Filter Results By:
Products
Applications
Manufacturers
- Xena Networks
product
Web-Based Access to Xena Applications
XenaWeb
This lets you quickly access all of Xena's test applications from Linux, Mac, and Windows operating environments using devices ranging from desktop PCs to tablets and smart phones all without installing any new software. This is a valuable feature for test engineers operating in environments where security regulations prohibit installing new software on the computing devices provided.
-
product
Clamp On Meters
Triplett Test Equipment & Tools
1000A True RMS AC/DC clamp-on meter with a backlit LCD display. It offers a large variety of measurement features including AC/DC Current, AC/DC Voltage, Resistance, Temperature, Capacitance, Continuity, Diode Test and NCV Detector. The rubberized overmolded housing provides impact and drop resistance in a sleek ergonomic design, and the user-friendly Auto Power Off feature helps maximizes battery life. With a CAT III 600V design, it provides superior resistance to damage from transient overvoltages in any demanding industrial setting. The Model 9325 is suited for a variety of industrial and residential applications such as security, electrical, HVAC installations and more. Includes test leads, Type K Temperature probe, 9V battery, and case.
-
product
Cloud Security Solutions
Online threats are constantly changing. Offering protection against the largest and most sophisticated attacks, Akamai helps you safeguard your websites and other Internet-facing applications from the risks of downtime and data theft. Built on the Akamai Intelligent Platform, Akamai Cloud Security Solutions provide the scale to stop the largest Distributed Denial-of-Service (DDoS) and web application attacks without reducing performance, as well as intelligence into the latest threats and the expertise to adapt to shifting tactics and attack vectors.
-
product
Code Integrity
JScrambler
If you develop a security sensitive Web Application we believe that you don''t want to give any bonuses to possible attackers. JScrambler enables you to conceal as much as possible, the logic of your application, such as what information is gathered from the user, how it is processed on the client-side, how it is sent to the servers-side. Since our obfuscation introduces a certain level of randomness, it allows you to explore code morphing techniques, which can be vital in precluding attack automation.
-
product
Communication Security
Shoghi Communications design and development specific Military Grade Crypto System , Shoghi provids end-to-end communication Security (COMSEC) and secure information transfer. Shoghi has strong experience in creating customer specific Algorithms and Key management schemes. All the hardware, inspite of all the complexities can be loaded by the customer themselves with their own algorithm, to enhance the whole security environment.We are known for our open source designs and crypto validated equipment supply to our military customers. In case of any specific design or development, please feel free to get in touch with our team
-
product
Compliant Data Loggers
21CFR
A selection of 21CFR Complaint Data Loggers, specifically developed to meet the data security required by the FDA's 21CFR part 11 regulations. As such these data loggers are suitable for use in applications where the integrity of the data is of the highest importance.
-
product
Counter UAS
SKYSENTRY
The rapidly increasing availability and affordability of low, slow and small unmanned aerial vehicles pose a concern for both the homeland security and military authorities.
-
product
Cross Domain Security Solutions
Stratign’s Cross Domain Security Solutions are highly trusted, government-accredited network security components that control and, if necessary, block the flow of data between two security domains at all layers.
-
product
Crypto Libraries Test Suite open source
Project Wycheproof
A set of security tests for identifying cryptographic vulnerabilities. Project Wycheproof tests crypto libraries against known attacks.
-
product
Cryptology/Cryptanalysis Training
Stratign provides customised training on Cryptology/Cryptanalysis. The training helps security agencies globally to optimize their resources and increase efficiency by updating their knowledge and skills.
-
product
Cyber Assurance
As the Internet of Things (IoT) continues to expand, connecting more and more of our world through communication devices, a growing trend has emerged: cyber security threats.
-
product
Cyber Drill And Blue Team Exercise Stimulation
LGMS Security Team will approach the Cyber Drill as a simulation of the possible occurrences during a cyber incident. Based on the defined scenario, LGMS Security Team will perform a technical simulation so as to accurately capture the responses of client’s team in responding to such incidents.In order to obtain the best results, LGMS Security Team will only use information that can be obtained either through public information or by any means of deception techniques.
