Filter Results By:
Products
Applications
Manufacturers
-
product
InfiniStreamNG Platform
NETSCOUT’s new InfiniStreamNG™ platform harnesses the power of IP intelligence by mining traffic in real-time to deliver accurate and actionable data for service assurance, cybersecurity and business intelligence applications. The InfiniStreamNG platform fully supports the nGeniusONE® and Iris application suites.
-
product
Network Security
PLANET Network Security solution is designed to build a strong and secure network for any commercial and industrial environments. By providing functions like cybersecurity, SPI firewall, VPN, IDP, antispam and antivirus, this collection includes VPN Security Gateway, 5G NR Gateway, Flat-type Smart Router, UTM Content Security Gateway and Wireless VPN Routers. A variety of product lines can satisfy all the demands of enterprises, SMBs, factories, communities and more for the network security including remote management and surveillance of IoT, IIoT and building automation applications.
-
product
Cybersecurity and Compliance Solution
Application Audit
Application Audit, Compuware's mainframe cybersecurity and compliance solution, enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Using Application Audit, security staff can: Deter insider threats by capturing and analyzing start-to-finish user session activity. Integrate user behavior intelligence with popular SIEM engines to analyze the overall application environment. Support criminal/legal investigations with complete and credible forensics. Fulfill compliance mandates regarding protection of sensitive data. The Value of Application Audit. Provides deep insight into user behavior including data viewed, by whom and which applications were used to access it. Enables immediate analysis through the automatic delivery of data to SIEM platforms such as Splunk and QRadar, either directly or in combination with CorreLog zDefenderTM for z/OS or Syncsort Ironstream. Delivers granular intelligence and reporting capabilities needed to comply with regulations such as HIPAA and GDPR as well as security policies. Eliminates dependency on specialized mainframe knowledge. Separates the system administrator's duties from mainframe-inexperienced auditor's responsibilities with a web UI, so that no single person is in a position to engage in malicious activities without detection.
-
product
Layered Cybersecurity
Schweitzer Engineering Laboratories, Inc.
Networks are protected with multiple layers of cybersecurity, including securing access and permissions, detecting malware, encrypting data, and logging events.
-
product
5MP HD and 4K UHD Cameras
FLIR Quasar™ Premium Mini-Dome
The FLIR Quasar premium mini-dome camera was designed to provide situational awareness in the most demanding environments, where evidential and forensic video is required. It is offered in a 5MP HD and 4k UHD variant, delivering superior image quality and IR-Illumination for exceptional performance using low bandwidth. Ideal for critical infrastructure sites, remote facilities, or any large requiring close monitoring, the Quasar premium mini-dome is a discreet surveillance option that is NDAA-compliant and utilizes high-end cybersecurity safeguards. Ease of installation, FLIR accessory/mounting ecosystem, and the ability to operate more cameras on the same server all contribute to a lower total cost of ownership. It offers seamless integration with a wide range of video management systems, including United VMS, which brings indoor and outdoor surveillance and perimeter intrusion detection cameras together as part of an end-to-end security solution.
-
product
RTOS
LynxOS
The embedded market is exploding with the dawn of the “Internet of Things”. The basic idea being that almost everything will ultimately be connected to the internet and these embedded devices are becoming more complex. This means they need to run more full functioned operating systems, with connectivity and popular human interfaces, require more processing power, including multi-core chips, and are likely to be exposed to the same types of cyber attacks that we are facing in our corporate and personal computers.Lynx Software Technologies addresses these needs with our high performance LynxOS operating systems and tools based on open standards. Our new powerful RTOS security features allow embedded developers to design their systems to be more secure before they are connected to the internet.
-
product
Cybersecurity
Schweitzer Engineering Laboratories, Inc.
Networks are protected with multiple layers of cybersecurity, including securing access and permissions, detecting malware, encrypting data, and logging events.
-
product
Security Gateways
Schweitzer Engineering Laboratories, Inc.
Security gateways combine cybersecurity capabilities to create secure access paths through security perimeters.
-
product
Distributed Control Systems
As the heart of plant-level digitalization, ABB's Distributed Control Systems (DCS) are designed to transform your multi-faceted, 24/7 process operations. Our market-leading control architecture constantly monitors and drives plant productivity, maximizing asset utilization, process efficiency and production quality. A focus on availability, safety and cyber security ensures the protection of your people, assets and equipment. And by maintaining tight controls over raw material consumption, plant energy levels and waste by-products, ABB DCS solutions help to significantly reduce environmental impact.
-
product
6x 3U OpenVPX MOSA Data Concentrator Unit
SIU36-DCUVARM-01
SIU36-DCUVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Data Concentrator Unit (DCU) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
IoT Devices Penetration Testing
There is a rising concern that IoT devices are being developed rapidly without appropriate consideration of the profound security challenges involved, as demonstrated by the various IoT devices hacked in recent years— automobiles, cameras, children's toys, thermostats, and medical devices.With more than a decade of specialized cyber security testing experience combined with our extensive research and development, we can assess and identify both common and complex security vulnerabilities that may be residing within your whole IoT ecosystem.
