IP Security
-
Product
API Security Testing
-
Nowadays, APIs are frequently used for communication between two applications. In this communication, lots of sensitive data is transferred between devices and the server.In order to be protected in the event of a data loss or attack, we must secure our API.
-
Product
ARINC 615/615A Tablet PC Secure PDL Solution
PDL-615
-
Avionics Interface Technologies
The PDL-615 is a secure rugged, portable, tablet PC based ARINC 615 & ARINC 615A PDL solution.
-
Product
MIPI Soundwire Total IP Solutions
Soundwire
-
Soundwire is suited for small, cost-sensitive audio peripherals such as modern digital class-D amplifiers and digital microphones. The Total MIPI SoundWire IP Solution from Arasan enables early adopters the fastest path to adoption of this new standard by offering a comprehensive IP package that includes the Verilog RTL source code for Master and Slave, fully validated for compliance with the standard, a comprehensive test environment with a compliance suite for verification of the IP package, a SoundWire Hardware Development Kit (“HDK”) for FPGA prototyping, a SoundWire protocol analyzer and a complete SoundWire software stack.
-
Product
Security Testing Service
-
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
Product
Cloud Security Testing
-
Using a cloud infrastructure is no more a new phenomenon in the digital world. Businesses use it as a basic practice now a days due to numerous benefits associated with it. Hence, it should be a top most priority for the businesses to secure their cloud infrastructure as that’s the nucleus of their business from all aspects. In cloud security testing, the cloud infrastructure is screened to identify security risks and the areas which can be exploited by the attackers. Cloud security testing is mainly performed to ensure that cloud infrastructure can protect the confidential information of an organization. QA Mentor adopts three different approaches during the cloud security testing process:
-
Product
IP Fax/ Modem Testing
-
To successfully deploy fax services requires extensive network design, test and traffic engineering. Test equipment can prove valuable in this process, if it can: Generate and receive fax signals in bulk over wired and wireless networks, monitor and distinguish fax signals in real time for traffic engineering and network design purposes, and analyze fax signals after capture for troubleshooting failed or poorly handled calls.
-
Product
Quad QAM Modulator With IP Input
DTE-3114
-
DekTec's standalone power-over-ethernet enabled Quad QAM Modulator with IP Input, with advanced time-reconstruction algorithm to overcome IP jitter.
-
Product
IP Video Stream Analysis And Monitoring
TSM100
-
The Mividi TSM100 is an MEPG transport stream analyzer and IP video monitoring system for monitoring the quality of digital video services (QoS) delivered via IP or ASI interfaces. It can simultaneously monitor up to 300 services and perform deep MPEG analysis and video quality check 24 x 7. The system can be used for analyzing MPEG-2, H.264 and HEVC programs delivered over the Internet, as well as head-end equipment that uses IP for video transmission. The TSM100 provides IP layer analysis, MPEG transport layer analysis, key frame decoding, audio loudness measurement and service profiling. The system receives IP encapsulated digital audio and video data via 1 Gbits or 10Gbits Network adaptor. It will monitor all media flows in the network, perform extensive tests on standard compliance and user profile matching, and generate alarms when TS, video or audio errors occur.
-
Product
AlgoSec Platform - Secure Application Connectivity
AlgoSec
-
Use automation to speed up and tighten your security policies.
-
Product
Security and Traffic Monitoring System
-
Information System Technologies Inc.
ISTI’s versatile sensor nodes can support multiple sensing types including acoustic, seismic, visible/IR, and scanning laser. Several eye-safe scanning lasers form a distributed wireless sensor network and can continuously and accurately track as well as monitor ground vehicles and personnel in a surveillance area. This system provides super-fine angular and range resolution to precisely locate moving targets. Among other key benefits are: day/night operational capability, continuous monitoring and surveillance without blind spots, 360 degrees field-of-view, large coverage area, multiple closely spaced target tracking, threat classification, and automatic alarm generation. The system can be used in applications such as traffic monitoring, intrusion detection, border control, airport runway collision and incursion avoidance, and perimeter security.
-
Product
Vision Standard IP Cores
-
S2I’s Vision Standard IP Cores solutions are delivered as a working reference design along with FPGA IP cores. This minimizes development time and allows for top-notch performance at a small footprint, while leaving enough flexibility to customize the design. Sensor to Image cores are compact and leave enough space in the FPGA for your application.
