Filter Results By:
Products
Applications
Manufacturers
IP Security
-
product
RA Family Of Arm-based MCUs
RA4
The RA4 Series bridges the needs for reasonable low power with the demand for connectivity and performance. These MCUs deliver up to 48MHz of CPU performance using an ArmⓇ CortexⓇ-M4 core with up to 256kB of embedded flash memory. The series offers a wide set of peripherals, including USB, CAN, ADC, capacitive touch, a segment LCD controller, and additional security IP integration, making it suitable for industrial equipment, home appliances, office equipment, healthcare products, and meters.
-
product
Processor IP
Security
Security IP designed to protect against a variety of different vulnerabilities.
-
product
Chamber Controllers & Software
Designed off of our previous controller platform with familiar features in an improved interface, added functionality for ease and fewer steps to accomplish your daily testing needs. Remotely monitor and control your chambers and receive text/email alarms. From the home screen users can now manually control, run or stop a profile and view a snapshot of current activity like actual/setpoint values, alarm, datalogging, profile, security, IP address information and more.
-
product
RZ/G1 32-bit MPUs
The RZ/G1 high-performance 32-bit processors have 1GHz+ Arm® Cortex®-A cores, a 3D graphics engine, a full high-definition (HD) video engine, secure IP, high-speed interfaces such as PCIe, SATA and Gigabit Ethernet, and other functions necessary for embedded devices in the industrial segment.
-
product
Security Products
Security is no longer an option; it’s a requirement. As your trusted provider of platform security solutions, our comprehensive portfolio addresses a variety of threat models.
-
product
Security Testing
We protect your business from cyber attacksSecure online transactionsPrevent unauthorized accessMinimize the risk of data lossEnhance resistance to DoS attacks
-
product
Quantum-Safe Security
CN6000 Series
The Centauris CN6000 encryptors may be upgraded to quantum cryptography through the addition of the Cerberis Quantum Key Distribution (QKD) server to ensure that the solutions are quantum-safe for the long-term protection of sensitive data. This also ensures investment-protection of the encryptors. Such quantum cryptography is provably secure, ensures anti-eavesdropping detection and provides long-term forward secrecy against brute force hacking and attacks by quantum computers.
-
product
Communication Security
Shoghi Communications design and development specific Military Grade Crypto System , Shoghi provids end-to-end communication Security (COMSEC) and secure information transfer. Shoghi has strong experience in creating customer specific Algorithms and Key management schemes. All the hardware, inspite of all the complexities can be loaded by the customer themselves with their own algorithm, to enhance the whole security environment.We are known for our open source designs and crypto validated equipment supply to our military customers. In case of any specific design or development, please feel free to get in touch with our team
-
product
Cloud Security Testing
Using a cloud infrastructure is no more a new phenomenon in the digital world. Businesses use it as a basic practice now a days due to numerous benefits associated with it. Hence, it should be a top most priority for the businesses to secure their cloud infrastructure as that’s the nucleus of their business from all aspects. In cloud security testing, the cloud infrastructure is screened to identify security risks and the areas which can be exploited by the attackers. Cloud security testing is mainly performed to ensure that cloud infrastructure can protect the confidential information of an organization. QA Mentor adopts three different approaches during the cloud security testing process:
-
product
IP Gateway
3507Rx
Hangzhou Softel Optic Co., Ltd.
SFT3507Rx IP to ASI Gigabits gateway is a head-end interface device which is used for DVB ASI and Ethernet . As a kind of IP receiver, this device can recover UDP database received from the transporting device into TS stream and then output it through the ASI output interfaces. Moreover, it has the function to resist the IP transporting jitter, and to restore the PCR of the TS stream. This device can maximum receive 12 channel IP and output 12 ASI, also, it can simultaneously transmit the 12 IP stream into 12 TS stream.