-
product
Application Penetration Testing
Data breaches that compromise client confidentiality and intellectual property are top cybersecurity concerns. Organizations spend somewhere between 45 and 50 billion dollars every year on cybersecurity, but a very small percentage is focused on applications despite that fact that more than 80%
-
product
4x 3U OpenVPX MOSA Flight Control Computer
SIU34-FCCVARM-01
SIU34-FCCVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Flight Control Computer (FCC) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
Mobile Network Monitoring
NetMobility®
The next generation of mobile network monitoring is here. With NIKSUN NetMobility® you gain unparalleled insights into subscriber behavior, carrier services, network health, cyber threats, and application performance to meet a wide range of service provider needs - Performance, Security, Operations, Management, and Planning.
-
product
Cyber Security Testing Services
Cyber security testing is often also referred to as pen testing or penetration testing. Such tests validate the cyber security defences of your applications, network infrastructure and even your team members. Our cyber security testers are highly trained and certified ethical hackers.
-
product
DDoS Detection and Mitigation
Increasingly, business is done online. This increases the risk of exposure to costly service interruptions caused by cyberattacks. Distributed Denial of Service (DDoS) attacks have emerged as one of the most common and impactful attack vectors aimed at business networks. Today, DDoS attacks account for 40% of all cybersecurity incidents, with some organisations facing multiple attacks per day. With the average throughput of volumetric attacks rising by over 3X in the last decade, DDoS prevention has become essential for any organisation that relies on its network infrastructure to do business.
-
product
4x 3U OpenVPX MOSA Data Concentrator Unit
SIU34-DCUVARM-01
SIU34-DCUVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Data Concentrator Unit (DCU) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
Cyber Security Training
Elbit Systems of America's comprehensive attack scenario library reflects the most recent threat landscape. Our cyber security experts continuously update training scenarios with newly discovered attacks and tactics. Versatile network settings and attack scenarios equip cyber security teams with customized training specific to each team's organization.
-
product
Cyber Drill And Blue Team Exercise Stimulation
LGMS Security Team will approach the Cyber Drill as a simulation of the possible occurrences during a cyber incident. Based on the defined scenario, LGMS Security Team will perform a technical simulation so as to accurately capture the responses of client’s team in responding to such incidents.In order to obtain the best results, LGMS Security Team will only use information that can be obtained either through public information or by any means of deception techniques.
-
product
Engineering Data Analytics
ESI’s Data Analytics solution platform INENDI is a specialized set of solutions that combines state of the art Engineering Data Analytics and management approaches, intuitive visualization and efficient investigation methodologies to allow for a fast discovery of the unknown in large high-dimensional datasets.With INENDI, ESI brings its long-standing innovative capability and its expertise in designing solutions tailored for professionals who need to solve difficult high-value problems into the Cyber Security market.
-
product
Web Application Firewall
WAF
Your website security solution needs to keep up with the changing cyber threat. Protect your website with Cloudbric’s cloud WAF to block unknown and modified attacks.
-
product
Security Testing
As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.
-
product
Intrusion Detection and Prevention System
TACLANE
General Dynamics Mission Systems, Inc.
Adding Continuous Monitoring and Cyber Sensing Capability to your TACLANE Encryptor. Trusted Sensor Software is a first-of-its kind, National Security Agency (NSA) approved, option that adds IDS/IPS capabilities to the TACLANE-1G (KG-175G) encryptor. These additional cyber sensor features aid network administrators in establishing network situational awareness and provides greater Defense-
-
product
Cyber Security and Digital Data Protection
As security demands evolve, Applied Computer Technologies provides a layered and progressive approach to security. Organizations without a sufficient security footprint are being affected and held ransom, operations disrupted, and business reputations damaged. We've partnered with some amazing and innovative companies to offer our clients the best cyber security and protection available today. Our integrated security products include next generation firewalls; ransomware and crypto malware; secure connectivity; Email, encryption, archiving, and SPAM filtering; Web and content filtering; and data integrity & theft prevention.
-
product
Cloud Security
Cloud Security Assessment is the most critical phase before the product is finally deployed and Product is finally ready to handle real-world cyber security threats.
-
product
Cyber Assurance
As the Internet of Things (IoT) continues to expand, connecting more and more of our world through communication devices, a growing trend has emerged: cyber security threats.
-
product
Red Team Engagement
Red Team Assessment (Red Teaming) is an activity where a group of white hat hackers (or penetration tester) perform a series of activities to assess the company’s security readiness towards real-world cyber threats. Red teaming aims to ‘attack’ an organization’s digital and physical infrastructure to evaluate the organization’s security defense and posture, at the same time targeting to obtain any sensitive and beneficial information. Red Teaming usually emulates several malicious actors to penetrate the organization’s digital and physical infrastructure security.
-
product
GleanPackets
Identifying cyber security risks and solving network performance problems are becoming primary concerns for enterprises and small businesses. Many companies record network traffic and store the PCAP files for security forensics at a later time, but it is excruciatingly difficult to manage PCAP files and dig through mountains of information to find the relevant data. Searching through multiple large PCAP files and opening up each one with an analysis program is like looking for a needle in many haystacks. GleanPackets search is a powerful, affordable, and easy to use packet search engine that exports PCAP files to your favorite 3rd party web and mobile applications and network appliances via our REST API. Our user friendly interface will guide you through your searches, enabling you to find the the data you need quickly and painlessly. GleanPackets Search is available in several forms.
-
product
Cyber Security & Intelligence
We are a leading supplier of cyber, intelligence, and security capabilities to government agencies, and a growing supplier of cyber and network security capabilities to commercial customers.