Filter Results By:
Products
Applications
Manufacturers
-
product
Cyber
General Dynamics Global Imaging Technologies
The Cyber Domain crosses and integrates with all domains - Land, Sea, Air and Space. We’re designing, building and delivering data protection products and solutions, and web-based SaaS to rapidly strengthen the mission and help our customers successfully navigate the cyber domain.
-
product
Shoghi Microsites
Shoghi Communications focusing on usage of Strategic Communications solutions, to the defense and government entities worldwide. Our pristine capabilities in the fields of Intelligence Surveillance and Reconnaissance Systems, Electronic Warfare, Cyber Intelligence, COMSEC, Satellite Imaging, Avionics and Trainings, Supports Countries Defense, Space, and Homeland Security agencies
-
product
4x 3U OpenVPX MOSA Data Concentrator Unit
SIU34-DCUVARM-01
SIU34-DCUVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Data Concentrator Unit (DCU) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
Cyber Protection System
Raytheon’s Cyber Protection System enables enterprises to go beyond traditional CSOC monitoring and establish a response center capable of situational awareness, proactive defense and rapid response. Cyber test ranges: Test the cyber resilience of hardware, software, and networks. Penetration/Malware/Forensics Fly Away Kits: Provide mobile environments to perform testing and analysis at remote facilities. Lab environments: Analyze malware, perform penetration testing and conduct forensics at enterprise scale so analysts can determine the best way to manage them.
-
product
6x 3U OpenVPX MOSA Data Concentrator Unit
SIU36-DCUVARM-01
SIU36-DCUVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Data Concentrator Unit (DCU) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
Distributed Control Systems
As the heart of plant-level digitalization, ABB's Distributed Control Systems (DCS) are designed to transform your multi-faceted, 24/7 process operations. Our market-leading control architecture constantly monitors and drives plant productivity, maximizing asset utilization, process efficiency and production quality. A focus on availability, safety and cyber security ensures the protection of your people, assets and equipment. And by maintaining tight controls over raw material consumption, plant energy levels and waste by-products, ABB DCS solutions help to significantly reduce environmental impact.
-
product
Intelligence – Led Penetration Testing
An Intelligence-Led Penetration Test (Intel-led Pentest) closely mimics the tactics and techniques of sophisticated and persistent cyber attackers with the intention of compromising an organization’s critical systems.
-
product
Cyber Forensics
Cyber Forensics deals in safeguarding the digital evidence gathered during the cyber attack, identifying the duration of the attack, and locating the geographical location of the attack followed by mapping them.
-
product
Cybersecurity Penetration Testing Assessments
Tripwire Professional Services
Organizations do all that they can to protect their critical cyber assets, but they don’t always systematically test their defenses. Penetration tests—otherwise known as pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems. Whether we are testing an application or network environment, Tripwire’s pen testing will not only identify vulnerabilities, but it will also demonstrate them through exploitation—definitively determining if unauthorized access or other malicious activity is possible.
-
product
Security Testing Services
Alphabin Technology Consulting
Fortify your digital defenses and enhance the resilience of your systems to safeguard against cyber threats.
-
product
Cyber Security/Network Security Training
Stratign’s Cyber Security/Network Security Training provides cybersecurity professionals with foundational, intermediate, and advanced security skills imparted through experts in the field.
-
product
The Cyberbit Skill Development Platform
Cyberbit is the only platform that delivers the entire cyber skilling spectrum, on-demand, in coherent learning paths, validating your team’s performance and progress along the way.
-
product
FLy-Away Kits
Complete Solutions for Cyber Operations,Transportable Private Cloud, Edge Computing A Fly-Away Kit (FAK) or Expeditionary Kit is a self-contained suite of equipment (hardware and software) for DoD and federal civilian Cyber Protection Teams (CPTs) and forward operations to operate both in tactical (field-deployed) and back-office environments. The FAK suite of cyber tools or cloud/server applications include tools to conduct vulnerability analysis, incident response, and other cyber-analytic functions, and are suitable for operation on both classified and unclassified networks.
-
product
Cyber Drill And Blue Team Exercise Stimulation
LGMS Security Team will approach the Cyber Drill as a simulation of the possible occurrences during a cyber incident. Based on the defined scenario, LGMS Security Team will perform a technical simulation so as to accurately capture the responses of client’s team in responding to such incidents.In order to obtain the best results, LGMS Security Team will only use information that can be obtained either through public information or by any means of deception techniques.
