Filter Results By:
Products
Applications
Manufacturers
Penetration Testing
1) security check for code exploits. 2) conformal coat pierce test connection. 3) hardness indent.
See Also: Pen Testing, Pentest, Application Security Testing, Conformal Coating, Penetration Hardness, Network Security, Vulnerability, Indenters, Forensics
-
product
Cyber Protection System
Raytheon’s Cyber Protection System enables enterprises to go beyond traditional CSOC monitoring and establish a response center capable of situational awareness, proactive defense and rapid response. Cyber test ranges: Test the cyber resilience of hardware, software, and networks. Penetration/Malware/Forensics Fly Away Kits: Provide mobile environments to perform testing and analysis at remote facilities. Lab environments: Analyze malware, perform penetration testing and conduct forensics at enterprise scale so analysts can determine the best way to manage them.
-
product
Mobile App Penetration Testing
To verify the functionalities of your software, to check for the quality of your product, and to see that the applicationis working against business requirements, opt for Functional Testing.
-
product
Penetration Testing Distrubution
BlackArch Linux
BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 1524 tools. You can install tools individually or in groups. BlackArch Linux is compatible with existing Arch installs. For more information, see the installation instructions.
-
product
Bally Waterproofness Tester
UI-FT20
Bally Waterproofness Tester is to test materials like coated leather, leather dynamic water penetration resistance ability. The material would be partially put in water and the bally water penetration tester would flex the sample in the water under certain speed to simulate material water resistance in daily work. Here for more Leather Testing Machine.
-
product
CREST Penetration Testing
CREST is a not for profit organization that serves the needs of a technical information security marketplace that requires the services of a regulated professional services industry.
-
product
Wireless Network Penetration Testing
LGMS wireless network penetration testing uses automated and manual penetration techniques to locate and map authorized and unauthorized wireless access points, review corporate access point configuration and then discover weaknesses that could allow an attacker to penetrate those networks. Potential internal and external threats are documented, and a recommended action plan is developed to address any security risks.
-
product
Penetration Testing
Our penetration testing services reveal real vulnerabilities that matter to your environment. Ultimately LGMS will provide advisory and guidance to help your business to become more secure.
-
product
Network Penetration Testing
Metasploit
Network penetration testing (aka pen testing) and timely identification of network vulnerabilities is something every organization needs done before hackers or disgruntled insiders exploit the weaknesses.
-
product
Consistency
Benefit from Anton Paar’s longstanding experience in consistency and ductility testing. From essential tools for surface penetration, grease working, and softening point testing to reliable breaking point testers – Anton Paar’s widely applicable solutions for consistency testing guarantee full compliance with a vast range of relevant standards.
-
product
Open-source Penetration Testing Tool
SecSmash
Secsmash is a modular framework for leveraging credentials to enterprise security tools to own the enterprise. Instead of spinning up your own C2 on a pentest, leverage the C2 that organizations have already deployed. HTTP integrator takes inputs, and extractions to generate new inputs, to drive a chain of HTTP request to authenticate to the target system, enumerate connected hosts, and run commands.
-
product
Spirent SecurityLabs
The Spirent SecurityLabs’ services are structured to produce high-impact results with minimal impact on the client organization. Our dedicated teams of experienced security professionals offer comprehensive scanning, penetration testing and monitoring services for networks, applications and devices, as well as source code analysis.
-
product
Hydrostatic Head Pressure Tester
Sataton Instruments Technology CO., Ltd
Hydrostatic head pressure tester is designed to determine the resistance to water penetration of materials by hydrostatic pressure method. By measuring the opposition to the passage of water through the tested specimen, the tester is to provide standard testing conditions for operator to note the test terminal point. The tester is primarily intended for ducks, tarpaulins, tentings, waterproof materials and other materials which are used for impermeable application, such as chemical protective clothing or medical protective clothing.
-
product
RFID Fuzzing Tool
NFC Kill
The world's only RFID fuzzing tool. Securely disable RFID badges. Test and harden RFID hardware. Audit access control failure modes. Test and reduce the attack surface for pen-test customers. RFID Penetration testing.
-
product
Cyber Security Testing Services
Cyber security testing is often also referred to as pen testing or penetration testing. Such tests validate the cyber security defences of your applications, network infrastructure and even your team members. Our cyber security testers are highly trained and certified ethical hackers.
-
product
Vulnerability Assessment And Penetration Testing
VA&PT
If new web applications are installed into your organization’s network, you have shifted your business physically to another network, or if your site requires IT governance and regulatory compliance, you should opt for Penetration Testing.
-
product
High Impact Shock Test System
KRD16 series
High impact shock test system meets MIL-S-901D standard which covers shock testing requirements for ship board machinery, equipment, systems, and structures, excluding submarine pressure hull penetrations. The purpose of these requirements is to verify the ability of shipboard installations to withstand shock loadings which may be incurred during wartime service due to the effects of nuclear or conventional weapons.
