Application Security
vulnerabilities identification and remediation software.
-
product
Security Testing
For an application to be successful, it has to ensure the security of the customer’s data, which in turn helps to gain the trust of the customers, avoid legal battles, and enables growth in business.
-
product
E2E Security Connector
The E2E Security Connector is a cloud solution for enhancing the security level of your system. It provides secure generation and management of confidential data during the pre-personalization process of your connected devices as well as different protection schemes for its application and data transportation layer.
-
product
Software Applications
Excalibur Systems provides software utilities and applications programs to manage data communications for our products, which include Bus Controllers, Bus Monitors, Data Recorders and analytical flight Data Reconstructors. There are different applications for single & multi function MIL-STD-1553 and ARINC-429.
-
product
Network Security
PLANET Network Security solution is designed to build a strong and secure network for any commercial and industrial environments. By providing functions like cybersecurity, SPI firewall, VPN, IDP, antispam and antivirus, this collection includes VPN Security Gateway, 5G NR Gateway, Flat-type Smart Router, UTM Content Security Gateway and Wireless VPN Routers. A variety of product lines can satisfy all the demands of enterprises, SMBs, factories, communities and more for the network security including remote management and surveillance of IoT, IIoT and building automation applications.
-
product
Security Testing Service
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
product
Application Penetration Testing:
Penetration testing (or pen testing) is a simulated security exercise in which ethical hackers attempts to exploit the vulnerabilities of an application system (web or mobile). The objective of this exercise is to identify any possible loopholes present in the system’s defence mechanism which the real hackers could take advantage of. QA Mentor practices the following stages while exercising this:
-
product
Quantum-Safe Security
CN8000 Series
The CN8000 harnesses the power of quantum mechanics to help ensure secure communications – the encryption keys are generated by IDQ’s Quantum Random Number Generator to guarantee inherent and provable randomness. The CN8000 can also be upgraded to be quantum-safe via the Cerberis QKD Blade (quantum cryptography) to ensure long-term protection of the data in transit.
-
product
Network Security Testing
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
product
Quantum-Safe Security
CN6000 Series
The Centauris CN6000 encryptors may be upgraded to quantum cryptography through the addition of the Cerberis Quantum Key Distribution (QKD) server to ensure that the solutions are quantum-safe for the long-term protection of sensitive data. This also ensures investment-protection of the encryptors. Such quantum cryptography is provably secure, ensures anti-eavesdropping detection and provides long-term forward secrecy against brute force hacking and attacks by quantum computers.
-
product
Security Vehicles
When you need to set up robust security operations in a temporary or outdoor location, our security vehicles can provide a tried and tested solution. For use at festivals, public ceremonies, sports events and other outdoor functions, our mobile check point and scan truck will help keep your guests or members of the public safe from security threats.
-
product
Laser Applications
Quantum Composers offers a diverse family of lasers, laser systems, and modules, including DPSS, Nd: YAG, and pulsed lasers. Our MiniJewel and MicroJewel lasers are now available in 2 different energy options to allow customers to tailor the laser to their specific applications.
-
product
Application Solutions
Here you will be able to find our most commonly asked questions. If the question you are looking to be answered is not here please do not hesitate to Contact Us.Still have questions? Feel free to contact us.
-
product
Quantum-Safe Security
CN9000 Series
The Centauris CN9000 Series is the first commercially available certified high-assurance 100Gbps Ethernet encryptor that supports the most complex fully meshed topologies – enabling 100% security for Big Data, Cloud and data centre services’ ultra-fast networks.
-
product
Trusted & Secure Servers
A part of the EnterpriseSeries™ product line, Mercury’s RES Trust servers employ U.S. designed and manufactured motherboards with embedded Intel® processors and composable BuiltSECURE™ framework to deliver trusted performance for the most security-imperative mission critical applications. RES Trust servers can be configured with a variety of nation-state-level security features. System security features enable customer Foreign Military Sales (FMS) or Direct Commercial Sales (DCS) program success.
-
product
Application Lifecycle Management
ALM
Addressing workload complexity through efficient use of Application Lifecycle Management (ALM) tools and automation to lead to upwards of 10x ROI
-
product
Application Performance Testing
An important part of application performance testing is to conduct such tests in conditions that realistically reflect the environment in which the application is ultimately expected to operate.
-
product
Fixed Surveillance System for Perimeter Security
Argus
Argus is a fixed, rugged, preconfigured wide area surveillance system. Combining a best-in-class radar and thermal camera with Command and Control software, Argus is designed to detect and track multiple threats both near and far in the most demanding weather conditions 24 /7. When compared to other perimeter security solutions, Argus has the lowest initial cost per kilometer of secured space as well as the lowest lifetime cost.
-
product
Security Devices
Schweitzer Engineering Laboratories, Inc.
Security devices protect perimeters and secure communications within LANs.