-
product
Security Testing Consultancy
QA Mentor provides an End-to-End security testing services through the array of preventive measures, proven methodology and framework, use of best tools identified through POCs (proof of concepts) and an excellent infrastructure which is using evolving technologies. The backbone of all of these are the industry and project experience QA Mentor and its highly qualified & certified Security Testing Consultants. Our consultants closely work with our customers to assess their system, conduct POC to identify the relevant preventive measure and tools to be used and guide the IT teams of the businesses with a clearly defined roadmap to be followed to secure their systems.
-
product
FPGA Toolkits & IP
Curtiss-Wright Defense Solutions
Our tools and source code for use with our Xilinx Virtex and Kintex-based FPGA products include- FusionXF simplifies the development of FPGA-based application code by allowing developers to concentrate on their application without needing to worry about system integration of the hardware and operating system interface. The DDC family of IP cores supports decimation from 2 to 64 in complex mode and 2 to 32 in real mode
-
product
Complete IP Module
Scan Ring Linker SRL
The Scan Ring Linker SRLTM - is a complete IP module that can be easily embedded into a CPLD, FPGA or ASIC on a PCB to reduce the complexities and costs of designing 1149.1 (JTAG) test infrastructure for designs that use multiple scan rings. The SRL IP module links any number of scan rings (secondary scan paths) into a single high-speed test bus, which permits devices on secondary scan chains to be independently tested and configured through a single 1149.1 external interface.
-
product
Foundation IP
TSMC
Our Foundation IPs embed power management features (multi-Vt/multi-channel libraries, multi-VDD characterization, integrated power-switches, source-biasing…) which allow designers to explore the SoC architecture. Optimal configurations can be generated to meet the application’s Performance, Power and Area constraints. We also complement our offering to reach best-in-class Energy Efficient SoC by serving Always-On power-domains with a dedicated offer, optimized to achieve the ultra-low-power requirements of battery-operated devices in sleep mode.
-
product
IP Gateway
SFT3508F/SFT3508F-10 (SFT3508F-M)
Hangzhou Softel Optic Co., Ltd.
*8 Data ports ( SFT3508F/SFT3508F-M) :First Data port: IP out over HTTP, UDP (SPTS), HLS and RTMPData CH1-7 ports: IP in over HTTP, UDP (SPTS), RTP (SPTS), RTSP and HLSIP out over HTTP, HLS and RTMP (Unicast)*10 Data ports ( SFT3508F-10) :First Data port: IP out over HTTP, UDP (SPTS), HLS and RTMPData CH1-9 ports: IP in over HTTP, UDP (SPTS), RTP (SPTS), RTSP and HLSIP out over HTTP, HLS and RTMP (Unicast)*Support TS files uploading through Web management*Support IP anti- jitter function*Support adding scrolling caption, welcome words, boot image and boot video (this function is only applicable to IP out application and the STB/Android TV must be installed SOFTEL IPTV APK)*Support downloading SOFTEL IPTV APK directly from this device *Support about 80 HD/SD programs (Bitrate:2Mbps) When HTTP/RTP/RTSP/HLS is converted into UDP (Multicast),the actual application shall prevail, and suggest maximum 80% CPU utilization*Support program playing with APK downloaded android STB and TV, maximum 150 terminals
-
product
Network Security Appliances
With the development and popularization of cloud computing technologies, traditional network security providers are repositioning and moving their development efforts from network security solutions that can only handle single point security issues to a new generation of network security solution that are effective in big data and cloud computing environments. ICT equipment providers in the network security industry need network security servers that have massive DPI parsing power, full support for NFV and SDN, and a powerful big data processing engine. This equipment must also support dynamic capacity expansion and scalable IO extension in order to adapt to a more complicated cloud environment.
-
product
Network Security
TrustMonitor™
TrustMonitor™ provides continuous monitoring of the trust network by:*(Analyzing content & constraints for validity of credentials*Monitoring that certificate authorities are available to support validation*Easily scaling to incorporate new certificate authorities (no agent required)
-
product
IP Telephony
PLANET integrated HD VoIP solution consisting of IP PBX system, VoIP gateway, VoIP phone, IP intercom and IP paging, and analog telephone adapter features wideband-compliant, crisp and clear sound quality. PLANET IP telephony products support enterprises of all kinds to expand offices and branches in new locations.
