IP Security
-
product
Chamber Controllers & Software
Designed off of our previous controller platform with familiar features in an improved interface, added functionality for ease and fewer steps to accomplish your daily testing needs. Remotely monitor and control your chambers and receive text/email alarms. From the home screen users can now manually control, run or stop a profile and view a snapshot of current activity like actual/setpoint values, alarm, datalogging, profile, security, IP address information and more.
-
product
RZ/G1 32-bit MPUs
The RZ/G1 high-performance 32-bit processors have 1GHz+ Arm® Cortex®-A cores, a 3D graphics engine, a full high-definition (HD) video engine, secure IP, high-speed interfaces such as PCIe, SATA and Gigabit Ethernet, and other functions necessary for embedded devices in the industrial segment.
-
product
Processor IP
Security
Security IP designed to protect against a variety of different vulnerabilities.
-
product
RA Family Of Arm-based MCUs
RA4
The RA4 Series bridges the needs for reasonable low power with the demand for connectivity and performance. These MCUs deliver up to 48MHz of CPU performance using an ArmⓇ CortexⓇ-M4 core with up to 256kB of embedded flash memory. The series offers a wide set of peripherals, including USB, CAN, ADC, capacitive touch, a segment LCD controller, and additional security IP integration, making it suitable for industrial equipment, home appliances, office equipment, healthcare products, and meters.
-
product
Embedded Security
Efficient, reliable, and intuitive: The world-leading end-to-end embedded security builder.
-
product
Security Testing
As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.
-
product
NETWORK SECURITY
Network Critical Solutions Limited
Network Critical gives all your security systems complete, uncompromising visibility into what’s happening on the network. Get better overall ROI by improving performance of existing security systems to keep pace with increasing network speed and complexity, while gaining the insight needed to better detect, contain and recover from breaches fast.
-
product
IP GAM
SFT 3316
Hangzhou Softel Optic Co., Ltd.
SFT 3316 IP Mux-Scrambling modulator is the latest generational Mux-scrambling-modulating all-in-one device developed by Softel. It has 1 6 multiplexing channels, 16 scrambling channels and 16 QAM (DVB-C) modulating channels, and supports maximum 1024 IP input through the GE port and 16 non-adjacent carriers (50MHz~960MHz) output through the RF output interface. The device is also characterized with high integrated level, high performance and low cost. This is very adaptable to newly generation CATV broadcasting system.
-
product
Industrial & Security
Kromek's custom configurations of Cadmium Zinc Telluride (CZT) based detector tiles and linear arrays can be implemented into custom Advanced Imaging platforms for various Industry and Security applications.
-
product
Secure Access
Schweitzer Engineering Laboratories, Inc.
Devices with secure access authenticate users, control privileges, and create audit trails.
-
product
Secure Wearable Solutions
From ST31 secure microcontrollers to ST54 solutions integrating NFC controller, secure element and eSIM, ST offers a complete range of solutions for payment, transit and multiple contactless services. ST's technology is ideal for applications that require a card emulation function but are environmentally challenged or have limited space for the antenna.
-
product
Cyber Security Training
Elbit Systems of America's comprehensive attack scenario library reflects the most recent threat landscape. Our cyber security experts continuously update training scenarios with newly discovered attacks and tactics. Versatile network settings and attack scenarios equip cyber security teams with customized training specific to each team's organization.
-
product
Communication Security
Shoghi Communications design and development specific Military Grade Crypto System , Shoghi provids end-to-end communication Security (COMSEC) and secure information transfer. Shoghi has strong experience in creating customer specific Algorithms and Key management schemes. All the hardware, inspite of all the complexities can be loaded by the customer themselves with their own algorithm, to enhance the whole security environment.We are known for our open source designs and crypto validated equipment supply to our military customers. In case of any specific design or development, please feel free to get in touch with our team
-
product
Quantum-Safe Security
CN8000 Series
The CN8000 harnesses the power of quantum mechanics to help ensure secure communications – the encryption keys are generated by IDQ’s Quantum Random Number Generator to guarantee inherent and provable randomness. The CN8000 can also be upgraded to be quantum-safe via the Cerberis QKD Blade (quantum cryptography) to ensure long-term protection of the data in transit.
-
product
Security Testing Consultancy
QA Mentor provides an End-to-End security testing services through the array of preventive measures, proven methodology and framework, use of best tools identified through POCs (proof of concepts) and an excellent infrastructure which is using evolving technologies. The backbone of all of these are the industry and project experience QA Mentor and its highly qualified & certified Security Testing Consultants. Our consultants closely work with our customers to assess their system, conduct POC to identify the relevant preventive measure and tools to be used and guide the IT teams of the businesses with a clearly defined roadmap to be followed to secure their systems.
-
product
Cyber Security & Intelligence
We are a leading supplier of cyber, intelligence, and security capabilities to government agencies, and a growing supplier of cyber and network security capabilities to commercial customers.
-
product
Network Security Appliances
With the development and popularization of cloud computing technologies, traditional network security providers are repositioning and moving their development efforts from network security solutions that can only handle single point security issues to a new generation of network security solution that are effective in big data and cloud computing environments. ICT equipment providers in the network security industry need network security servers that have massive DPI parsing power, full support for NFV and SDN, and a powerful big data processing engine. This equipment must also support dynamic capacity expansion and scalable IO extension in order to adapt to a more complicated cloud environment.
-
product
Complete IP Module
Scan Ring Linker SRL
The Scan Ring Linker SRLTM - is a complete IP module that can be easily embedded into a CPLD, FPGA or ASIC on a PCB to reduce the complexities and costs of designing 1149.1 (JTAG) test infrastructure for designs that use multiple scan rings. The SRL IP module links any number of scan rings (secondary scan paths) into a single high-speed test bus, which permits devices on secondary scan chains to be independently tested and configured through a single 1149.1 external interface.
-
product
Security Products
Security is no longer an option; it’s a requirement. As your trusted provider of platform security solutions, our comprehensive portfolio addresses a variety of threat models.
-
product
SQL Security & Compliance
Improve SQL Server audits, strengthen permissionssecurity & alert on data changes in your environment
-
product
Portable Security System
Sensor-1
The portable security system that fits in the palm of your hand. Sensor-1 detects real-time changes in motion and alerts you when your important items move. Operates independent of the mobile app. Communicates with smartphones, tablets, laptops and desktops.
-
product
Security Testing Service
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
product
Security Testing Service
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
product
Secure DNS
DNS attacks are still a regular occurrence for cybercriminals and many companies are targeted by such attacks not only once a year. With Secure DNS, you not only ensure secure access to your website, but also benefit from extra protection against such attacks.
-
product
I/P Electro-Pneumatic Signal Converters
TEIP11 / TEIP11-PS
Electro-pneumatic signal converters are the link between the control rooms and pneumatic actuators. I/P converters are available with and without booster stage.
-
product
Defense & Security
Protecting populations from nuclear risk. Our instruments precisely detect and monitor radiation in the most critical and challenging situations, empowering military and civil defense teams to keep populations safe.
-
product
Security Consulting
Our Managed Security Services can dramatically improve your ongoing security posture through more frequent, cost effective security assessments, helping you to identify, assess and manage risk.





























