Filter Results By:
Products
Applications
Manufacturers
-
product
Embedded Security Solution
With the coming Internet of Thing (IoT) era, more and more devices are connected together and it makes security become a significant issue. Now, the tailored security solutions can meet the specific design requirements for data and devices protection in embedded applications, and we will launch more security solution in the near future.
-
product
CCTV Security Testers
CCTV Security Tester is a kind of multi-function test tool for CCTV and security camera installation professionals. CCTV Camera Tester is developed aiming to CCTV security system installation and maintenance, combining the following function: Optical Fiber Communication test, low power circuit test, video test and PTZ control, and DC12 1A output for camera test, etc. Helps solving varies problem of security system. It could be also used in laboratory tests, equipment maintenance, etc. CCTV Tester is really an ideal multi-function instrument for CCTV Security System, Optical Fiberal Communication, CATV and other optical fiber networks.
-
product
Security Testing Services
By testing the flaws in software, our security testing services seek to remove vulnerabilities before the software is deployed or purchased. By focusing on the different layers of an information system across the database, infrastructure, network, and access channels such as mobile, security testing looks at making the applications free from vulnerabilities. We assist online service providers, website owners, and independent software vendors to manage application security risks. We offer a comprehensive range of white, grey, or black-box model security testing based on your stage in the development cycle.
-
product
Checkpoint Security System
ConneCT
The ConneCTTM Checkpoint Security System is an advanced aviation security explosive detection system (EDS) engineered to deliver superior threat detection, dramatically improved passenger throughput, and low total cost of ownership.
-
product
Cloud Security Testing
Using a cloud infrastructure is no more a new phenomenon in the digital world. Businesses use it as a basic practice now a days due to numerous benefits associated with it. Hence, it should be a top most priority for the businesses to secure their cloud infrastructure as that’s the nucleus of their business from all aspects. In cloud security testing, the cloud infrastructure is screened to identify security risks and the areas which can be exploited by the attackers. Cloud security testing is mainly performed to ensure that cloud infrastructure can protect the confidential information of an organization. QA Mentor adopts three different approaches during the cloud security testing process:
-
product
Mobile Application Security
ImmuniWeb®
ImmuniWeb® Mobile is a part of ImmuniWeb Application Security Testing Platform dedicated to comprehensive security testing of mobile applications. Based on proprietary machine-learning SAST and DAST mobile application testing technology, it also provides thorough testing of the mobile backend.
-
product
Thermal Security Camera
Elara™ FC-Series O
The Elara™ FC-Series O thermal security camera is one of FLIR’s premium thermal security cameras for perimeter protection. The Elara FC-Series O integrates with external video analytics devices, such as FLIR’s TRK or third party solutions, to classify human or vehicular intrusions. The Elara FC-Series O also offers a wide range of high-performance lenses, with a choice of resolutions, offering greater flexibility for tailoring security systems to specific site conditions.
-
product
E2E Security Connector
The E2E Security Connector is a cloud solution for enhancing the security level of your system. It provides secure generation and management of confidential data during the pre-personalization process of your connected devices as well as different protection schemes for its application and data transportation layer.
-
product
Hardware Security Testing
Day by day, security threads are increasing and now enemies are able to access all data through adding small components of hardware devices to personal devices like mobiles, laptops, and etc.Also, software can be patched, but hardware can never be easily updated; thus, security flaws are increasing dramatically day by day
-
product
Cyber Security Training
Elbit Systems of America's comprehensive attack scenario library reflects the most recent threat landscape. Our cyber security experts continuously update training scenarios with newly discovered attacks and tactics. Versatile network settings and attack scenarios equip cyber security teams with customized training specific to each team's organization.
-
product
Security Testing Service
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
product
Application Security Platform
Sentinel
WhiteHat Sentinel is a Software-as-a-Service (SaaS) platform that enables your business to quickly deploy a scalable application security program across the entire software development lifecycle (SDLC). Combining advanced scanning technology with the world’s largest application security research team, we accurately identify your vulnerabilities and scale to meet any demand without slowing you down.