-
product
Cyber Security and Digital Data Protection
As security demands evolve, Applied Computer Technologies provides a layered and progressive approach to security. Organizations without a sufficient security footprint are being affected and held ransom, operations disrupted, and business reputations damaged. We've partnered with some amazing and innovative companies to offer our clients the best cyber security and protection available today. Our integrated security products include next generation firewalls; ransomware and crypto malware; secure connectivity; Email, encryption, archiving, and SPAM filtering; Web and content filtering; and data integrity & theft prevention.
-
product
Cyber Security Assessment
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
product
Cyber Security/Network Security Training
Stratign’s Cyber Security/Network Security Training provides cybersecurity professionals with foundational, intermediate, and advanced security skills imparted through experts in the field.
-
product
D3S Drone Radiation Detector
The D3S Drone radiation detector is designed for gamma and neutron activity mapping. Using a lightweight drone designed to be easily carried and quickly deployed to provide CBRNE Homeland Security or civil nuclear workers. The D3S Drone is with a way to map radiation hotspots and patrol a large area quickly. The operator receives the real-time data transmission (counts per second) to a six-inch screen separate to the drone flight control screen.
-
product
Database Software
DTAWeb
DTAWeb allows users to upload and download data to private remote data storage at the Doble Security Data Centers. DTAWeb's advanced editing functions effectively organize data while built-in analysis tools allow you to quickly evaluate your apparatus test results and identify deteriorating equipment with ease.
-
product
Digital Belt-Pack Transmitter
DBu
The DBu transmitter is a 4th generation design with specially developed, high-efficiency digital circuitry for extended operating time on two AA batteries. The transmitter can tune in coarse or fine steps across the UHF television band from 470 to 608 MHz (470-614 MHz for export versions), with a selectable output power of 25 or 50 mW. The pure digital architecture enables AES 256-CTR encryption for high-level security applications.
-
product
Digital Multimeters
Triplett Test Equipment & Tools
compact digital multimeter with a backlit LCD display. It offers a large variety of measurement features including AC/DC Voltage, DC Current, Resistance, Continuity, Diode Test, Transistor hFE, and Temperature. The rubberized boot provides impact and drop resistance in a sleek ergonomic design, and the user-friendly Auto Power Off feature helps maximizes battery life. The Model 1101-B is well suited for a variety of commercial and residential applications such as security, home theater, electrical, HVAC installations and more. Includes test leads with alligator clips, Type K bead probe and battery (9V).
-
product
Drivetork ST motorized torque tester for safety cap
DRIVETORK ST
Besides having all the functions of the Drivetork Easy, the Star version can also carry out the rupture test when the cap has a security ring. It measures both the break (first peak) and the opening torque (max torque), and it displays the test curve.
-
product
Dual-Sensor Temperature-Measurement Pan/Tilt
TRITON™ A310 PT (Security)
Security professionals around the world have been using FLIR thermal cameras for perimeter and critical asset security for years. Facility Operations and Safety personnel have been using FLIR cameras to gather non-contact temperature measurements and condition monitoring data for decades. A310F and A310PT cameras are the first in the world to combine thermal and visible light video security imaging with automated safety monitoring based on the detection of temperature measurement thresholds.
