Cyber Security
See Also: Cyber, Phishing, Pen Testing, DDoS
-
Product
Cyber Security Testing Services
-
Cyber security testing is often also referred to as pen testing or penetration testing. Such tests validate the cyber security defences of your applications, network infrastructure and even your team members. Our cyber security testers are highly trained and certified ethical hackers.
-
Product
Cyber Security Assessment
-
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
Product
Cyber Security and Digital Data Protection
-
As security demands evolve, Applied Computer Technologies provides a layered and progressive approach to security. Organizations without a sufficient security footprint are being affected and held ransom, operations disrupted, and business reputations damaged. We've partnered with some amazing and innovative companies to offer our clients the best cyber security and protection available today. Our integrated security products include next generation firewalls; ransomware and crypto malware; secure connectivity; Email, encryption, archiving, and SPAM filtering; Web and content filtering; and data integrity & theft prevention.
-
Product
Cyber Security/Network Security Training
-
Stratign’s Cyber Security/Network Security Training provides cybersecurity professionals with foundational, intermediate, and advanced security skills imparted through experts in the field.
-
Product
Cybersecurity and Compliance Solution
Application Audit
-
Application Audit, Compuware's mainframe cybersecurity and compliance solution, enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Using Application Audit, security staff can: Deter insider threats by capturing and analyzing start-to-finish user session activity. Integrate user behavior intelligence with popular SIEM engines to analyze the overall application environment. Support criminal/legal investigations with complete and credible forensics. Fulfill compliance mandates regarding protection of sensitive data. The Value of Application Audit. Provides deep insight into user behavior including data viewed, by whom and which applications were used to access it. Enables immediate analysis through the automatic delivery of data to SIEM platforms such as Splunk and QRadar, either directly or in combination with CorreLog zDefenderTM for z/OS or Syncsort Ironstream. Delivers granular intelligence and reporting capabilities needed to comply with regulations such as HIPAA and GDPR as well as security policies. Eliminates dependency on specialized mainframe knowledge. Separates the system administrator's duties from mainframe-inexperienced auditor's responsibilities with a web UI, so that no single person is in a position to engage in malicious activities without detection.
-
Product
DDoS Detection and Mitigation
-
Increasingly, business is done online. This increases the risk of exposure to costly service interruptions caused by cyberattacks. Distributed Denial of Service (DDoS) attacks have emerged as one of the most common and impactful attack vectors aimed at business networks. Today, DDoS attacks account for 40% of all cybersecurity incidents, with some organisations facing multiple attacks per day. With the average throughput of volumetric attacks rising by over 3X in the last decade, DDoS prevention has become essential for any organisation that relies on its network infrastructure to do business.
-
Product
PacStar IQ-Core Software
-
Curtiss-Wright Defense Solutions
Our PacStar IQ-Core® Software provides an intuitive user interface that makes communications setup and operation quick and easy to learn. It reduces configuration errors by assisting organizations in maintaining uptime, performance, and compliance with cybersecurity requirements, and simplifies troubleshooting with tools for both entry-level and advanced network administrators.
-
Product
Cybersecurity Penetration Testing Assessments
Tripwire Professional Services
-
Organizations do all that they can to protect their critical cyber assets, but they don’t always systematically test their defenses. Penetration tests—otherwise known as pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems. Whether we are testing an application or network environment, Tripwire’s pen testing will not only identify vulnerabilities, but it will also demonstrate them through exploitation—definitively determining if unauthorized access or other malicious activity is possible.
-
Product
Security Gateways
-
Schweitzer Engineering Laboratories, Inc.
Security gateways combine cybersecurity capabilities to create secure access paths through security perimeters.
-
Product
Industrial Grade Cyber Security Appliance Based On Intel® Atom™ X5-E3940/ X5-E3930 Processor For Network Security Applications.
FWA-1211
-
Intel® Atom™ x5-E3940 with x5-E3930 Processor, IP40, Fanless design, -40~70℃ wide temperature. 4 x 1GbE RJ-45 with 2 segments of LAN bypass, 2 x 1GbE SFP ports (optional) Dual power input: 9~36 V.
-
Product
4x 3U OpenVPX MOSA Data Concentrator Unit
SIU34-DCUVARM-01
Data Concentrator Unit
SIU34-DCUVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Data Concentrator Unit (DCU) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
Product
6x 3U OpenVPX MOSA Mission Computer
SIU36-MCVARM-01
Mission Computer
SIU36-MCVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Mission Computers (MC) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
Product
Safety Analysis
-
Ensure System Safety and Cybersecurity. Dramatically decrease analysis efforts with efficient application of quality, safety, reliability and cybersecurity analysis methods at the system, item, software, hardware and PCB levels.
