-
Product
Expert-Level Vulnerability Assessments
Vanguard Analyzer
-
Vanguard Integrity Professionals
Vanguard Analyzer™ provides Vanguard expertise on z/OS Security Server. Analyzer delivers expert-level vulnerability assessments of z/OS Security Server configuration controls and security settings with the ability to produce audit results in minutes. Vanguard Analyzer™ provides risk analysis and mitigation requirements in easy to read panels. System auditors can review Analyzer findings in order of priority and mitigate accordingly. Do you have access to expert-level assessment based on severity and vulnerabilities? Are your security analyst armed with invaluable interpretation of assessment findings? Can you provide your company with a detailed explanation, easy to understand risk statements and corrective actions that need to be followed step-by-step?
-
Product
Ocean Surface Monitor
Current Monitor™
-
sigma S6 Current Monitor™ is a radar-based monitoring system that delivers ocean surface current data from moving stations and both current and bathymetry from fixed locations with high spatial resolution. This greatly improves the management of marine-based activities such as predicting oil slick drift patterns, enhancing navigational safety, and protecting vulnerable coastlines.
-
Product
Ada Source Code Analyzer
CodePeer
-
CodePeer is an Ada source code analyzer that detects run-time and logic errors. It assesses potential bugs before program execution, serving as an automated peer reviewer, helping to find errors efficiently and early in the development life-cycle. It can also be used to perform impact analysis when introducing changes to the existing code, as well as helping vulnerability analysis. Using control-flow, data-flow, and other advanced static analysis techniques, CodePeer detects errors that would otherwise only be found through labor-intensive debugging.
-
Product
Penetration Testing
-
Our penetration testing services reveal real vulnerabilities that matter to your environment. Ultimately LGMS will provide advisory and guidance to help your business to become more secure.
-
Product
Crypto Libraries Test Suite open source
Project Wycheproof
-
A set of security tests for identifying cryptographic vulnerabilities. Project Wycheproof tests crypto libraries against known attacks.
-
Product
Cloud-Based Predictive Service for Identifying Infrastructure Vulnerabilities
Kaleidoscope
-
With Kaleidoscope, you can rapidly and accurately identify previously unknown infrastructure vulnerabilities to prioritize capital expenditures and achieve greater infrastructure resilience in a more proactive and interconnected way.Kaleidoscope uses predictive algorithms to generate vulnerability assessments across key sectors of infrastructure in a community, including transportation, potable water, energy, communications and sanitation. By identifying vulnerabilities and how they may potentially impact a community’s resilience, helping to curtail expensive, unplanned and reactive maintenance, organizations can prevent disruptions before becoming hazards – so life goes on uninterrupted.
-
Product
Acoustic Compound Protection System
ACOMPRIS
-
Static kind of infrastructure is often vulnerable to attacks by either small arms fire (SAF) or mortars. The objects could be for instance a military forward operating base, an embassy or a post from the United Nations. As attacks may occur all the time, persistent and affordable protection is required. Especially when inhibited by civilians, ease of operations use and maintenance become more important. Often installed in remote places far away from the electricity grid, power consumption is an issue.
-
Product
Static Code Analysis for Embedded Software
GrammaTech CodeSonar®
-
CodeSonar is GrammaTech´s flagship static analysis software. Able to analyze both source code and binary code, it is specifically designed for zero-tolerance defect environments. With its advanced static analysis engine, CodeSonar is one of the most effective tools for eliminating the most costly and hard-to-find software defects early in the application development lifecycle. Compared with other tools, CodeSonar identifies twice as many defects that result in system crashes, leaks, data races, memory corruptions and security vulnerabilities.
-
Product
Dual Projection 3D In-Line Solder Inspection System
KY8030-2
-
The new KY8030-2 delivers 2x fasterinspection without compromising performanceand accuracy.Using patented dual projection, the systemeliminates the critical Shadow problem thatall 3D SPI systems can be vulnerable to.Easy UI and SPC Plus are included in the systempackage in order to help users achieve faster& easier printer process optimization
-
Product
SilverCreek SNMP Tests
-
Set up in less than five minutes - Windows or LinuxCustomize tests via Wizards, Script Generators, and moreAutomate operation with unambiguous test resultsIntegrate with other test harnesses and test toolsIncludes conformance, compliance, vulnerability, robustness, stress, and performance testingInvestigate failures and quickly resolve them with powerful diagnostic and analysis tools
-
Product
Telephone And Line Analyzer
TALAN™ 3.0
-
The TALAN 3.0 Telephone and Line Analyzer represents advanced capability to detect and locate illicit tampering and security vulnerabilities on digital, analog, and VoIP telephone systems. New hardware provides the ability to test twisted pairs against modern telecommunication threats including shield and ground.
-
Product
Processor IP
Security
-
Security IP designed to protect against a variety of different vulnerabilities.
-
Product
Security intelligence & analytics
-
Detect and prioritize threats that pose the greatest risk. dentify high-risk threats with near real-time correlation and behavioral anomaly detection. Detect vulnerabilities, manage risks and identify high-priority incidents among billions of data points.Gain full visibility into network, application and user activity.
-
Product
Security Testing
-
As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.