-
Product
Wireless Day/Night IP Surveillance Camera
ENVIROMUX-IPCAM-WN
-
View and control the camera from the ENVIROMUX web interface, the camera web interface, included software, or with a compatible cell phone. With the ENVIROMUX-2D/5D/16D, a triggered snapshot can be forwarded in alert e-mails. A snapshot can be triggered by any programmed event (motion detection, door open/close, glass break, smoke, liquid detection, etc.). Image sensor: 1/4" progressive scan CMOS sensor. Video Streaming: simultaneous Motion JPEG and MPEG-4. Frame rate: 30fps at 640x480 (VGA) resolution. Lens: F2.0, 4.3 mm (0.17 in), 12 infrared LEDs for night vision. RJ45 connector. Wireless models: wireless IEEE 802.11 b/g up to 54 Mbps. Regulatory approvals: CE, FCC, RoHS.
-
Product
Industrial IP Camera
-
Leuze electronic GmbH + Co. KG
With industrial IP cameras, the visual monitoring of areas which are not accessible or difficult to access by plant operators is possible. Possible collisions are therefore avoided and troubleshooting simplified in case of failure. The robust cameras can also be used under harsh environmental conditions due to the industrial design.
-
Product
ARINC 615/615A Integrated Secure PDL & Transport Solution
PDL-615-XT
-
Avionics Interface Technologies
The PDL-615-XT is a rugged ARINC 615 & ARINC 615A Secure PDL solution integrated with a rugged, portable, storage and transport case.
-
Product
Handheld Digital Multimeter, 4 digit, with IP 67
U1241C
Digital Multimeter
The strong and solid U1240C Series handheld digital multimeters (DMMs)are the tools technicians or industrial test engineers use to perform their work confidently and efficiently. Designed for handheld users working in various environments, the U1240C series is certified to IP 67 and capable to withstand up to 3-meter (10 feet) drop to suit harsh working environments. The U1240C handheld DMMscan even work longer for you with up to 400 hours of battery life. With the built-in LED flashlight, the U1240Chandheld DMMsallow users to single-handedly illuminate test area.
-
Product
Transition Module for 3U cPCI IP Carrier
TCP010-TM
-
The TCP010-TM is a Transition Module to be used with 3U cPCI IP carrier, providing easy access to the IP I/O lines of cPCI IP carrier with back I/O.
-
Product
Cyber Security Assessment
-
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
Product
SST Security Assessment
-
Self-Service Terminal (SST) penetration testing is an activity which identifies vulnerabilities in SST that may potentially exist due to the lack of physical security measures, technical configuration or process controls.
-
Product
Multi-Protocol Wireless Application Networking System with Open, Integrated, Secure & Scalable System for Data Aggregation & Viewing
Ion
-
Jacobs’ vendor agnostic architecture was designed and implemented with the goal of an open Industrial Internet of Things (IoT) solution. ion© adapts and applies technology that enables our customers to gain efficiencies and savings, through connecting our client’s sites then collecting and displaying data in a unified interface. This provides custom insights to our clients, empowering them to ensure safety and respond quickly. The Jacobs ion© solution has been operationally deployed for over a decade and enables innovative approaches for data accuracy, data timeliness, and safety — greatly improving information flow and productivity.
-
Product
8K ip Camera Tester M-IPC-450C with TVI 5.0 Audio, Wrist Design
M-IPC-450C
-
Fuzhou Metricu Technology Co Ltd
8K wrist tester M-IPC-450C supports 8K ip camera, analog camera, 8MP TVI camera, 8MP CVI camera and 8MP AHD camera. (5 in one)It also supports DC12V 3A, 48V PoE 25.5W power output, UTP cable, RJ45 TDR cable, RS485, Audio in, TVI 5.0 audio, wrist design, etc.
-
Product
High-Performance Application and Security Load Module
PerfectStorm 10/1GE Load Module
-
Keysight Network Applications and Security
Equipped with powerful multi-core, multi-threaded network processors, PerfectStorm 10/1GbE is designed to satisfy the testing needs of manufacturers needing speed flexibility in their testing resources. Networking equipment manufacturers building new equipment or service providers and large enterprises integrating this them benefit from testing and verifying performance and functionality prior to deployment.
