Filter Results By:
Products
Applications
Manufacturers
-
product
Drop Weight Impact Testing Machine
DWTT Series
Jinan Testing Equipment IE Corporation
DWTT Drop Weight Impact Testing System is suitable for drop weight tear test of various kinds of ferrite, especially for the test of DWTT for pipeline steel as ASTM-E 436, API-RP 5L3, ASTM-E 208 and DIN EN 10274. DWTT has integrated mechanical, electrical, and automatic control technology, and achieved full automation of feeding, hammer lifting impact, and fracture specimen collection. The load frame has a four-column design, features in stable supporting structure, rigid, dual sliding rails. The Drop Weight Drop Weight Tester is equipped with positioning mechanism, anti-dumping mechanism, safety mechanism, hydraulic buffer devices and security guard net. The impact energy is determined by the lifting height and configuration of different net weights. DWTT Drop Weight Impact Testing System is the essential quality control equipment for pipeline manufacturers, steel mills, iron and steel enterprises, and is also widely used for research institutes.1. Buffer device is equipped to avoid the second impact and absorb the residual energy after breaking the specimen so as to prevent the weigher and anvil from destroying. The installation of safety mechanism, buffer device, and security guard net will effectively secure the testing machine and its operation to extend its life.2. Configuration of the specimen-feeding system, anti-second impact device, and specimen centering mechanism will guarantee a quick, accurate and reliable test.
-
product
Quantum-Safe Security
CN6000 Series
The Centauris CN6000 encryptors may be upgraded to quantum cryptography through the addition of the Cerberis Quantum Key Distribution (QKD) server to ensure that the solutions are quantum-safe for the long-term protection of sensitive data. This also ensures investment-protection of the encryptors. Such quantum cryptography is provably secure, ensures anti-eavesdropping detection and provides long-term forward secrecy against brute force hacking and attacks by quantum computers.
-
product
Security Testing
As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.
-
product
Unit Testing & Mocking Solution for .NET
Isolate
Part of Typemock Isolator,The Complete Unit Testing & Mocking Solution for .NET From mocking to coverage to automated test suggestions
-
product
API Security Testing
Nowadays, APIs are frequently used for communication between two applications. In this communication, lots of sensitive data is transferred between devices and the server.In order to be protected in the event of a data loss or attack, we must secure our API.
-
product
Portable Security System
Sensor-1
The portable security system that fits in the palm of your hand. Sensor-1 detects real-time changes in motion and alerts you when your important items move. Operates independent of the mobile app. Communicates with smartphones, tablets, laptops and desktops.
-
product
Checkpoint Security System
ConneCT
The ConneCTTM Checkpoint Security System is an advanced aviation security explosive detection system (EDS) engineered to deliver superior threat detection, dramatically improved passenger throughput, and low total cost of ownership.
-
product
Security Gateways
Schweitzer Engineering Laboratories, Inc.
Security gateways combine cybersecurity capabilities to create secure access paths through security perimeters.
-
product
Global Security Cameras
Our products optimize the reaction time and push the operational envelope!
-
product
Cyber Security Assessment
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
product
E2E Security Connector
The E2E Security Connector is a cloud solution for enhancing the security level of your system. It provides secure generation and management of confidential data during the pre-personalization process of your connected devices as well as different protection schemes for its application and data transportation layer.
-
product
Security & Defence
At Kromek we design, develop, produce, and distribute products and solutions for the Security & Defence sectors, including, but not limited to defence, border control, homeland security and emergency services.
-
product
Security & Search Systems
Discreet and robust gamma radiation detector, specifically designed for law enforcement and first responders to interdict nuclear and radioactive materials.
-
product
Quantum-Safe Security
CN9000 Series
The Centauris CN9000 Series is the first commercially available certified high-assurance 100Gbps Ethernet encryptor that supports the most complex fully meshed topologies – enabling 100% security for Big Data, Cloud and data centre services’ ultra-fast networks.
-
product
Cyber Security & Intelligence
We are a leading supplier of cyber, intelligence, and security capabilities to government agencies, and a growing supplier of cyber and network security capabilities to commercial customers.