-
Product
Veracode Dynamic Analysis
DAST
-
Identify and Fix Critical Runtime Vulnerabilities in Web Applications and APIs.* Identify Vulnerabilities in Runtime Environments. Simultaneously scan hundreds of web apps and APIs to find vulnerabilities quickly - including pre-production and staging environments behind a firewall.*Prioritize and Fix Flaws Quickly, A <5% false positive rate allows teams to focus on the vulnerabilities that matter. Detailed, actionable remediation guidance means flaws are fixed faster.*Contribute to a Successful DevSecOps ProgramDynamic scans can be viewed in the Veracode Platform alongside other application security tests, providing multi-faceted insights into the entire security program. Insights and analytics can be used to further improve your DevSecOps program.
-
Product
Node.js® platform
N|Solid™
-
N|Solid is a fully compatible Node.js runtime that has been enhanced to address the needs of the enterprise. Rapidly resolve performance problems. Protect customer data from vulnerable packages and unauthorized code. Drive performance and operational efficiency at scale.
-
Product
P1 Vulnerability Knowledge Base
VKB
-
With more than 1800 identified & listed vulnerabilities P1 Security Vulnerability Knowledge Base (VKB) is a unique telecom-dedicated Vulnerability Database, with absolutely no other equivalent on the market. It is the result of years of expertise and vulnerability assessments successfully led by our engineers on the Core & Radio Networks & Network Elements of many of the biggest Telecom operators in the World.
-
Product
Security Labs Community Edition
-
*Hack and Patch Real Applications- Get hands-on experience with top vulnerabilities and see the fix impact in a live app, in real-time.*Level-Up Your Coding Approach- Add secure coding to your list of skills by fixing issues that you face regularly, in the languages you’re most comfortable with. *Complete Labs in Minutes- With labs under 10 minutes, you can learn fast and gauge your progress in real-time for quick feedback.
-
Product
P1 Telecom Auditor
PTA
-
PTA provides network discovery, security scanning and auditing for SS7/SIGTRAN, GPRS/GTP-C, LTE/Diameter and 5G protocol stacks. PTA enables Security and Telecom Engineers to discover the security level of their networks and assess the vulnerabilities of signaling Network Elements. It also provides CIOs, CTOs & VPs of Engineering, decision makers and top management, the ability to control the evolution of their Core Networks™ security using a dashboard of key indicators.
-
Product
Application Security Platform
Sentinel
-
WhiteHat Sentinel is a Software-as-a-Service (SaaS) platform that enables your business to quickly deploy a scalable application security program across the entire software development lifecycle (SDLC). Combining advanced scanning technology with the world’s largest application security research team, we accurately identify your vulnerabilities and scale to meet any demand without slowing you down.
-
Product
Test SIP
-
VoIP, Video, and IPTV products must withstand and continue to function when facing all the conditions that occur on the Internet. These include attacks from hackers exploiting vulnerabilities in security and protocols as well as the common phenomenon of congestion, delay, jitter, drops, and so on. VoIP, Video, and IPTV products must demonstrate robustness and resiliency in the face of unusual and/or illegal conditions.
-
Product
UDP Test Suite
-
Design engineers, quality assurance engineers and testers use the IWL UDP Test Suite to find and fix bugs in their UDP implementation. The tests help ensure that the UDP implementation is sufficiently robust so that it is not vulnerable to the wide range of attacks in today's Internet. The tests make use of the Maxwell Pro network emulation environment, so that each test sequence can intelligently impair all aspects of the UDP protocol.
-
Product
Network Penetration Testing
Metasploit
-
Network penetration testing (aka pen testing) and timely identification of network vulnerabilities is something every organization needs done before hackers or disgruntled insiders exploit the weaknesses.
-
Product
Security Labs
-
*Learn toReduce Security Tech Debt- Provide developers with the knowledge and practice they need to write secure code.*Safely Exploit Insecure Apps- Let developers learn by breaking and fixing insecure apps in a containerized, safe environment managed by Veracode.*Effortlessly Train, Retain, and Govern- Tailor training content, measure developer growth over time, and retain developer talent, all while meeting compliance and governance needs. Write Secure Code and Mitigate Vulnerabilities
-
Product
Security Testing Service
-
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
Product
Wideband True RMS AC Voltmeter
323
-
The Ballantine 323 True RMS analog ac voltmeter uses advanced true rms circuitry to achieve square law response from rugged, fast responding silicon diode detectors with no thermal lag and overload vulnerability inherent in thermocouple devices.
-
Product
Network Security Testing
-
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
Product
The Internet Control Message Protocol (ICMP)
ICMP Tests
-
The Maxwell Pro ICMP Test Suite provides a series of tests for verifying correct operation of ICMP. The tests ensure TCP/IP compliance through vulnerability and robustness testing, with tests for ICMP in both the IPv4 and IPv6 environments.
-
Product
Application Security Testing Solution
CxIAST
-
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.
-
Product
Penetration Testing Services
-
All web and mobile applications are vulnerable to attack. You are going to get hacked – it's not "if", it's "when." Before it happens, you want to make sure you have a mature security system in place. Our specialists in software security testing have a background in IT and software development, know different types of exploits, and have experience in performing thousands of pen tests. We get hired to hack into systems and determine weaknesses.





