-
product
Cloud Security Testing
Using a cloud infrastructure is no more a new phenomenon in the digital world. Businesses use it as a basic practice now a days due to numerous benefits associated with it. Hence, it should be a top most priority for the businesses to secure their cloud infrastructure as that’s the nucleus of their business from all aspects. In cloud security testing, the cloud infrastructure is screened to identify security risks and the areas which can be exploited by the attackers. Cloud security testing is mainly performed to ensure that cloud infrastructure can protect the confidential information of an organization. QA Mentor adopts three different approaches during the cloud security testing process:
-
product
Cyber Security/Network Security Training
Stratign’s Cyber Security/Network Security Training provides cybersecurity professionals with foundational, intermediate, and advanced security skills imparted through experts in the field.
-
product
Application Specific LC Systems
Nexera FV
Taking Online Dissolution Testing Into the New Era of Ultra High Performance Chromatography Nexera FVDissolution tests are widely used in original pharmaceuticals development and quality control and for bioequivalence tests in generic drugs.
-
product
Thermal Security Camera with Onboard Analytics
Triton™ F-Series ID
The FLIR Triton™ F-Series ID thermal security cameras set the new standard of perimeter protection for critical infrastructure. The Triton F-Series ID features best-in-class thermal imaging detail and high-performance onboard analytics for classifying human or vehicular intrusions. FLIR’s premium line offers five models with full 640 × 480 thermal resolution, longer detection ranges, and better analytics performance than ever before.
-
product
API Security Testing
In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:
-
product
Application Specific LC Systems
Mycotoxin Screening System
Mycotoxin (mold toxin) is a generic term for metabolites produced by molds on food products that are hazardous to human and animal health. To improve food safety, food processors have been inspecting ingredients for the presence of such mycotoxins. In only 14 minutes, this mycotoxin screening system is able to detect the presence of 10 mycotoxin components with high sensitivity at concentration levels specifled by EU standards, which are the strictest in the world. Furthermore, because the system does not involve a sample derivatization process, samples can be measured much more efficiently.
-
product
Secure Access
Schweitzer Engineering Laboratories, Inc.
Devices with secure access authenticate users, control privileges, and create audit trails.
-
product
Pickering Software Drivers and Applications
We provide driver packages for LXI and PXI products offering seamless installation and support of all popular Programming languages such as C/C++, LabVIEW™, LabVIEW RT, .NET, VB, LabWindows/CVI, MATLAB®, Python, ATEasy, TestStand™, Veristand™ and Switch Executive™ (via the IVI driver).
-
product
Multiprotocol P104Plus Interface Board for Embedded Applications or Avionics Test & Simulation Applications
EXC-4000P104plus
The EXC-4000P104plus is a multiprotocol P104plus interface board for embedded applications or avionics test and simulation applications. Each board holds up to five independent modules. Two on-board modules use the MIL-STD-1553 communications protocol (M4K1553Px); another on-board module uses the ARINC-429 communications protocol; two additional detachable modules can be any one of the following types:M4K1553PxS (Single Function - RT validated) This module operates as a Bus Controller, Remote Terminal or a Bus Monitor. This module qualifies for airborne applications.M4K1553Px (Multi Function) This module operates as a Bus Controller, up to 32 Remote Terminals and as a Bus Monitor. Supports an Internal Concurrent Monitor in RT and BC/RT modes.M4K1553Px(S)-1760 Same as M4K1553Px(S) plus MIL-STD-1760 options.M4KMMSI Mini Munitions Store Interface module. Supports RT, BC/Concurrent-RT/Concurrent Monitor and Bus Monitor modes. Up to 8 hub ports EBR-1553 [10 Mbps 1553 protocol using RS-485 transceivers] and 1 monitor output.M4KH009 Based on our H009 family. This module operates as a Central Computer Complex (CCC) and/or up to 16 Peripheral Units (PUs) simultaneously, or as a Bus Monitor. In addition, a Concurrent Bus Monitor enables concurrent monitoring of the bus during CCC and PU simulation.M4K429RTx Based on our ARINC 429RxTx board. This module supports either five or ten ARINC 429 channels each of which can be configured in real time as a receive or transmit channel.M4K708 This module supports two channels of ARINC 708/453, each one selectable as either transmit or receive.M4KSerial This module supports up to 4 independent channels of serial communications, each of which can be selected as RS485, RS422 or RS232.M4KDiscrete This module supports 20 selectable input/open collector output discretes. The module supports TTL (0 to 5 volts) or avionics (0 to 32 volts) voltage levels.M4KCAN This module supports up to 6 independent channels of CAN 2.0B protocol with standard and extended message frames and message identifiers.
-
product
Secure Smartphone - Salus
Stratign’s Salus Smartphone is a high-end smartphone built from the ground-up and protects you from eavesdropping, malware, data breaches and any attempts to hack or tamper with your mobile communications and data.





























