Showing results: 16 - 30 of 50 items found.
-
Tripwire Professional Services -
Tripwire
Organizations do all that they can to protect their critical cyber assets, but they don’t always systematically test their defenses. Penetration tests—otherwise known as pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems. Whether we are testing an application or network environment, Tripwire’s pen testing will not only identify vulnerabilities, but it will also demonstrate them through exploitation—definitively determining if unauthorized access or other malicious activity is possible.
-
LGMS
There is a rising concern that IoT devices are being developed rapidly without appropriate consideration of the profound security challenges involved, as demonstrated by the various IoT devices hacked in recent years— automobiles, cameras, children's toys, thermostats, and medical devices.With more than a decade of specialized cyber security testing experience combined with our extensive research and development, we can assess and identify both common and complex security vulnerabilities that may be residing within your whole IoT ecosystem.
-
LGMS
A Mobile application is an application that runs on mobile devices. It has become a dominant and popular business tool today. Corporates are empowering mobile devices by offering more and more services on mobile and handheld devices. Unfortunately, mobile devices like notebook computers, PDAs, Pocket PCs, smartphones, and BlackBerrys are all attractive targets for malicious attackers. By accessing your corporate network via email, VPNs, and other means of remote access, a successful compromise can result in the exposure of Personally Identifiable Information, corporate secrets, customer data, and additional sensitive information.
-
SecSmash -
Tevora
Secsmash is a modular framework for leveraging credentials to enterprise security tools to own the enterprise. Instead of spinning up your own C2 on a pentest, leverage the C2 that organizations have already deployed. HTTP integrator takes inputs, and extractions to generate new inputs, to drive a chain of HTTP request to authenticate to the target system, enumerate connected hosts, and run commands.
-
Precise Testing Solution
To verify the functionalities of your software, to check for the quality of your product, and to see that the applicationis working against business requirements, opt for Functional Testing.
-
MTI Corp.
economic nail penetration tester for all types of rechargeable batteries, which meets CE standard. The nail penetration is performed inside a safe and vented stainless-steel test chamber using a 3~8 mm diameter steel nail at variable speed from 10~100mm/s. There is a fixture to tighten various type cells, pouches or cylinders in the test chamber.
-
LGMS
An Intelligence-Led Penetration Test (Intel-led Pentest) closely mimics the tactics and techniques of sophisticated and persistent cyber attackers with the intention of compromising an organization’s critical systems.
-
ZenQ
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
Precise Testing Solution
Network Penetration Testing is a technique that identifies security vulnerabilities in the application by applying different malicious processes to break network security.
-
UI-FT20 -
Unuo Instruments
Bally Waterproofness Tester is to test materials like coated leather, leather dynamic water penetration resistance ability. The material would be partially put in water and the bally water penetration tester would flex the sample in the water under certain speed to simulate material water resistance in daily work. Here for more Leather Testing Machine.
-
Audacix
Cyber security testing is often also referred to as pen testing or penetration testing. Such tests validate the cyber security defences of your applications, network infrastructure and even your team members. Our cyber security testers are highly trained and certified ethical hackers.
-
LGMS
Self-Service Terminal (SST) penetration testing is an activity which identifies vulnerabilities in SST that may potentially exist due to the lack of physical security measures, technical configuration or process controls.
-
Sataton Instruments Technology CO., Ltd
Face masks particle filtration efficiency (BFE) tester is device to determine the particle filter penetration and filtration efficiency for respiratory protective devices and face masks. The tester with particle generator can provide sodium chloride particles and paraffin oil particles. It can measure the particle penetration, filtering efficiency and the breathing resistance delta P. It is widely used in quality control, research and development, certification, manufacturing or testing industry, etc.
-
Anton Paar GmbH
Benefit from Anton Paar’s longstanding experience in consistency and ductility testing. From essential tools for surface penetration, grease working, and softening point testing to reliable breaking point testers – Anton Paar’s widely applicable solutions for consistency testing guarantee full compliance with a vast range of relevant standards.
-
DeFelsko Corp.
Quickly and easily detect air and water leaks in building envelopes and rigid air barrier systems. Ideal for testing penetrations (fasteners, masonry ties, etc.) and continuity of joints and seams in rigid air barrier systems.