-
Product
Advanced Natural Gas Leak Detection Platform
ABB Ability Series
-
Altogether, the complete ABB Gas Leak Detection Platform makes it possible to find leaks throughout the entire natural gas infrastructure – upstream, midstream, downstream, and from utilities – with far higher reliability and speed than ever before by combining leading-edge, cybersecure measurement technology, with advanced data analytics.
-
Product
4x 3U OpenVPX MOSA Actuator Interface Unit
SIU34-AIUVARM-01
Actuator Interface Unit
SIU34-AIUVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Actuator Interface Units (AIU) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
Product
6x 3U OpenVPX MOSA Data Concentrator Unit
SIU36-DCUVARM-01
Data Concentrator Unit
SIU36-DCUVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Data Concentrator Unit (DCU) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
Product
Password Management
-
Schweitzer Engineering Laboratories, Inc.
Password management is a critical cybersecurity element that includes enforcing strong passwords on IEDs and changing passwords on a schedule.
-
Product
InfiniStreamNG Platform
-
NETSCOUT’s new InfiniStreamNG™ platform harnesses the power of IP intelligence by mining traffic in real-time to deliver accurate and actionable data for service assurance, cybersecurity and business intelligence applications. The InfiniStreamNG platform fully supports the nGeniusONE® and Iris application suites.
-
Product
Cyber Security Training
-
Elbit Systems of America's comprehensive attack scenario library reflects the most recent threat landscape. Our cyber security experts continuously update training scenarios with newly discovered attacks and tactics. Versatile network settings and attack scenarios equip cyber security teams with customized training specific to each team's organization.
-
Product
Cyber Assurance
-
As the Internet of Things (IoT) continues to expand, connecting more and more of our world through communication devices, a growing trend has emerged: cyber security threats.
-
Product
Cybersecurity
-
Schweitzer Engineering Laboratories, Inc.
Networks are protected with multiple layers of cybersecurity, including securing access and permissions, detecting malware, encrypting data, and logging events.
-
Product
Network Security
-
PLANET Network Security solution is designed to build a strong and secure network for any commercial and industrial environments. By providing functions like cybersecurity, SPI firewall, VPN, IDP, antispam and antivirus, this collection includes VPN Security Gateway, 5G NR Gateway, Flat-type Smart Router, UTM Content Security Gateway and Wireless VPN Routers. A variety of product lines can satisfy all the demands of enterprises, SMBs, factories, communities and more for the network security including remote management and surveillance of IoT, IIoT and building automation applications.
-
Product
Cloud Security
-
Cloud Security Assessment is the most critical phase before the product is finally deployed and Product is finally ready to handle real-world cyber security threats.
-
Product
Industrial Ethernet
-
PLANET Industrial Ethernet equipment is compliant with various industrial protocols and ITS certifications such as MQTT, Modbus, SCADA, EtherCAT EN50155 and E-Mark to meet all the transmission needs, be it Information, Control or Device. PLANET features ERPS Ring, IEEE 1588 PTP, Layer 3 routing, 10G transmissions, cybersecurity and more to ensure high performance and security of our comprehensive Industrial Ethernet collection.
-
Product
4x 3U OpenVPX MOSA Flight Control Computer
SIU34-FCCVARM-01
Flight Control Computer
SIU34-FCCVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Flight Control Computer (FCC) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
Product
Bus Analyzer Software
AltaView
Analyzer
Alta’s Windows avionics analyzer product, AltaView, provides the most modern technologies for MIL-STD-1553 and ARINC-429 network activity and data analysis. Win XP/Server/7/8/10 Compatible and VMware with ENET/NLINE Ethernet. Ideal for Cybersecurity Testing.
-
Product
4x 3U OpenVPX MOSA Mission Computer
SIU34-MCVARM-01
Mission Computer
SIU34-MCVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Mission Computers (MC) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
Product
Cyber Labs
-
Building your cybersecurity team’s skills starts with foundational building blocks: theory, tools, attacker tactics, soft skills and more. Each of our cyber labs delivers a specific building block to build individual skills in shorter training sessions.





























