Showing results: 151 - 165 of 750 items found.
-
Veracode
The Veracode Continuous Software Security Platform contains all of the application security testing types you need in one place – static analysis, dynamic analysis, software composition analysis, and manual penetration testing – ensuring that you have a comprehensive view of your risk from design through deployment.
-
TR-TRACE -
Todd Research Limited
Lightweight, easy to use, real-time trace detection equipment solutions for mobile security screening operations.
-
-
ELK Products, Inc
Provides uncompromising security and life safety on site, plus secure connectivity with popular smart devices!
-
LGMS
Source code review, also known as Security Code Review is the process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places. Code review is a way of ensuring that the application has been developed to be “self-defending” in its given environment.
-
Teledyne DALSA
Powerful, versatile uncooled long-wave infrared solutions for industrial, security and defense applications offered by Teledyne DALSA.
-
LynuxWorks, Inc.
LynxElement® offers increased density, better security, speed, and small size as compared with different approaches.
-
XMC-528 -
Curtiss-Wright Defense Solutions
The XMC-528 is a high-performance, user-programmable processing and FPGA resource for embedded security applications or use as an FPGA co-processing engine.
-
AI Series -
SmartSens Technology Co.,Ltd
Focusing on high-end imaging series CMOS image sensors for new security applications based on customer needs
-
Advantech Co. Ltd.
Advantech's standalone media converter facilitates cabling with simple conversion and optional internal power security device.
-
Xena Safire -
NextGig Systems
Enterprise Firewall Performance Tester NextGen Enterprise firewalls provide network security by segmenting corporate LANs. Unfortunaltey advanced security functions (e.g. antivirus, app-control, IPS and SSL decryption) can have a performance penalty. Using these features can quickly impair network performance by as much as 90% negatively impacting users and business performance.
-
Project Wycheproof -
Google Inc.
A set of security tests for identifying cryptographic vulnerabilities. Project Wycheproof tests crypto libraries against known attacks.
-
Abaco Systems Inc
Designed specifically for battlefield and industrial applications, our range of switches features advanced firewalls, encryption, and hardware-assisted security.
-
Grupo CRIEM
Criem connectors - needle adapter, scratch terminal, faston post, security cover, retractible tip cover, etc.
-
M4ACS -
Rohde & Schwarz GmbH & Co. KG
R&S®M4ACS clearly separates red/secure from black/non-secure domains. Operators can simultaneously access two security domains with the same audio accessories and clear audio routing principles. The two security domains are separated by a TEMPEST Level A, Common Criteria BSI-certified R&S®Trusted Audio Switch. Each security domain has independent core equipment to access specific legacy and IP interfaces with distinct demarcation equipment. The versatile R&S®M4ACS can accommodate various installation scenarios including fixed, deployable and mobile systems.