Filter Results By:
Products
Applications
Manufacturers
-
product
Static Code Analysis Tool
Klockwork
Klocwork integrates seamlessly into desktop IDEs, build systems, continuous integration tools, and any team's natural workflow. Mirroring how code is developed at any stage, Klocwork prevents defects and finds vulnerabilities on-the-fly, as code is being written.
-
product
AI-Powered Thermal Traffic Sensor
TrafiSense AI
Designed to reliably detect and classify road users, TrafiSense AI is an intelligent thermal imaging sensor for traffic monitoring in complex urban environments. Featuring AI algorithms built on 25+ years of traffic detection and best-in-class thermal imaging, TrafiSense AI delivers continuous vision and data collection for safer, more efficient cities. Capable of tracking multiple objects in any lighting condition, the advanced edge-based AI technology effectively controls intersections, helps protect vulnerable road users, and gathers detailed traffic data for better city planning decisions.
-
product
WordPress Vulnerability Scanner
WPScan
WPScan is a free, for non-commercial use, black box WordPress vulnerability scanner written for security professionals and blog maintainers to test the security of their sites.
-
product
Application Security Testing Solution
CxIAST
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.
-
product
Ada Source Code Analyzer
CodePeer
CodePeer is an Ada source code analyzer that detects run-time and logic errors. It assesses potential bugs before program execution, serving as an automated peer reviewer, helping to find errors efficiently and early in the development life-cycle. It can also be used to perform impact analysis when introducing changes to the existing code, as well as helping vulnerability analysis. Using control-flow, data-flow, and other advanced static analysis techniques, CodePeer detects errors that would otherwise only be found through labor-intensive debugging.
-
product
Secure Automotive
With cars becoming more connected and therefore more vulnerable to attacks, security has become critical for automotive applications and is at the heart of many concerns. ST is committed to provide secure solutions to address the challenges of this new era of digital technologies.
-
product
Secure Hardened Android Phone
Shoghi has designed a totally Secure Hardened Android phone, which comes with a Specialized Operating system to prevent Hackers from remotely compromising your device , from all major vulnerabilities and exploits including protection from zero-days.
-
product
Network Security Testing
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
product
Veracode Static Analysis
SAST
*Find Flaws Accurately, at ScaleScan over 100 languages and frameworks quickly and accurately.*Prioritize and Fix Flaws FastRapidly find and fix vulnerabilities with real-time feedback and reduce flaws introduced in new code by up to 60% with IDE scans.*Deliver a Frictionless Developer ExperienceCode confidently with contextual learning and easy integration with over 40 developer tools and custom APIs.*Streamline Governance, Risk Management, and ComplianceManage and measure the security posture of your applications with enterprise-wide security policies, robust reporting, and comprehensive analytics.
-
product
Platform Compatibility Testing
Technology advancements and emerging platforms in web & mobile space have created a nightmare for software development teams. Issues arise primarily due to lack of experience and unavailability of test environments. This leaves you vulnerable to a poor user experience, resulting in lost sales and bad repute.
-
product
Penetration Testing Services
All web and mobile applications are vulnerable to attack. You are going to get hacked – it's not "if", it's "when." Before it happens, you want to make sure you have a mature security system in place. Our specialists in software security testing have a background in IT and software development, know different types of exploits, and have experience in performing thousands of pen tests. We get hired to hack into systems and determine weaknesses.
-
product
Security Testing Service
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
product
Security Testing
As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.
-
product
Website Penetration Testing
The vulnerabilities in a website need to be proactively fixed before the weaknesses are exploited by hackers, which in turn may lead to loss in customer’s confidence. We at Precise Testing Solution provide extensive planning to conduct website penetration. We check for holes in CRM, extranets, and internal network applications.
-
product
Penetration Testing
Reduce your risk of a breach by identifying and exploiting business-critical vulnerabilities with on-demand penetration testing expertise.
-
product
Penetration Testing
Our penetration testing services reveal real vulnerabilities that matter to your environment. Ultimately LGMS will provide advisory and guidance to help your business to become more secure.
-
product
Veracode ELearning
When it comes to software, developers are the only ones who can really fix the vulnerabilities in their code. But many lack the requisite skills to identify and remediate vulnerabilities. Existing training materials are often lengthy, irrelevant to the organization’s preferred coding languages, or just plain unengaging.
-
product
Node.js® platform
N|Solid™
N|Solid is a fully compatible Node.js runtime that has been enhanced to address the needs of the enterprise. Rapidly resolve performance problems. Protect customer data from vulnerable packages and unauthorized code. Drive performance and operational efficiency at scale.
