a snapshot of current activity like actual/setpoint values, alarm, datalogging, profile, security, IP address information and more.
-
product
RZ/G1 32-bit MPUs
The RZ/G1 high-performance 32-bit processors have 1GHz+ Arm® Cortex®-A cores, a 3D graphics engine, a full high-definition (HD) video engine, secure IP, high-speed interfaces such as PCIe, SATA and Gigabit Ethernet, and other functions necessary for embedded devices in the industrial segment.
-
product
IP Cores
logicBRICKS IP Cores by Xylon - for applications including compact multilayer video controller, versatile video input, multiview 3D transformation engine, image signal processing (isp) ulstraHD pipeline, high dynamic range pipeline, scalable 3d graphics accelerator, DDR3 SDRAM Memory Controller, slave hssl controller, HDR image signal processing framework, video design framework for multi-camera vision applications, and more
-
product
IP Surveillance
In response to the enterprises’ crucial demand for security monitoring, PLANET IP Surveillance features H.265, H.265+ High Efficiency Video Coding (HEVC), AI face detection and recognition, along with AI-powered Video Analytics such as intrusion detection, cross line detection, loitering detection and more. Moreover, with PLANET’s user-friendly website management, NVR, Apps and free DDNS services, customers are able to monitor all devices remotely and easily.
-
product
Industrial & Security
Kromek's custom configurations of Cadmium Zinc Telluride (CZT) based detector tiles and linear arrays can be implemented into custom Advanced Imaging platforms for various Industry and Security applications.
-
product
IP Converters
SMPTE-2022 compliant standalone solutions for conversion between IP and "traditional" DTV signals such as ASI and QAM. These IP converters are hardware-based, providing low latency and zero-jitter transmission of IP signals.
-
product
IP Gateway
SFT3503A
Hangzhou Softel Optic Co., Ltd.
SFT3503A Bidirectional IP Gateway is a head-end interface device which is used for DVB and Ethernet. It can be used both for a receiver and a lancers! On one hand, in the lancers part, this machine can be used for sending IP stream, turning the TS stream into IP Stream. On the other hand, in the receive part; this machine can be used for receiving IP stream, turning the IP stream into TS stream.
-
product
Quantum-Safe Security
CN6000 Series
The Centauris CN6000 encryptors may be upgraded to quantum cryptography through the addition of the Cerberis Quantum Key Distribution (QKD) server to ensure that the solutions are quantum-safe for the long-term protection of sensitive data. This also ensures investment-protection of the encryptors. Such quantum cryptography is provably secure, ensures anti-eavesdropping detection and provides long-term forward secrecy against brute force hacking and attacks by quantum computers.
-
product
IP Reuse
IC Manage Global Design Platform (GDP & GDP-XL) includes an open platform for maximizing IP reuse. Design and verification teams can use the system to rapidly publish and integrate IP into existing flows, and to trace bug dependencies. Internal and third party IP can be imported or linked with IP Central from multiple commercial and open source design management systems, as well as internal revision control systems. ”
-
product
Secure Automotive
With cars becoming more connected and therefore more vulnerable to attacks, security has become critical for automotive applications and is at the heart of many concerns. ST is committed to provide secure solutions to address the challenges of this new era of digital technologies.
-
product
Pack (IP) Modules
IP & MM
Industry Pack (IP) modules are international standards as per ANSI-VITA 4.These are mezzanine modules of approximately the size of a business card (99mm x 45mm). Featuring a 16 or 32 bit wide I/O interface and 50 user defined I/O pins, these modules are ideal for providing the capability for high density I/O.IP carriers provide multiple slots on a single carrier. This allows multiple IP modules to be provided on a single slot in a Compact PCI / VME / VXI / PCI card cage.Industry Pack modules provide some unique advantages in system integration. These include:
-
product
IP Surveillance Camera
ENVIROMUX-IPCAM
View and control the camera from the ENVIROMUX web interface, the camera web interface, included software, or with a compatible cell phone. With the ENVIROMUX-2D/5D/16D, a triggered snapshot can be forwarded in alert e-mails. A snapshot can be triggered by any programmed event (motion detection, door open/close, glass break, smoke, liquid detection, etc.). Image sensor: 1/4" progressive scan CMOS sensor. Video Streaming: simultaneous Motion JPEG and MPEG-4. Frame rate: 30fps at 640x480 (VGA) resolution. Lens: F2.0, 4.0 mm (0.16 in). RJ45 connector. Wireless models: wireless IEEE 802.11 b/g up to 54 Mbps. Regulatory approvals: CE, FCC, RoHS.
-
product
IP Module
IP-429
ARINC 429 is a versatile standardized bus interface. ARINC 429 is robust featuring Manchester encoding and enough voltage swing to provide excellent noise immunity and reasonable throughput rates. ARINC 429 is the interface of choice for critical applications; for example aircraft instrumentation and control.
-
product
Secure Smartphone - Salus
Stratign’s Salus Smartphone is a high-end smartphone built from the ground-up and protects you from eavesdropping, malware, data breaches and any attempts to hack or tamper with your mobile communications and data.
-
product
Network Security Testing
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
product
IP Solution
eMMC 5.1
Demand for mobile content capacity and bandwidth for video, pictures and music is ever increasing. To address this demand in the next generation of smartphones, tablets, and portable devices, the eMMC 5.1 Specification from JEDEC, improves the current HS400 speeds operating at 3.2Gbps, with "command queuing" making the data transfers highly efficient by offloading the software overhead into the controller. eMMC 5.1 further improves the reliability of operation by utilizing an "enhanced strobe" at the PHY layer. The eMMC5.1 is backward compatible with the existing eMMC 4.51 and eMMC 5.0 Devices.
-
product
Security Consulting
Our Managed Security Services can dramatically improve your ongoing security posture through more frequent, cost effective security assessments, helping you to identify, assess and manage risk.
-
product
IP Pulse
IP Compatible card with 4 programmable pulse generators. TTL or RS422 / RS485 compatible outputs. Programmable pulse - nS to seconds. Programmable count or free
-
product
API Security Testing
In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:
-
product
Defense & Security
Protecting populations from nuclear risk. Our instruments precisely detect and monitor radiation in the most critical and challenging situations, empowering military and civil defense teams to keep populations safe.
-
product
Security Testing Services
By testing the flaws in software, our security testing services seek to remove vulnerabilities before the software is deployed or purchased. By focusing on the different layers of an information system across the database, infrastructure, network, and access channels such as mobile, security testing looks at making the applications free from vulnerabilities. We assist online service providers, website owners, and independent software vendors to manage application security risks. We offer a comprehensive range of white, grey, or black-box model security testing based on your stage in the development cycle.
-
product
Standalone IP To ASI Converter
DTE-3100
DekTec's standalone power-over-ethernet enabled IP to ASI Converter, allowing zero-jitter transmission of Transport Streams coming from IP networks.
-
product
Application Security Testing Solution
CxIAST
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.