-
product
Security Testing Service
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
product
Net Radiation Measurement
NR Lite2
The design of the NR Lite2 is unique. The detector is based on a Teflon coated, weather resistant black conical absorber. In contrast to other sensor designs, NR Lite2 requires no fragile plastic domes. This results in a virtually maintenance free design. The vertical stick prevents birds from affecting the output signal.
-
product
Security Consulting
Our Managed Security Services can dramatically improve your ongoing security posture through more frequent, cost effective security assessments, helping you to identify, assess and manage risk.
-
product
Security Labs Community Edition
*Hack and Patch Real Applications- Get hands-on experience with top vulnerabilities and see the fix impact in a live app, in real-time.*Level-Up Your Coding Approach- Add secure coding to your list of skills by fixing issues that you face regularly, in the languages you’re most comfortable with. *Complete Labs in Minutes- With labs under 10 minutes, you can learn fast and gauge your progress in real-time for quick feedback.
-
product
Security intelligence & analytics
Detect and prioritize threats that pose the greatest risk. dentify high-risk threats with near real-time correlation and behavioral anomaly detection. Detect vulnerabilities, manage risks and identify high-priority incidents among billions of data points.Gain full visibility into network, application and user activity.
-
product
NET Unit Test Runner And Code Coverage Tool
dotCover
JetBrains dotCover is a .NET unit test runner and code coverage tool that integrates with Visual Studio. Make sure you know to what extent your code is covered with unit tests. dotCover calculates and reports statement-level code coverage in applications targeting .NET Framework, Silverlight or .NET Core.
-
product
Security Testing Service
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
product
Network Security Testing
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
product
Pull tester for security testing
SAFOR 2000
The Safor portable tester is an accurate unit, designed for testing the pulling force of fixings prior to being put into service. Easily prevent accidents by testing on site the fixings to install end brackets and safety harness eyebolts.
-
product
100GbE Application and Security Load Module
PerfectStorm 100GE 1-Port Load Module
Keysight Network Applications and Security
PerfectStorm is a highly modular hardware test platform enabling equipment providers, service providers and enterprises the ability to create real-world, high-stress conditions and user behavior to push new equipment and networks to their limits.
-
product
Application Security Platform
Sentinel
WhiteHat Sentinel is a Software-as-a-Service (SaaS) platform that enables your business to quickly deploy a scalable application security program across the entire software development lifecycle (SDLC). Combining advanced scanning technology with the world’s largest application security research team, we accurately identify your vulnerabilities and scale to meet any demand without slowing you down.
-
product
Cloud Security Testing
Using a cloud infrastructure is no more a new phenomenon in the digital world. Businesses use it as a basic practice now a days due to numerous benefits associated with it. Hence, it should be a top most priority for the businesses to secure their cloud infrastructure as that’s the nucleus of their business from all aspects. In cloud security testing, the cloud infrastructure is screened to identify security risks and the areas which can be exploited by the attackers. Cloud security testing is mainly performed to ensure that cloud infrastructure can protect the confidential information of an organization. QA Mentor adopts three different approaches during the cloud security testing process:
-
product
Airspace Security Platform
DroneTracker
The airspace security platform that detects, classifies, and mitigates all drone threats. DroneTracker aggregates sensor information about potential threats, recognizing and classifying drones of all kinds. Its web-based interface shows live threats, real-time drone flight paths, and records forensic details including video evidence. The RF Sensor detects drones and remote controls by their radio frequency (RF) signatures.
-
product
Visible PTZ Security Cameras
Quasar™ 4K IR PTZ Cameras
With crisp 4K video resolution, on-board long-range IR illumination, and 22x or 31x optical zoom options, FLIR Quasar™4K IR PTZ cameras deliver critical situational awareness. Exceptional field of view gives operators the ability to seamlessly monitor key details throughout large areas. The combination of high-performance optics and sensors, exceptional low light visible imaging, and effortless integration with all major third-party VMS and FLIR United VMS makes Quasar 4K IR PTZ cameras an ideal solution for critical infrastructure sites and remote facilities that require close monitoring.