Showing results: 241 - 255 of 750 items found.
-
National Technical Systems
With more than a half-century of experience in the precision cleaning industry, NTS has become the preferred precision cleaning supplier. Many of our nation’s premier aerospace and defense contractors, National Security and Homeland Defense Programs rely on NTS.
-
Precise Testing Solution
Business Application testing encompasses verification and validation services to support Quality Assurance and Control of business applications. Application testing ensures that all aspects of the application like its functionality, integration, performance, security, and usability are working as expected.
-
LGMS
Web Application Penetration Testing – to identify, analyze, and report vulnerabilities in a given web application. LGMS adopts a robust technology and process-based approach supported by a well-documented methodology to identify potential security flaws in the web application and the underlying environment.
-
TTESwitch A664 Lab -
TTTech Computertechnik AG
The TTESwitch A664 Lab supports multi-environment development efforts for hard real-time operations in distributed systems. The Deterministic Ethernet switch enables the design of highly dependable systems with focus on high availability, reliability, integrity, security, maintainability and safety.
-
SBC328 3U -
Abaco Systems Inc
The enhanced support the VPXcel3 SBC328 single board computer provides enables customers to implement advanced security capabilities such as anti-tamper and information assurance. This support includes an inherently secure FPGA solution, and support for Intel’s Trusted Execution Technology.
-
CommView -
TamoSoft
CommView is a powerful network monitor and analyzer designed for LAN administrators, security professionals, network programmers, home users…virtually anyone who wants a full picture of the traffic flowing through a PC or LAN segment. Includes a VoIP analyzer.
-
Axiomtek Co., Ltd.
Low power, fanless, noiseless, reasonable performance, and slim form factor designs are characters of Axiomtek compact network hardware platforms appliances. The network appliances can be used in small and home offices as network security devices, or other embedded applications.
-
Application and Threat Intelligence (Subscription) -
Keysight Network Applications and Security
Test and simulation conditions must reflect the latest security threats and applications so that you can ensure your equipment and systems will perform reliably and protect networks from the most advanced and malicious traffic. With Ixia's BreakingPoint Application and Threat Intelligence (ATI) program, we do the research for you by identifying and generating security attacks and application protocols that keep you current.
-
Spectrophotometer Workstation Series -
Shimadzu Corp.
Shimadzu's spectroscopy workstation series complies with ER/ES regulations (such as FDA 21 CFR Part11), enabling safe, reliable management of data.-As a part of the LabSolutions family of control software, advanced security and user administration features are provided.-Complies with ER/ES regulations including FDA 21 CFR Part 11 and PIC/S GMP.-Centralized management of spectroscopy data (UV, FTIR, RF and EDX), as well as LC and GC data, on a networked server allows simple control over security and backups.-Terminal Services can be used to control the Spectrophotometer application from a remote location, even when the application is not installed on the client PC.
-
DAST -
Veracode
Identify and Fix Critical Runtime Vulnerabilities in Web Applications and APIs.* Identify Vulnerabilities in Runtime Environments. Simultaneously scan hundreds of web apps and APIs to find vulnerabilities quickly - including pre-production and staging environments behind a firewall.*Prioritize and Fix Flaws Quickly, A <5% false positive rate allows teams to focus on the vulnerabilities that matter. Detailed, actionable remediation guidance means flaws are fixed faster.*Contribute to a Successful DevSecOps ProgramDynamic scans can be viewed in the Veracode Platform alongside other application security tests, providing multi-faceted insights into the entire security program. Insights and analytics can be used to further improve your DevSecOps program.
-
Xtreme M-7 -
Xtreme Research Corp.
The M-7 handheld metal detector is a perfect partner for use with the XT-8000 portable walk through system or as a stand alone personal search and detection device. Xtreme Research Corporation offers the following product for school security, airport security, etc. Only $239.95 each The M-7 is simple to operate and is essential for searching backpacks, handbags, luggage and lockers. No specialized training or experience is required to operate the M-7 detector.The M-7 is a compact wand type metal detector that can be worn on the belt and weighs just 12 ounces. An optional ballistic nylon belt holster is available along with an earplug which allows silent operation of the M-7.
-
DRIVETORK ST -
Com-Ten Industries
Besides having all the functions of the Drivetork Easy, the Star version can also carry out the rupture test when the cap has a security ring. It measures both the break (first peak) and the opening torque (max torque), and it displays the test curve.
-
Curtiss-Wright Defense Solutions
The National Security Agency (NSA) Commercial Solutions for Classified (CSfC) program enables organizations to transmit classified information using commercial-grade encryption solutions (when appropriately tested, certified, and configured), eliminating the need for expensive, difficult-to-use classified equipment.
-
Lu375 -
Teledyne Lumenera
Lumenera’s Lu375 series of enclosed multi-megapixel cameras is designed for use in a wide variety of industrial and security applications requiring high resolution and modest cost. With 2048 x 1536 resolution and on-board processing these cameras deliver outstanding image quality and value.
-
Security Intelligence Technologies, Inc.
In order to help control voice privacy, we offer Defeat Systems. Confidential personal and business information can only stay confidential if no one else has access to them. Defeat systems fight electronic eavesdropping equipment that can compromise conversation security.