-
product
Autonomous PNT Performance and Vulnerability Test Suite
PANACEA
PANACEA is an autonomous GNSS performance and threat environment simulator system designed to control simulation hardware and collect data from up to 32 GNSS receivers simultaneously.
-
product
P1 Vulnerability Knowledge Base
VKB
With more than 1800 identified & listed vulnerabilities P1 Security Vulnerability Knowledge Base (VKB) is a unique telecom-dedicated Vulnerability Database, with absolutely no other equivalent on the market. It is the result of years of expertise and vulnerability assessments successfully led by our engineers on the Core & Radio Networks & Network Elements of many of the biggest Telecom operators in the World.
-
product
WordPress Vulnerability Scanner
WPScan
WPScan is a free, for non-commercial use, black box WordPress vulnerability scanner written for security professionals and blog maintainers to test the security of their sites.
-
product
P1 Vulnerability Knowledge Base
VKB
With more than 1800 identified & listed vulnerabilities P1 Security Vulnerability Knowledge Base (VKB) is a unique telecom-dedicated Vulnerability Database, with absolutely no other equivalent on the market. It is the result of years of expertise and vulnerability assessments successfully led by our engineers on the Core & Radio Networks & Network Elements of many of the biggest Telecom operators in the World.
-
product
Security Testing Service
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
product
Static Analyzer
Julia
Julia Static Analyzer is best in class for finding defects and security vulnerabilies in C#, Java and Android applications (for C and C++ languages, please have a look to GrammaTech CodeSonar). By using Julia Static Analyzer, you reduce development and maintenance costs and eliminate risks related to security vulnerabilities and privacy leaks. The powerful analysis technology ensures a maximum precision of results. With advanced dashboarding you can flexibly transform the data into useful information for the different stakeholders.
-
product
Application Security Platform
Sentinel
WhiteHat Sentinel is a Software-as-a-Service (SaaS) platform that enables your business to quickly deploy a scalable application security program across the entire software development lifecycle (SDLC). Combining advanced scanning technology with the world’s largest application security research team, we accurately identify your vulnerabilities and scale to meet any demand without slowing you down.
-
product
Solder Paste Inspection System
KY8030-3
The new KY8030-3 delivers 3x fasterinspection without compromisingperformance and accuracy.Using patented dual projection,the system eliminates the criticalShadow problem that all 3D SPI systemscan be vulnerable to.Additionally, the new KY8030-3 has solvedthe PCB Warp problem that seriouslyimpacts inspection accuracyand reliability of result.
-
product
Security Labs
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
product
Expert-Level Vulnerability Assessments
Vanguard Analyzer
Vanguard Integrity Professionals
Vanguard Analyzer™ provides Vanguard expertise on z/OS Security Server. Analyzer delivers expert-level vulnerability assessments of z/OS Security Server configuration controls and security settings with the ability to produce audit results in minutes. Vanguard Analyzer™ provides risk analysis and mitigation requirements in easy to read panels. System auditors can review Analyzer findings in order of priority and mitigate accordingly. Do you have access to expert-level assessment based on severity and vulnerabilities? Are your security analyst armed with invaluable interpretation of assessment findings? Can you provide your company with a detailed explanation, easy to understand risk statements and corrective actions that need to be followed step-by-step?
-
product
Static Code Analysis for Embedded Software
GrammaTech CodeSonar®
CodeSonar is GrammaTech´s flagship static analysis software. Able to analyze both source code and binary code, it is specifically designed for zero-tolerance defect environments. With its advanced static analysis engine, CodeSonar is one of the most effective tools for eliminating the most costly and hard-to-find software defects early in the application development lifecycle. Compared with other tools, CodeSonar identifies twice as many defects that result in system crashes, leaks, data races, memory corruptions and security vulnerabilities.
-
product
Processor IP
Security
Security IP designed to protect against a variety of different vulnerabilities.
-
product
Network Penetration Testing
Metasploit
Network penetration testing (aka pen testing) and timely identification of network vulnerabilities is something every organization needs done before hackers or disgruntled insiders exploit the weaknesses.
-
product
Dual Projection 3D In-Line Solder Inspection System
KY8030-2
The new KY8030-2 delivers 2x fasterinspection without compromising performanceand accuracy.Using patented dual projection, the systemeliminates the critical Shadow problem thatall 3D SPI systems can be vulnerable to.Easy UI and SPC Plus are included in the systempackage in order to help users achieve faster& easier printer process optimization
-
product
Application Penetration Testing:
Penetration testing (or pen testing) is a simulated security exercise in which ethical hackers attempts to exploit the vulnerabilities of an application system (web or mobile). The objective of this exercise is to identify any possible loopholes present in the system’s defence mechanism which the real hackers could take advantage of. QA Mentor practices the following stages while exercising this:
-
product
Network Security Testing
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
product
Pneumatic Zero Drop Tester
HIACC Engineering & Services Pvt. Ltd.
