Filter Results By:
Products
Applications
Manufacturers
-
product
Quantum-Safe Security
CN6000 Series
The Centauris CN6000 encryptors may be upgraded to quantum cryptography through the addition of the Cerberis Quantum Key Distribution (QKD) server to ensure that the solutions are quantum-safe for the long-term protection of sensitive data. This also ensures investment-protection of the encryptors. Such quantum cryptography is provably secure, ensures anti-eavesdropping detection and provides long-term forward secrecy against brute force hacking and attacks by quantum computers.
-
product
JTAGulator 24-Channel Hardware Hacking Tool
32115
On-chip debug (OCD) interfaces can provide chip-level control of a target device and are a primary vector used by engineers, researchers, and hackers to extract program code or data, modify memory contents, or affect device operation on-the-fly. JTAGulator is an open source hardware tool that assists in identifying OCD connections from test points, vias, or component pads on a target device.
-
product
IoT Devices Penetration Testing
There is a rising concern that IoT devices are being developed rapidly without appropriate consideration of the profound security challenges involved, as demonstrated by the various IoT devices hacked in recent years— automobiles, cameras, children's toys, thermostats, and medical devices.With more than a decade of specialized cyber security testing experience combined with our extensive research and development, we can assess and identify both common and complex security vulnerabilities that may be residing within your whole IoT ecosystem.
-
product
Trusted Connectivity
The common sentiment, “who cares about my personal data, why someone should spy on me, hack my smartphone, there is nothing to hide , I am just an individual”, still is largely widespread and demonstrates a deep lack of knowledge of trust-related topics.
-
product
CAN-BUS Shield
The CAN-BUS Shield provides your Arduino or Redboard with CAN-BUS capabilities and allows you to hack your vehicle. This shield allows you to poll the ECU for information including coolant temperature, throttle position, vehicle speed, and engine rpms. You can also store this data or output it to a screen to make an in-dash project.
-
product
IP and Website Tracer
Visual IP Trace
Trace an IP address or web site back to its origin/location. There can be many reasons why anyone would want to trace an IP address or web site, everything from verifying a web sites location to avoid any potential phishing attempts, to verify a customers order, tracking a potential hack attempt and so on.
-
product
Cybersecurity Penetration Testing Assessments
Tripwire Professional Services
Organizations do all that they can to protect their critical cyber assets, but they don’t always systematically test their defenses. Penetration tests—otherwise known as pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems. Whether we are testing an application or network environment, Tripwire’s pen testing will not only identify vulnerabilities, but it will also demonstrate them through exploitation—definitively determining if unauthorized access or other malicious activity is possible.
-
product
IP and Port Monitoring Software
CallerIP
IP and Port monitoring. See all incoming and outgoing connections made to your computer. Including process names, remote and internal port numbers and much more. Automated alerts bring your attention to illegal connections. Automated Alerting. Set up alerts to warn you of intruders and hack attempts. CallerIP can send an email, display a warning dialog and/or append a log file. CallerIP Server. CallerIP server allows you to view all incoming and outgoing connections to your computer from any browser in the world. CallerIP plots all connecting IP locations on a world map. IP origin shown on world map. All connecting IP address locations are shown on a world map.
-
product
Security Labs Community Edition
*Hack and Patch Real Applications- Get hands-on experience with top vulnerabilities and see the fix impact in a live app, in real-time.*Level-Up Your Coding Approach- Add secure coding to your list of skills by fixing issues that you face regularly, in the languages you’re most comfortable with. *Complete Labs in Minutes- With labs under 10 minutes, you can learn fast and gauge your progress in real-time for quick feedback.
-
product
Secure Smartphone - Salus
Stratign’s Salus Smartphone is a high-end smartphone built from the ground-up and protects you from eavesdropping, malware, data breaches and any attempts to hack or tamper with your mobile communications and data.
-
product
Penetration Testing Services
All web and mobile applications are vulnerable to attack. You are going to get hacked – it's not "if", it's "when." Before it happens, you want to make sure you have a mature security system in place. Our specialists in software security testing have a background in IT and software development, know different types of exploits, and have experience in performing thousands of pen tests. We get hired to hack into systems and determine weaknesses.