Showing results: 106 - 120 of 750 items found.
-
IronWASP -
Iron Web application Advanced Security testing Platform
IronWASP (Iron Web application Advanced Security testing Platform) is an open source system for web application vulnerability testing. It is designed to be customizable to the extent where users can create their own custom security scanners using it.
-
Developer -
Keysight Network Applications and Security
Ixia Developer is an agile application performance and security resilience test tool that helps developers find bugs early in the development cycle. Ixia Developer features an integrated debugger that helps locate the primary source of defects. An easy-to-use, fast, and responsive web-based user interface significantly reduces the time it takes to move from test configuration to actual packets on the network. And by leveraging a robust ATI engine, Ixia Developer always includes the most up-to-date apps and security strikes.
-
SimMNSA -
Spirent Federal Systems
The M-code signal is part of the security architecture that all new Military GPS User Equipment (MGUE) has been required to use since 2017. Until recently, testing with non-classified AES-encryption and replay of M-code Satellite Data Sets (SDS) have been the only methods authorized for GPS M-code receiver testing using a constellation simulator.
-
MAXREFDES143# -
Maxim Integrated
The MAXREFDES143# is an Internet of Things (IoT) embedded security reference design, built to protect an industrial sensing node by means of authentication and notification to a web server. The hardware includes a peripheral module representing a protected sensor node monitoring operating temperature and remaining life of a filter (simulated through ambient light sensing) and an mbed shield representing a controller node responsible for monitoring one or more sensor nodes. The design is hierarchical with each controller node communicating data from connected sensor nodes to a web server that maintains a centralized log and dispatches notifications as necessary. The mbed shield contains a Wi-Fi module, a DS2465 coprocessor with 1-Wire® master function, an LCD, LEDs, and pushbuttons. The protected sensor node contains a DS28E15 authenticator, a DS7505 temperature sensor, and a MAX44009 light sensor. The mbed shield communicates to a web server by the onboard Wi-Fi module and to the protected sensor node with I2C and 1-Wire. The MAXREFDES143# is equipped with a standard shield connector for immediate testing using an mbed board such as the MAX32600MBED#. The simplicity of this design enables rapid integration into any star-topology IoT network requiring the heightened security with low overhead provided by the SHA-256 symmetric-key algorithm.
-
Security -
ARM Ltd.
Security IP designed to protect against a variety of different vulnerabilities.
-
TRITON™ A310 PT (Security) -
Teledyne FLIR
Security professionals around the world have been using FLIR thermal cameras for perimeter and critical asset security for years. Facility Operations and Safety personnel have been using FLIR cameras to gather non-contact temperature measurements and condition monitoring data for decades. A310F and A310PT cameras are the first in the world to combine thermal and visible light video security imaging with automated safety monitoring based on the detection of temperature measurement thresholds.
-
Precise Testing Solution
Network Penetration Testing is a technique that identifies security vulnerabilities in the application by applying different malicious processes to break network security.
-
WPScan -
WPScan Team
WPScan is a free, for non-commercial use, black box WordPress vulnerability scanner written for security professionals and blog maintainers to test the security of their sites.
-
Fasoo, Inc.
Setting up a perfect data security policy is almost impossible. This is why exceptional policies are so often adopted to balance productivity against security in any sort of policy enforcement settings. There is only one way to address this issue which is by having a flexible security policy management framework, where security policies can be continuously assessed and optimized through feedback from a comprehensive data usage log analysis.
-
PTA -
P1 Security
PTA provides network discovery, security scanning and auditing for SS7/SIGTRAN, GPRS/GTP-C, LTE/Diameter and 5G protocol stacks. PTA enables Security and Telecom Engineers to discover the security level of their networks and assess the vulnerabilities of signaling Network Elements. It also provides CIOs, CTOs & VPs of Engineering, decision makers and top management, the ability to control the evolution of their Core Networks™ security using a dashboard of key indicators.
-
Zhejiang ULIRvisionTechnology Co., LTD
Thermal security camera system is widely used in areas where security and monitoring are required for timely detection of abnomal situations in order to prevent further damage. Below are two typical type of cameras for thermal surveillance and the importance of thermal imager for security in various application fields.
-
SAST -
Synopsys, Inc.
Coverity® is a fast, accurate, and highly scalable static analysis (SAST) solution that helps development and security teams address security and quality defects early in the software development life cycle (SDLC), track and manage risks across the application portfolio, and ensure compliance with security and coding standards.
-
all-sun
The metal detector series were used to be ensured security at exhibition place. The metal detector series were designated by Guard Department as security instrument at TIAN AN MEN district.
-
LGMS
LGMS Security Team will approach the Social Engineering assessment as an intelligence operation. During the course of assessment, LGMS Security Team will base on clear objectives to breach the security controls using information that has been obtained through deception including phishing emails, sending of malicious parcels (CD or thumb-drives), and social engineering phone calls.
-
TippingPoint -
Trend Micro Inc.
Powered by XGen™ security, TippingPoint® NGIPS delivers best-of-breed next-generation intrusion prevention that is easy to deploy and manage while maintaining a high level of performance and security accuracy.