Designed as per ISTA packaging standard, the Pneumatic Zero Drop Test stand is used to assess the drop bearing capacity of the specimen during its transportation and handling process. The system is ideal for testing the specimen vulnerability around edges, surfaces and corners at different heights.
-
product
Open Source Analyzer
Prevent vulnerabilities such as OpenSSL Heartbleed, Bash ShellShock and many others from impacting your application's security posture. Checkmarx Open Source Analysis (OSA) allows organizations to manage, control and prevent the security risks and legal implications introduced by open source components used as part of the development effort.
-
product
P1 Telecom Auditor
PTA
PTA provides network discovery, security scanning and auditing for SS7/SIGTRAN, GPRS/GTP-C, LTE/Diameter and 5G protocol stacks. PTA enables Security and Telecom Engineers to discover the security level of their networks and assess the vulnerabilities of signaling Network Elements. It also provides CIOs, CTOs & VPs of Engineering, decision makers and top management, the ability to control the evolution of their Core Networks™ security using a dashboard of key indicators.
-
product
Ocean Surface Monitor
Current Monitor™
sigma S6 Current Monitor™ is a radar-based monitoring system that delivers ocean surface current data from moving stations and both current and bathymetry from fixed locations with high spatial resolution. This greatly improves the management of marine-based activities such as predicting oil slick drift patterns, enhancing navigational safety, and protecting vulnerable coastlines.
-
product
TCP Tests
The Maxwell Pro TCP Test Suite is used by design engineers, quality assurance engineers and testers to find and fix bugs in their TCP stack or engine. The tests help ensure that the TCP stack is sufficiently robust so that it is not vulnerable to the wide range of attacks in today's Internet. The tests make use of the Maxwell Pro network emulation environment, so that each test sequence can intelligently impair all aspects of the TCP protocol.
-
product
Open Source Advanced Web Security Testing Platform
IronWASP
IronWASP (Iron Web application Advanced Security testing Platform) is an open source system for web application vulnerability testing. It is designed to be customizable to the extent where users can create their own custom security scanners using it.
-
product
Penetration Testing Services
All web and mobile applications are vulnerable to attack. You are going to get hacked – it's not "if", it's "when." Before it happens, you want to make sure you have a mature security system in place. Our specialists in software security testing have a background in IT and software development, know different types of exploits, and have experience in performing thousands of pen tests. We get hired to hack into systems and determine weaknesses.
-
product
Veracode ELearning
When it comes to software, developers are the only ones who can really fix the vulnerabilities in their code. But many lack the requisite skills to identify and remediate vulnerabilities. Existing training materials are often lengthy, irrelevant to the organization’s preferred coding languages, or just plain unengaging.
-
product
SWIR Imagers
SWIR imagers (short wavelength infrared) are an important group of surveillance electro-optical imagers due several reasons. First, advances in InGaAs technology enabled design of relatively low cost SWIR imagers. Second, InGaAs imagers are very sensitive and can generate images of observed scenery even at dark nights. Third, SWIR imagers are less vulnerable to bad atmospheric conditions than TV/LLLTV cameras working in visible/near infrared band. Fourth, SWIR imagers can generate hi-res images even if they are built using much smaller optics than used for design of thermal imagers.
-
product
Telephone And Line Analyzer
TALAN™ 3.0
The TALAN 3.0 Telephone and Line Analyzer represents advanced capability to detect and locate illicit tampering and security vulnerabilities on digital, analog, and VoIP telephone systems. New hardware provides the ability to test twisted pairs against modern telecommunication threats including shield and ground.
-
product
Test SIP
VoIP, Video, and IPTV products must withstand and continue to function when facing all the conditions that occur on the Internet. These include attacks from hackers exploiting vulnerabilities in security and protocols as well as the common phenomenon of congestion, delay, jitter, drops, and so on. VoIP, Video, and IPTV products must demonstrate robustness and resiliency in the face of unusual and/or illegal conditions.
-
product
Static Code Analysis Tool
Klockwork
Klocwork integrates seamlessly into desktop IDEs, build systems, continuous integration tools, and any team's natural workflow. Mirroring how code is developed at any stage, Klocwork prevents defects and finds vulnerabilities on-the-fly, as code is being written.
-
product
Security Testing Services
By testing the flaws in software, our security testing services seek to remove vulnerabilities before the software is deployed or purchased. By focusing on the different layers of an information system across the database, infrastructure, network, and access channels such as mobile, security testing looks at making the applications free from vulnerabilities. We assist online service providers, website owners, and independent software vendors to manage application security risks. We offer a comprehensive range of white, grey, or black-box model security testing based on your stage in the development cycle.
-
product
Security Testing Service
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws




























