Filter Results By:
Products
Applications
Manufacturers
-
product
Cyber Security/Network Security Training
Stratign’s Cyber Security/Network Security Training provides cybersecurity professionals with foundational, intermediate, and advanced security skills imparted through experts in the field.
-
product
GleanPackets
Identifying cyber security risks and solving network performance problems are becoming primary concerns for enterprises and small businesses. Many companies record network traffic and store the PCAP files for security forensics at a later time, but it is excruciatingly difficult to manage PCAP files and dig through mountains of information to find the relevant data. Searching through multiple large PCAP files and opening up each one with an analysis program is like looking for a needle in many haystacks. GleanPackets search is a powerful, affordable, and easy to use packet search engine that exports PCAP files to your favorite 3rd party web and mobile applications and network appliances via our REST API. Our user friendly interface will guide you through your searches, enabling you to find the the data you need quickly and painlessly. GleanPackets Search is available in several forms.
-
product
Cyber Security Assessment
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
product
6x 3U OpenVPX MOSA Mission Computer
SIU36-MCVARM-01
SIU36-MCVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Mission Computers (MC) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
Security Testing
As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.
-
product
Security Testing Services
Alphabin Technology Consulting
Fortify your digital defenses and enhance the resilience of your systems to safeguard against cyber threats.
-
product
RTOS
LynxOS
The embedded market is exploding with the dawn of the “Internet of Things”. The basic idea being that almost everything will ultimately be connected to the internet and these embedded devices are becoming more complex. This means they need to run more full functioned operating systems, with connectivity and popular human interfaces, require more processing power, including multi-core chips, and are likely to be exposed to the same types of cyber attacks that we are facing in our corporate and personal computers.Lynx Software Technologies addresses these needs with our high performance LynxOS operating systems and tools based on open standards. Our new powerful RTOS security features allow embedded developers to design their systems to be more secure before they are connected to the internet.
-
product
Cyber Security & Intelligence
We are a leading supplier of cyber, intelligence, and security capabilities to government agencies, and a growing supplier of cyber and network security capabilities to commercial customers.
-
product
4x 3U OpenVPX MOSA Actuator Interface Unit
SIU34-AIUVARM-01
SIU34-AIUVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Actuator Interface Units (AIU) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
Cyber Drill And Blue Team Exercise Stimulation
LGMS Security Team will approach the Cyber Drill as a simulation of the possible occurrences during a cyber incident. Based on the defined scenario, LGMS Security Team will perform a technical simulation so as to accurately capture the responses of client’s team in responding to such incidents.In order to obtain the best results, LGMS Security Team will only use information that can be obtained either through public information or by any means of deception techniques.
-
product
4x 3U OpenVPX MOSA Flight Control Computer
SIU34-FCCVARM-01
SIU34-FCCVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Flight Control Computer (FCC) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
Cyber Assurance
As the Internet of Things (IoT) continues to expand, connecting more and more of our world through communication devices, a growing trend has emerged: cyber security threats.
-
product
Cyber Security and Digital Data Protection
As security demands evolve, Applied Computer Technologies provides a layered and progressive approach to security. Organizations without a sufficient security footprint are being affected and held ransom, operations disrupted, and business reputations damaged. We've partnered with some amazing and innovative companies to offer our clients the best cyber security and protection available today. Our integrated security products include next generation firewalls; ransomware and crypto malware; secure connectivity; Email, encryption, archiving, and SPAM filtering; Web and content filtering; and data integrity & theft prevention.
-
product
4x 3U OpenVPX MOSA Data Concentrator Unit
SIU34-DCUVARM-01
SIU34-DCUVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Data Concentrator Unit (DCU) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
Cyber Forensics
Cyber Forensics deals in safeguarding the digital evidence gathered during the cyber attack, identifying the duration of the attack, and locating the geographical location of the attack followed by mapping them.
-
product
Satellite Clock
TCG 01-G
The TCG 01-G is a highly accurate, full featured GPS and GLONASS (GNSS) clock. With enhanced cyber security features that support NERC CIP requirements, the TCG 01-G is designed for use in modern day smart grid / smart substations, electricity distribution, transmission, generation protection and control systems. The clock synchronizes multiple IEDs (Intelligent Electronic Devices) within a network, including protection relays and remote telemetry units to enable accurate time stamping. The TCG 01-G supports IEEE 1588 v2 (PTP) and IEC 61850.
-
product
Cyber
General Dynamics Global Imaging Technologies
The Cyber Domain crosses and integrates with all domains - Land, Sea, Air and Space. We’re designing, building and delivering data protection products and solutions, and web-based SaaS to rapidly strengthen the mission and help our customers successfully navigate the cyber domain.