-
product
Mobile and IoT Security
Test every mobile app on your employee's mobile devices against the same standards used for classified military and national security systems.
-
product
SST Security Assessment
Self-Service Terminal (SST) penetration testing is an activity which identifies vulnerabilities in SST that may potentially exist due to the lack of physical security measures, technical configuration or process controls.
-
product
Network Test and Security
Ensuring high performance of wired, Wi-Fi, and 3G/4G/LTE and 5G networks in both pre-deployment and real-world environments while enabling dynamic security intelligence to help stay one step ahead of attacks.
-
product
Security Testing Consultancy
QA Mentor provides an End-to-End security testing services through the array of preventive measures, proven methodology and framework, use of best tools identified through POCs (proof of concepts) and an excellent infrastructure which is using evolving technologies. The backbone of all of these are the industry and project experience QA Mentor and its highly qualified & certified Security Testing Consultants. Our consultants closely work with our customers to assess their system, conduct POC to identify the relevant preventive measure and tools to be used and guide the IT teams of the businesses with a clearly defined roadmap to be followed to secure their systems.
-
product
Portable Security System
Sensor-1
The portable security system that fits in the palm of your hand. Sensor-1 detects real-time changes in motion and alerts you when your important items move. Operates independent of the mobile app. Communicates with smartphones, tablets, laptops and desktops.
-
product
API Security Testing
In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:
-
product
Security Education Platform
Our unique Assess, Educate, Reinforce, Measure training methodology combines the four key components of successful security awareness and training programs. Customers who have used this cyclical approach have experienced up to a 90% reduction in successful external phishing attacks and malware infections.
-
product
Airspace Security Platform
DroneTracker
The airspace security platform that detects, classifies, and mitigates all drone threats. DroneTracker aggregates sensor information about potential threats, recognizing and classifying drones of all kinds. Its web-based interface shows live threats, real-time drone flight paths, and records forensic details including video evidence. The RF Sensor detects drones and remote controls by their radio frequency (RF) signatures.
-
product
Cloud Security Solutions
Online threats are constantly changing. Offering protection against the largest and most sophisticated attacks, Akamai helps you safeguard your websites and other Internet-facing applications from the risks of downtime and data theft. Built on the Akamai Intelligent Platform, Akamai Cloud Security Solutions provide the scale to stop the largest Distributed Denial-of-Service (DDoS) and web application attacks without reducing performance, as well as intelligence into the latest threats and the expertise to adapt to shifting tactics and attack vectors.
-
product
Network Security Scanner
Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool
-
product
Cyber Security Assessment
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
product
Email Security Solution
Email Trust Platform
Agari's Email Trust Platform, deployed by Fortune 1000 companies and government agencies, is the only solution that effectively stops phishing by identifying the true sender of emails. Agari's proprietary analytics engine and email telemetry network provides unparalleled visibility into more than 10 billion email messages per day across 3 billion mailboxes. This insight drives the company's Trust Analytics machine learning engine, which uniquely enables enterprises to stop phishing attacks against their employees and customers.
-
product
Mini-Dome Security Camera
Ariel Quad HD Mini-Dome
The Ariel Quad HD Dome is ready for diverse motion and lighting conditions found in critical infrastructure and commercial locations. The camera includes Shutter Wide Dynamic Range, IR Illumination and H.264/H.265 compression. The Ariel Quad HD Dome reduces the total cost of ownership through network and storage savings. When controlled using FLIR’s United VMS, the camera also utilizes unique adaptive streaming technology, enhancing the overall viewing experience.
-
product
Security intelligence & analytics
Detect and prioritize threats that pose the greatest risk. dentify high-risk threats with near real-time correlation and behavioral anomaly detection. Detect vulnerabilities, manage risks and identify high-priority incidents among billions of data points.Gain full visibility into network, application and user activity.
-
product
SQL Security & Compliance
Improve SQL Server audits, strengthen permissionssecurity & alert on data changes in your environment
-
product
HDCVI Security Cameras
1.3MP Family
This dome camera has reliable transmissions over coaxial cabling, Day/Night ICR, AWB, AGC and BLC.