-
product
e-CAM1M_CU10630_MOD - 1MP OV10633 Custom Lens Camera Module
e-CAM1M_CU10630_MOD is a High Dynamic Range (HDR), Wide Dynamic Range (WDR), custom lens camera module targeted for surveillance and security applications. This HDR camera module based on the OV10633 sensor from OmniVision is e-con’s first Wide Dynamic Range (WDR) camera module that can stream 1280x720p video at 30fps over its 8-bit digital video parallel interface. This 1MP WDR/HDR camera module is compatible with almost all of the popular Application Processor families such as TI OMAP, TI Sitara, NXP/Freescale i.MX, Marvell Xscale, Samsung etc and also compatible with Digital Signal/Media Processors such as TI OMAP35x, TI DaVinci DM37x, DaVinci DM3xx etc. This 1MP WDR/HDR camera module is compatible with almost all of the popular Application Processor families such as TI OMAP, TI Sitara, NXP/Freescale i.MX, Marvell Xscale, Samsung etc and also compatible with Digital Signal/Media Processors such as TI OMAP35x, TI DaVinci DM37x, DaVinci DM3xx etc. The camera module is mounted with an industry-standard S-mount M12P0.5 lens holder allowing our customers to choose a lens of their choice. The camera module is mounted with an industry-standard S-mount M12P0.5 lens holder allowing our customers to choose a lens of their choice.
-
product
Electromagnetic Environmental Effects
EEE
Electromagnetic Environmental Effects Services provides engineering design and test implementation for Electromagnetic Interference and Compatibility (EMI/EMC), along with TEMPEST capabilities certified under the National Security Agency (NSA) TEMPEST Endorsement Program.
-
product
Email Security Solution
Email Trust Platform
Agari's Email Trust Platform, deployed by Fortune 1000 companies and government agencies, is the only solution that effectively stops phishing by identifying the true sender of emails. Agari's proprietary analytics engine and email telemetry network provides unparalleled visibility into more than 10 billion email messages per day across 3 billion mailboxes. This insight drives the company's Trust Analytics machine learning engine, which uniquely enables enterprises to stop phishing attacks against their employees and customers.
-
product
Embassy Construction Support Program
Scientific Research Corp. STI Division
SRC deploys personnel around the world to support the construction of embassies and consulates from Australia to Yemen. We provide electrical, civil, mechanical, and construction engineers to help the State Department oversee the general contractor constructing the building. These locations are a key component in establishing diplomacy and global security throughout our world.
-
product
Embedded Computing Modules
Curtiss-Wright Defense Solutions
Our selection of rugged, embedded computing modules has been trusted and proven in defense, commercial, and industrial applications worldwide. Choose from solutions with hardened security, high-performance processing for machine learning and artificial intelligence (AI), and SWaP-optimized, miniature form factors to meet your program requirements. Our innovative solutions are designed in alignment with MOSA standards, including OpenVPX, SOSA and CMOSS, and engineered to succeed.
-
product
Embedded Ethernet Switches
Designed specifically for battlefield and industrial applications, our range of switches features advanced firewalls, encryption, and hardware-assisted security.
-
product
Embedded Security Solution
With the coming Internet of Thing (IoT) era, more and more devices are connected together and it makes security become a significant issue. Now, the tailored security solutions can meet the specific design requirements for data and devices protection in embedded applications, and we will launch more security solution in the near future.
-
product
Embedded Wi-Fi Mesh Module
MNS-300EM
MNS-300EM is an embedded module that provides mesh connectivity for low-power portable devices to connect to a 802.11s capable mesh network. It features an 802.11ac radio, and a complete TCP/IP network protocol stack with an optimized QCA9377 wireless radio driver and security supplicant in a self-contained hardware package. It also supports enterprise security which ensures data integrity and privacy for highly sensitive applications.Embedded Wi-Fi Mesh with Enterprise Security
-
product
Engineering Data Analytics
ESI’s Data Analytics solution platform INENDI is a specialized set of solutions that combines state of the art Engineering Data Analytics and management approaches, intuitive visualization and efficient investigation methodologies to allow for a fast discovery of the unknown in large high-dimensional datasets.With INENDI, ESI brings its long-standing innovative capability and its expertise in designing solutions tailored for professionals who need to solve difficult high-value problems into the Cyber Security market.
-
product
Enhance Secure Control Applications
MachXO3D
*Simplifies implementation of hardware security by integrating Root-of-Trust in your platform’s first on, last off device*Supports security throughout the product lifecycle including device manufacturing and transport, platform manufacturing, installation, operation and decommissioning