-
product
Hardness Testers
The hardness tester products you will find at PCE Instruments (PCE) are used for determining surface hardness. Each hardness tester uses a standard method of measurement. The measuring principles of most hardness tester devices are based on either the penetration of a diamond indentor into the material being tested or a calculation related to the force of the rebound after striking the tested material. However, material hardness can also be measured accurately through ultrasonic testing. Each hardness testing method has its benefits and will allow for the precise measurement of material hardness in accordance with the technical specifications of the hardness testing instrument.
-
product
Probes For Non-Contact Ultrasonic Testing
SONOSCAN CFC / CF
Due to the strong damping properties of air, low frequencies in the kHz range are used in air-coupled ultrasonic testing. It is therefore all the more important that the ultrasonic transducers offer a particularly high sensitivity in order to ensure high penetration and improved resolution. We achieve this, among other things, by installing preamplifiers in the receiver probe as well as by using our own Piezocomposite Technology, which enables a flexible use of the matching materials in our CFC and CF probes.
-
product
Website Penetration Testing
The vulnerabilities in a website need to be proactively fixed before the weaknesses are exploited by hackers, which in turn may lead to loss in customer’s confidence. We at Precise Testing Solution provide extensive planning to conduct website penetration. We check for holes in CRM, extranets, and internal network applications.
-
product
Intelligence – Led Penetration Testing
An Intelligence-Led Penetration Test (Intel-led Pentest) closely mimics the tactics and techniques of sophisticated and persistent cyber attackers with the intention of compromising an organization’s critical systems.
-
product
Penetration Testing Services
All web and mobile applications are vulnerable to attack. You are going to get hacked – it's not "if", it's "when." Before it happens, you want to make sure you have a mature security system in place. Our specialists in software security testing have a background in IT and software development, know different types of exploits, and have experience in performing thousands of pen tests. We get hired to hack into systems and determine weaknesses.
-
product
Veracode Platform
The Veracode Continuous Software Security Platform contains all of the application security testing types you need in one place – static analysis, dynamic analysis, software composition analysis, and manual penetration testing – ensuring that you have a comprehensive view of your risk from design through deployment.
-
product
Security Testing Service
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
product
Telecom, Embedded Hardware-S/W Systems
Network Penetration Testing is a technique that identifies security vulnerabilities in the application by applying different malicious processes to break network security.
-
product
Penetrometers
Penetrometers measure the firmness or hardness of fruit. Penetrometers are ideal for determining the best time to harvest fruit or to test its progress to maturity. The firmness of fruit is one of the most widely used parameters in testing its maturity, together with measuring the fruits sugar content using refractometers. Electronic penetrometers come with different diameter penetration points. This allows for fruit of different size and hardness to be tested. It is important that this first part of the measurement process is done correctly if the readings obtained are to be valid in making adequate decisions as to when the fruit should be harvested. It is important the the samples that are measured are representative of the entire crop, considering a sufficient minimum quantity sample, size and quality.
-
product
Application Penetration Testing:
Penetration testing (or pen testing) is a simulated security exercise in which ethical hackers attempts to exploit the vulnerabilities of an application system (web or mobile). The objective of this exercise is to identify any possible loopholes present in the system’s defence mechanism which the real hackers could take advantage of. QA Mentor practices the following stages while exercising this:
-
product
Sand And Dust Test Chambers
Dongguan Amade Instruments Technology Co., Ltd
Sand and dust test chamber is also referred as dust-proof chamber, which is able to simulate the sand storm by putting the test piece in the chamber to judge the damage of sand-and-dust weather to products. Equipment is mainly applicable to determination of sealing performance of product shells based on the IPX5 and IPX6 degrees. Testing machine features a flow of air carrying dust in a vertical circulation, resulting in cycle use of sand during the test. Sand and dust testing has great significance to master the specimen’s performance to defend the penetration of dust particles, to withstand the abrasion of sands.
-
product
Web Application Penetration Testing
Web Application Penetration Testing – to identify, analyze, and report vulnerabilities in a given web application. LGMS adopts a robust technology and process-based approach supported by a well-documented methodology to identify potential security flaws in the web application and the underlying environment.
-
product
SST Security Assessment
Self-Service Terminal (SST) penetration testing is an activity which identifies vulnerabilities in SST that may potentially exist due to the lack of physical security measures, technical configuration or process controls.
-
product
LEAK TESTER
Quickly and easily detect air and water leaks in building envelopes and rigid air barrier systems. Ideal for testing penetrations (fasteners, masonry ties, etc.) and continuity of joints and seams in rigid air barrier systems.