-
product
API Security Testing
In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage:
-
product
Cyber Security Training
Elbit Systems of America's comprehensive attack scenario library reflects the most recent threat landscape. Our cyber security experts continuously update training scenarios with newly discovered attacks and tactics. Versatile network settings and attack scenarios equip cyber security teams with customized training specific to each team's organization.
-
product
Cross Domain Security Solutions
Stratign’s Cross Domain Security Solutions are highly trusted, government-accredited network security components that control and, if necessary, block the flow of data between two security domains at all layers.
-
product
Cyber Security Testing Services
Cyber security testing is often also referred to as pen testing or penetration testing. Such tests validate the cyber security defences of your applications, network infrastructure and even your team members. Our cyber security testers are highly trained and certified ethical hackers.
-
product
Secure NFC
Mobile security is expanding from the largely deployed SIM technology to the growing NFC, embedded Secure Element (eSE) and embedded SIM (eSIM) technologies in smartphones, tablets, wearables, and laptops. ST provides an exhaustive offer of NFC and eSE/eSIM products to address secure mobile transaction applications such as secure connectivity, payment wireless charging and automotive: from the state-of-the-art ST21NFC to the ST54 integrating the widely deployed ST33.
-
product
IP Surveillance Camera
ENVIROMUX-IPCAM
View and control the camera from the ENVIROMUX web interface, the camera web interface, included software, or with a compatible cell phone. With the ENVIROMUX-2D/5D/16D, a triggered snapshot can be forwarded in alert e-mails. A snapshot can be triggered by any programmed event (motion detection, door open/close, glass break, smoke, liquid detection, etc.). Image sensor: 1/4" progressive scan CMOS sensor. Video Streaming: simultaneous Motion JPEG and MPEG-4. Frame rate: 30fps at 640x480 (VGA) resolution. Lens: F2.0, 4.0 mm (0.16 in). RJ45 connector. Wireless models: wireless IEEE 802.11 b/g up to 54 Mbps. Regulatory approvals: CE, FCC, RoHS.
-
product
IP Parallel IO
IndustryPack compatible IP-Parallel-IO with counter and timer design adds up to 48 digital parallel IO lines to one IP slot of your carrier board.
-
product
Day/Night IP Surveillance Camera
ENVIROMUX-IPCAM-N
View and control the camera from the ENVIROMUX web interface, the camera web interface, included software, or with a compatible cell phone. With the ENVIROMUX-2D/5D/16D, a triggered snapshot can be forwarded in alert e-mails. A snapshot can be triggered by any programmed event (motion detection, door open/close, glass break, smoke, liquid detection, etc.). Image sensor: 1/4" progressive scan CMOS sensor. Video Streaming: simultaneous Motion JPEG and MPEG-4. Frame rate: 30fps at 640x480 (VGA) resolution. Lens: F2.0, 4.3 mm (0.17 in), 12 infrared LEDs for night vision. RJ45 connector. Wireless models: wireless IEEE 802.11 b/g up to 54 Mbps. Regulatory approvals: CE, FCC, RoHS.
-
product
Modular IP Video System
NXG
Blonder Tongue Laboratories, Inc.
Blonder Tongue's NXG Video Delivery System solutions are highly customizable, module-based IP digital video processing platforms designed for delivering next-generation video services on any generation of coax or ethernet wiring without replacing existing infrastructure.
-
product
IP Core and FPGA Products
Our FPGA offerings include development boards and IP cores for Altera FPGA devices. The IP cores include: I2C, PCIe, JPEG-LS, LVDS Camera Link and memory controllers.
-
product
IP Gateway
SFT3503A
Hangzhou Softel Optic Co., Ltd.
SFT3503A Bidirectional IP Gateway is a head-end interface device which is used for DVB and Ethernet. It can be used both for a receiver and a lancers! On one hand, in the lancers part, this machine can be used for sending IP stream, turning the TS stream into IP Stream. On the other hand, in the receive part; this machine can be used for receiving IP stream, turning the IP stream into TS stream.