Showing results: 16 - 30 of 256 items found.
-
DAST -
Synopsys, Inc.
Dynamic application security testing at the scale and speed modern enterprises need. WhiteHat™ Dynamic rapidly and accurately finds vulnerabilities in websites and applications, with the scale and agility you need to identify security risks across your entire application portfolio.
-
IronWASP -
Iron Web application Advanced Security testing Platform
IronWASP (Iron Web application Advanced Security testing Platform) is an open source system for web application vulnerability testing. It is designed to be customizable to the extent where users can create their own custom security scanners using it.
-
Audacix
Cyber security testing is often also referred to as pen testing or penetration testing. Such tests validate the cyber security defences of your applications, network infrastructure and even your team members. Our cyber security testers are highly trained and certified ethical hackers.
-
Zhejiang ULIRvisionTechnology Co., LTD
Thermal security camera system is widely used in areas where security and monitoring are required for timely detection of abnomal situations in order to prevent further damage. Below are two typical type of cameras for thermal surveillance and the importance of thermal imager for security in various application fields.
-
Advantech Co. Ltd.
With the coming Internet of Thing (IoT) era, more and more devices are connected together and it makes security become a significant issue. Now, the tailored security solutions can meet the specific design requirements for data and devices protection in embedded applications, and we will launch more security solution in the near future.
-
SAST -
Synopsys, Inc.
Coverity® is a fast, accurate, and highly scalable static analysis (SAST) solution that helps development and security teams address security and quality defects early in the software development life cycle (SDLC), track and manage risks across the application portfolio, and ensure compliance with security and coding standards.
-
ImpactQA
By testing the flaws in software, our security testing services seek to remove vulnerabilities before the software is deployed or purchased. By focusing on the different layers of an information system across the database, infrastructure, network, and access channels such as mobile, security testing looks at making the applications free from vulnerabilities. We assist online service providers, website owners, and independent software vendors to manage application security risks. We offer a comprehensive range of white, grey, or black-box model security testing based on your stage in the development cycle.
-
ZenQ
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
Testhouse Ltd
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
Amplicon USA
The Impact-S storage servers have been specifically designed to meet the requirements of IP surveillance applications such as DVR, NVR and IP CCTV systems. For more information on our security automation capabilities using our storage servers, please visit our Security Automation division section for security storage servers.
-
Teledyne e2v
Teledyne Imaging addresses low light imaging applications with a range of standard CMOS and EMCCD image sensors suitable for defense and security surveillance systems, whether for battlefield, vehicle, airborne, CCTV or security day camera’s.
-
DAST -
Probely
Probely’s trusted DAST scanner automates and scales web application and API security testing.
-
BreakingPoint VE -
Keysight Network Applications and Security
Ixia BreakingPoint Virtual Edition (VE) provides real-world application and threat simulation for complete performance and security testing, and its elastic deployment model allows you to achieve security resilience without sacrificing scalability or flexibility.
-
LGMS
Source code review, also known as Security Code Review is the process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places. Code review is a way of ensuring that the application has been developed to be “self-defending” in its given environment.
-
Application and Threat Intelligence (Subscription) -
Keysight Network Applications and Security
Test and simulation conditions must reflect the latest security threats and applications so that you can ensure your equipment and systems will perform reliably and protect networks from the most advanced and malicious traffic. With Ixia's BreakingPoint Application and Threat Intelligence (ATI) program, we do the research for you by identifying and generating security attacks and application protocols that keep you current.