-
product
Cyber Security Assessment
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
product
Cyber Labs
Building your cybersecurity team’s skills starts with foundational building blocks: theory, tools, attacker tactics, soft skills and more. Each of our cyber labs delivers a specific building block to build individual skills in shorter training sessions.
-
product
IoT Devices Penetration Testing
There is a rising concern that IoT devices are being developed rapidly without appropriate consideration of the profound security challenges involved, as demonstrated by the various IoT devices hacked in recent years— automobiles, cameras, children's toys, thermostats, and medical devices.With more than a decade of specialized cyber security testing experience combined with our extensive research and development, we can assess and identify both common and complex security vulnerabilities that may be residing within your whole IoT ecosystem.
-
product
Security Testing
We protect your business from cyber attacksSecure online transactionsPrevent unauthorized accessMinimize the risk of data lossEnhance resistance to DoS attacks
-
product
Mobile Network Monitoring
NetMobility®
The next generation of mobile network monitoring is here. With NIKSUN NetMobility® you gain unparalleled insights into subscriber behavior, carrier services, network health, cyber threats, and application performance to meet a wide range of service provider needs - Performance, Security, Operations, Management, and Planning.
-
product
Satellite Clock
TCG 01-G
The TCG 01-G is a highly accurate, full featured GPS and GLONASS (GNSS) clock. With enhanced cyber security features that support NERC CIP requirements, the TCG 01-G is designed for use in modern day smart grid / smart substations, electricity distribution, transmission, generation protection and control systems. The clock synchronizes multiple IEDs (Intelligent Electronic Devices) within a network, including protection relays and remote telemetry units to enable accurate time stamping. The TCG 01-G supports IEEE 1588 v2 (PTP) and IEC 61850.
-
product
Cyber Security Testing Services
Cyber security testing is often also referred to as pen testing or penetration testing. Such tests validate the cyber security defences of your applications, network infrastructure and even your team members. Our cyber security testers are highly trained and certified ethical hackers.
-
product
4x 3U OpenVPX MOSA Mission Computer
SIU34-MCVARM-01
SIU34-MCVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Mission Computers (MC) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
4x 3U OpenVPX MOSA Actuator Interface Unit
SIU34-AIUVARM-01
SIU34-AIUVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Actuator Interface Units (AIU) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
Red Team Engagement
Red Team Assessment (Red Teaming) is an activity where a group of white hat hackers (or penetration tester) perform a series of activities to assess the company’s security readiness towards real-world cyber threats. Red teaming aims to ‘attack’ an organization’s digital and physical infrastructure to evaluate the organization’s security defense and posture, at the same time targeting to obtain any sensitive and beneficial information. Red Teaming usually emulates several malicious actors to penetrate the organization’s digital and physical infrastructure security.
-
product
6x 3U OpenVPX MOSA Mission Computer
SIU36-MCVARM-01
SIU36-MCVARM-01 is a Modular Open Systems Approach (MOSA) DO-178C & DO-254 Certifiable Mission Computers (MC) with low power high performance OpenVPX Xilinx UltraScale+ SBC with Quad Core ARM Cortex -A53, 8 GB DDR4 SDRAM, 32 GB SATA Flash, 2 x 10/100/1000Base-T Ethernet, USB 3.0, FIPS-140-3 Level 3 Cyber Security, and Single Event Upset support.
-
product
Cyber Security Training
Elbit Systems of America's comprehensive attack scenario library reflects the most recent threat landscape. Our cyber security experts continuously update training scenarios with newly discovered attacks and tactics. Versatile network settings and attack scenarios equip cyber security teams with customized training specific to each team's organization.
-
product
Cloud Security
Cloud Security Assessment is the most critical phase before the product is finally deployed and Product is finally ready to handle real-world cyber security threats.
-
product
Engineering Data Analytics
ESI’s Data Analytics solution platform INENDI is a specialized set of solutions that combines state of the art Engineering Data Analytics and management approaches, intuitive visualization and efficient investigation methodologies to allow for a fast discovery of the unknown in large high-dimensional datasets.With INENDI, ESI brings its long-standing innovative capability and its expertise in designing solutions tailored for professionals who need to solve difficult high-value problems into the Cyber Security market.
-
product
Cyber Security and Digital Data Protection
As security demands evolve, Applied Computer Technologies provides a layered and progressive approach to security. Organizations without a sufficient security footprint are being affected and held ransom, operations disrupted, and business reputations damaged. We've partnered with some amazing and innovative companies to offer our clients the best cyber security and protection available today. Our integrated security products include next generation firewalls; ransomware and crypto malware; secure connectivity; Email, encryption, archiving, and SPAM filtering; Web and content filtering; and data integrity & theft prevention.