-
product
Cyber Protection System
Raytheon’s Cyber Protection System enables enterprises to go beyond traditional CSOC monitoring and establish a response center capable of situational awareness, proactive defense and rapid response. Cyber test ranges: Test the cyber resilience of hardware, software, and networks. Penetration/Malware/Forensics Fly Away Kits: Provide mobile environments to perform testing and analysis at remote facilities. Lab environments: Analyze malware, perform penetration testing and conduct forensics at enterprise scale so analysts can determine the best way to manage them.
-
product
Intrusion Detection and Prevention System
TACLANE
General Dynamics Mission Systems, Inc.
Adding Continuous Monitoring and Cyber Sensing Capability to your TACLANE Encryptor. Trusted Sensor Software is a first-of-its kind, National Security Agency (NSA) approved, option that adds IDS/IPS capabilities to the TACLANE-1G (KG-175G) encryptor. These additional cyber sensor features aid network administrators in establishing network situational awareness and provides greater Defense-
-
product
Distributed Control Systems
As the heart of plant-level digitalization, ABB's Distributed Control Systems (DCS) are designed to transform your multi-faceted, 24/7 process operations. Our market-leading control architecture constantly monitors and drives plant productivity, maximizing asset utilization, process efficiency and production quality. A focus on availability, safety and cyber security ensures the protection of your people, assets and equipment. And by maintaining tight controls over raw material consumption, plant energy levels and waste by-products, ABB DCS solutions help to significantly reduce environmental impact.
-
product
Software - Packet Capture, Metadata Generation, Real-Time Indexing up to Layer 7, IDS (Signature and Anomaly), Malware Analytics & More
NetDetectorLive™
Whatever the task, from forensic reconstruction of network activity to complete situational awareness of your network, NIKSUN NetDetectorLive™, with capture rates well into multi-Tbps, is the tool for the job. Simply plug it in and Know the Unknown®.NetDetectorLive™ is the only solution that integrates packet capture, metadata generation, real-time indexing up to Layer 7, IDS (signature and anomaly), malware analytics, and more. The NIKSUN NetDetector® Suite provides in-depth and real-time forensics that go beyond firewalls and IDS/IPS systems to identify, resolve, and prevent cyber-attacks. NIKSUN NetDetector® is the world's first packet-to-disk appliance for cyber defense.
-
product
The Cyberbit Skill Development Platform
Cyberbit is the only platform that delivers the entire cyber skilling spectrum, on-demand, in coherent learning paths, validating your team’s performance and progress along the way.
-
product
Satellite Clock
TCG 02-G
The TCG 02-G is a highly accurate, full featured GPS and GLONASS (GNSS) clock. Offering multiple oscillator options, Time Code and Frequency outputs, it fits virtually any timing application. With enhanced cyber security features that support NERC CIP requirements, the TCG 02-G is designed for use in modern day smart grid / smart substations, electricity distribution, transmission, and generation protection. In addition industrial application systems and traditional substations are equally provided for. This master clock synchronizes multiple IEDs (Intelligent Electronic Devices) within a network, including protection relays, synchrophasors, event recording and remote telemetry units to enable accurate time stamping. The TCG 02-G is available as a base unit or with one of three expansion module options.
-
product
Web Application Firewall
WAF
Your website security solution needs to keep up with the changing cyber threat. Protect your website with Cloudbric’s cloud WAF to block unknown and modified attacks.
-
product
FLy-Away Kits
Complete Solutions for Cyber Operations,Transportable Private Cloud, Edge Computing A Fly-Away Kit (FAK) or Expeditionary Kit is a self-contained suite of equipment (hardware and software) for DoD and federal civilian Cyber Protection Teams (CPTs) and forward operations to operate both in tactical (field-deployed) and back-office environments. The FAK suite of cyber tools or cloud/server applications include tools to conduct vulnerability analysis, incident response, and other cyber-analytic functions, and are suitable for operation on both classified and unclassified networks.
-
product
Cyber Security Testing Services
Cyber security testing is often also referred to as pen testing or penetration testing. Such tests validate the cyber security defences of your applications, network infrastructure and even your team members. Our cyber security testers are highly trained and certified ethical hackers.
-
product
Cybersecurity Penetration Testing Assessments
Tripwire Professional Services
Organizations do all that they can to protect their critical cyber assets, but they don’t always systematically test their defenses. Penetration tests—otherwise known as pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems. Whether we are testing an application or network environment, Tripwire’s pen testing will not only identify vulnerabilities, but it will also demonstrate them through exploitation—definitively determining if unauthorized access or other malicious activity is possible.
-
product
Mobile Network Monitoring
NetMobility®
The next generation of mobile network monitoring is here. With NIKSUN NetMobility® you gain unparalleled insights into subscriber behavior, carrier services, network health, cyber threats, and application performance to meet a wide range of service provider needs - Performance, Security, Operations, Management, and Planning.
-
product
Cloud Security
Cloud Security Assessment is the most critical phase before the product is finally deployed and Product is finally ready to handle real-world cyber security threats.