-
Product
Security Products
-
Security is no longer an option; it’s a requirement. As your trusted provider of platform security solutions, our comprehensive portfolio addresses a variety of threat models.
-
Product
Wireless IP Surveillance Camera
ENVIROMUX-IPCAM-W
-
View and control the camera from the ENVIROMUX web interface, the camera web interface, included software, or with a compatible cell phone. With the ENVIROMUX-2D/5D/16D, a triggered snapshot can be forwarded in alert e-mails. A snapshot can be triggered by any programmed event (motion detection, door open/close, glass break, smoke, liquid detection, etc.). Image sensor: 1/4" progressive scan CMOS sensor. Video Streaming: simultaneous Motion JPEG and MPEG-4. Frame rate: 30fps at 640x480 (VGA) resolution. Lens: F2.0, 4.0 mm (0.16 in). RJ45 connector. Wireless models: wireless IEEE 802.11 b/g up to 54 Mbps. Regulatory approvals: CE, FCC, RoHS.
-
Product
IP GAM
SFT 3316
-
Hangzhou Softel Optic Co., Ltd.
SFT 3316 IP Mux-Scrambling modulator is the latest generational Mux-scrambling-modulating all-in-one device developed by Softel. It has 1 6 multiplexing channels, 16 scrambling channels and 16 QAM (DVB-C) modulating channels, and supports maximum 1024 IP input through the GE port and 16 non-adjacent carriers (50MHz~960MHz) output through the RF output interface. The device is also characterized with high integrated level, high performance and low cost. This is very adaptable to newly generation CATV broadcasting system.
-
Product
IP VIDEO MASTER TEST METER
IPM-4
-
The IPM-4 digital video level master is used to measure the signal quality of your IP video network. This low cost meter makes 6 different level measurements give you the assurance that your IP video system is working within specifications. It measures the output levels of both the camera and the recorder end of the system in dBm so you can check the near-end and far-end signal levels simultaneously.
-
Product
1U Network Appliance For SD-WAN & AI Security Based On Intel® Xeon® 6 Series Processor.
Network Appliance
Single Intel® Xeon-D® 6 processors, up to 42 cores, 4 x DDR5 RDIMM memory, up to 512GB. 2 x M.2 2280 NVMe SSD, 1x FH/FL double deck or 2x FH/FL single deck (FWA-3052E) 2 x Advantech network module expansions w/ PCIe Gen5 (FWA-3052) 2 x 1GbE, 8 x 2.5GbE, 4 x 25G/10G SFP28.
-
Product
Secure NFC
-
Mobile security is expanding from the largely deployed SIM technology to the growing NFC, embedded Secure Element (eSE) and embedded SIM (eSIM) technologies in smartphones, tablets, wearables, and laptops. ST provides an exhaustive offer of NFC and eSE/eSIM products to address secure mobile transaction applications such as secure connectivity, payment wireless charging and automotive: from the state-of-the-art ST21NFC to the ST54 integrating the widely deployed ST33.
-
Product
Interface IP
-
Synopsys provides the industry’s broadest portfolio of complete, silicon-proven IP solutions, with leading power, performance, area, and security, for the most widely used interfaces such as PCI Express®, CXL, USB, Ethernet, DDR, HBM, Die-to-Die, CCIX, MIPI, HDMI, and Bluetooth.
-
Product
Open Source Service to Help Secure and Trust Your Software
Community Attestation Service / CAS
-
- CAS stores all signatures inside of immudb, the standard for open source immutable databases.- CAS is protected against tampering. All attestation data is integrity-checked and cryptographically verified by the CAS client.- CAS is also protected against MITM attacks. The public key below is checked by every communication.A Software Bill of Materials (SBOM) is a list of components in a piece of software.Like a list of ingredients on food packaging -- where you might consult a label to avoid foods that may cause an allergy -- SBOMs can help companies avoid use of software that may harm their organization.If defects are later found in a specific part, the SBOM makes it easy to locate affected products.





