-
product
P1 Vulnerability Knowledge Base
VKB
With more than 1800 identified & listed vulnerabilities P1 Security Vulnerability Knowledge Base (VKB) is a unique telecom-dedicated Vulnerability Database, with absolutely no other equivalent on the market. It is the result of years of expertise and vulnerability assessments successfully led by our engineers on the Core & Radio Networks & Network Elements of many of the biggest Telecom operators in the World.
-
product
Power Tester
PS-200
It is important to keep your graphic cards powered, but you want to make sure that your graphic cards aren’t overpowered. Not all power supply units have power surge protection, so your graphic cards may be vulnerable to damages from over voltage or over current. Protect your graphic cards now with the new PS-200.
-
product
The World's Most Advanced Integrated Thermal Traffic Detector
TrafiSense2
TrafiSense2 is an integrated thermal sensor and detector for vehicle, vulnerable road user, and wrong way driver detection. TrafiSense2 does not need light to operate, and instead uses the thermal energy emitted from road users. This enables the sensor to detect vehicles and vulnerable road users at night, over long distances, and in harsh weather conditions. With available 640x480 resolution, the TrafiSense2 offers 24/7 traffic detection for a wide range of applications.
-
product
Switching System Test Tools
EBIRST™
Switching systems are an important part of many test systems, however, the switching system is in a vulnerable place. When accidents happen that can cause a faulty device, you need a way to get the system up and running again with a minimum of effort and operator skills.
-
product
Telecom, Embedded Hardware-S/W Systems
Network Penetration Testing is a technique that identifies security vulnerabilities in the application by applying different malicious processes to break network security.
-
product
Static Analysis Tool
CodeSonar
Automated static analysis designed for zero-tolerance defect environments. CodeSonar, GrammaTech''s flagship static analysis software, identifies programming bugs that can result in system crashes, memory corruption, leaks, data races, and security vulnerabilities. By analyzing both source code and binaries, CodeSonar empowers developers to eliminate the most costly and hard-to-find defects early in the application development lifecycle.
-
product
Ocean Surface Monitor
Current Monitor™
sigma S6 Current Monitor™ is a radar-based monitoring system that delivers ocean surface current data from moving stations and both current and bathymetry from fixed locations with high spatial resolution. This greatly improves the management of marine-based activities such as predicting oil slick drift patterns, enhancing navigational safety, and protecting vulnerable coastlines.
-
product
Security Labs Community Edition
*Hack and Patch Real Applications- Get hands-on experience with top vulnerabilities and see the fix impact in a live app, in real-time.*Level-Up Your Coding Approach- Add secure coding to your list of skills by fixing issues that you face regularly, in the languages you’re most comfortable with. *Complete Labs in Minutes- With labs under 10 minutes, you can learn fast and gauge your progress in real-time for quick feedback.
-
product
Expert-Level Vulnerability Assessments
Vanguard Analyzer
Vanguard Integrity Professionals
Vanguard Analyzer™ provides Vanguard expertise on z/OS Security Server. Analyzer delivers expert-level vulnerability assessments of z/OS Security Server configuration controls and security settings with the ability to produce audit results in minutes. Vanguard Analyzer™ provides risk analysis and mitigation requirements in easy to read panels. System auditors can review Analyzer findings in order of priority and mitigate accordingly. Do you have access to expert-level assessment based on severity and vulnerabilities? Are your security analyst armed with invaluable interpretation of assessment findings? Can you provide your company with a detailed explanation, easy to understand risk statements and corrective actions that need to be followed step-by-step?
-
product
Cybersecurity Penetration Testing Assessments
Tripwire Professional Services
Organizations do all that they can to protect their critical cyber assets, but they don’t always systematically test their defenses. Penetration tests—otherwise known as pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems. Whether we are testing an application or network environment, Tripwire’s pen testing will not only identify vulnerabilities, but it will also demonstrate them through exploitation—definitively determining if unauthorized access or other malicious activity is possible.
-
product
Static Analyzer
Julia
Julia Static Analyzer is best in class for finding defects and security vulnerabilies in C#, Java and Android applications (for C and C++ languages, please have a look to GrammaTech CodeSonar). By using Julia Static Analyzer, you reduce development and maintenance costs and eliminate risks related to security vulnerabilities and privacy leaks. The powerful analysis technology ensures a maximum precision of results. With advanced dashboarding you can flexibly transform the data into useful information for the different stakeholders.
-
product
Application Penetration Testing:
Penetration testing (or pen testing) is a simulated security exercise in which ethical hackers attempts to exploit the vulnerabilities of an application system (web or mobile). The objective of this exercise is to identify any possible loopholes present in the system’s defence mechanism which the real hackers could take advantage of. QA Mentor practices the following stages while exercising this: