Filter Results By:
Products
Applications
Manufacturers
Application Security Testing
assures web application vulnerabilities are identified.
See Also: Penetration Testing
- Canden Products LLC
product
Stability Testing Chamber - Double Door Model
Q20
Canden stability testing chamber is capable of maintaining stable temperature set points of 25°c , 30°c & 40°c and corresponding relative humidity set points of 60%RH(@25°c), 65%RH(@30°c) and 75% RH(@40°c) with exceptional precision. The chamber has a wide operating temperature range of 18°c t to 40°c maintaining a stable temperature across the entire range. This chamber provides outstanding stability testing performance for manufacturers of pharmaceuticals, biologics, food, and personal care products. Canden stability chambers’ performance meets ICH Q1A general case guidelines for pharmaceutical stability testing.
-
product
Cybersecurity Penetration Testing Assessments
Tripwire Professional Services
Organizations do all that they can to protect their critical cyber assets, but they don’t always systematically test their defenses. Penetration tests—otherwise known as pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems. Whether we are testing an application or network environment, Tripwire’s pen testing will not only identify vulnerabilities, but it will also demonstrate them through exploitation—definitively determining if unauthorized access or other malicious activity is possible.
-
product
Veracode Analysis Center
Innovating through software holds many promises, but it can also create some major operational headaches. Without a holistic approach to application security, teams often lose valuable time onboarding, learning, and managing multiple AppSec tools that don't “play well” together. Various testing methods, metrics, and dashboards provide incomplete views of activity, and security teams often struggle to maintain control and understand overall risk.
-
product
Mobile Application Security
ImmuniWeb®
ImmuniWeb® Mobile is a part of ImmuniWeb Application Security Testing Platform dedicated to comprehensive security testing of mobile applications. Based on proprietary machine-learning SAST and DAST mobile application testing technology, it also provides thorough testing of the mobile backend.
-
product
Web Application Penetration Testing
Web Application Penetration Testing – to identify, analyze, and report vulnerabilities in a given web application. LGMS adopts a robust technology and process-based approach supported by a well-documented methodology to identify potential security flaws in the web application and the underlying environment.
-
product
Dynamic Analysis
DAST
Dynamic application security testing at the scale and speed modern enterprises need. WhiteHat™ Dynamic rapidly and accurately finds vulnerabilities in websites and applications, with the scale and agility you need to identify security risks across your entire application portfolio.
-
product
Business Application
Business Application testing encompasses verification and validation services to support Quality Assurance and Control of business applications. Application testing ensures that all aspects of the application like its functionality, integration, performance, security, and usability are working as expected.
-
product
Security Testing Services
You're building more-complex software faster than ever before, but does your team have sufficient application security skills and resources to test it for security defects? Synopsys security testing services provide continuous access to security testing experts with the skills, tools, and discipline needed to cost-effectively analyze any application, at any depth, at any time.
-
product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 1GE/10GE Appliance
Keysight Network Applications and Security
PerfectStorm ONE facilitates network and security proof-of-concepts (POCs) and assessments, all in a compact device. This POC-in-a-box enables enterprises and service providers to select optimal devices and right-size data centers, as well as providing device vendors with a platform to fully showcase their product’s performance, resiliency, and throughput under realworld traffic loads.
-
product
Seeker Interactive Application Security Testing
IAST
The industry's first IAST solution with active verification and sensitive-data tracking for web-based applications. See how Seeker helps development, QA, DevOps, and security teams automate the security testing of modern web applications and services.
-
product
Veracode Platform
ChongqingTop Oil Purifier Manufacture Co., Ltd.
The Veracode Continuous Software Security Platform contains all of the application security testing types you need in one place – static analysis, dynamic analysis, software composition analysis, and manual penetration testing – ensuring that you have a comprehensive view of your risk from design through deployment.
-
product
Spirent SecurityLabs
The Spirent SecurityLabs’ services are structured to produce high-impact results with minimal impact on the client organization. Our dedicated teams of experienced security professionals offer comprehensive scanning, penetration testing and monitoring services for networks, applications and devices, as well as source code analysis.
-
product
CMOS Image Sensor
CIS
CMOS Image Sensors (CIS) allow multiple camera functions in mobile devices, automobiles and security systems. Nidec SV Probe provides both standard and advanced versions of our CIS cards employing a wide variety of materials ensuring a durable cost-saving solution that can meet the fine pitch and multi-dut challenges of these devices. Other features and benefits include: • Proprietary AC™ Alloy Probes • Reduced Damage Under the Pad • High Frequency Capability • Better Alignment StabilityOur advanced CIS card, the Multiplexer™, is offered specifically for high density and high parallel applications. The Multiplexer™ is built with cantilever needles held into place on one side and shorter AC™ probes on the other which leads to a more stable electrical characterization over other CIS probe card options.Contact your Nidec SV Probe Representative so we can help you find the right CIS product for your testing needs.
-
product
Cameras
IRCameras is a subsidiary of Santa Barbara Infrared, a long-time leader in the design and manufacture of electro-optical (E-O) test instrumentation. SBIR, in turn, is part of HEICO Corporation, a technology-based aerospace company that’s been engaged in niche market segments within the aerospace, aviation and electronics industries for more than 40 years. Together we are uniquely positioned to advance development of thermal imaging technologies, and to commercialize these technologies for a wide range of applications including: nondestructive testing, predictive maintenance, online process monitoring and control, scientific research, target signature, security and surveillance and many more.
-
product
Memory Products
The electronic systems we use today require some form of memory for data and software storage. As a leading supplier of high-quality memory products, we offer a broad portfolio of serial EEPROM, serial EERAM, parallel EEPROM, OTP EPROM, serial Flash, parallel Flash, serial SRAM, NVSRAM, and CryptoMemory® security ICs to meet your memory needs. We also offer the industry’s first commercially available serial memory controller for use in high-performance data center computing applications. Our extensive testing protocols have ensured industry-leading robustness and endurance along with best-in-class quality to provide you with reliable products, dependable technical support and a consistent supply of devices throughout your product’s lifecycle.
-
product
Application Penetration Testing:
Penetration testing (or pen testing) is a simulated security exercise in which ethical hackers attempts to exploit the vulnerabilities of an application system (web or mobile). The objective of this exercise is to identify any possible loopholes present in the system’s defence mechanism which the real hackers could take advantage of. QA Mentor practices the following stages while exercising this:
-
product
Security Testing Service
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
product
PCIe Mono Industrial Camera
CMOSIS CMV2000
2K camera Applications: In-situ optical inspection camera, fast process capturing, e.g. Golf club swings, Intelligent Transportation Systems (ITS), Open road tolling and Traffic monitoring, Industrial Automation, Machine Vision, Facial Recognition, Motion Capture, Automotive crash testing, OCR/ OCV, 3D scanning, Robotic Arms, Material and Life science Microscopy, Ophthalmology and Retinal imaging, Medical Imaging, Flat panel inspection, Dental, Kiosks, Security, Biometrics
-
product
PCIe Color Industrial Camera
CMOSIS CMV4000
2K camera Applications: In-situ optical inspection camera, fast process capturing, e.g. Golf club swings, Intelligent Transportation Systems (ITS), Open road tolling and Traffic monitoring, Industrial Automation, Machine Vision, Facial Recognition, Motion Capture, Automotive crash testing, OCR/ OCV, 3D scanning, Robotic Arms, Material and Life science Microscopy, Ophthalmology and Retinal imaging, Medical Imaging, Flat panel inspection, Dental, Kiosks, Security, Biometrics
-
product
Telecom, Embedded Hardware-S/W Systems
Network Penetration Testing is a technique that identifies security vulnerabilities in the application by applying different malicious processes to break network security.
-
product
RX Tester
FC5000 Series
The Aceco FC5001 is a two-way FM radio tester that has the ability to lock automatically and almost instantly on to any FM signal within its frequency range. FM signals are demodulated and output it through its internal speaker or external earphone. The high sensitivity to nearfild signals makes it ideal for RF security, counter-surveillance and radio communication testing applications. Supplied as a complete with internal NiCd pack, AC wall charger, VHF/UHF flexible antenna and audio earphone.
-
product
X-ray Windows
X-ray devices have become ubiquitous in the marketplace. The X-ray device market is divided into Portable and Stationary product types. The Market is also divided by technologies like Analog, Computed Radiography (CR) and Digital Radiography (DR). The Digital Radiography market is further segmented into Flat Panel Detectors (FPD) and High Density Line Scan Solid State Detector. The applications include at a minimum; Medical, Non-Destructive Testing, and Security Detection has driven the rapid spread of X-ray instruments including a myriad of handheld devices.
-
product
Cyber Security Testing Services
Cyber security testing is often also referred to as pen testing or penetration testing. Such tests validate the cyber security defences of your applications, network infrastructure and even your team members. Our cyber security testers are highly trained and certified ethical hackers.
-
product
Security Testing Services
By testing the flaws in software, our security testing services seek to remove vulnerabilities before the software is deployed or purchased. By focusing on the different layers of an information system across the database, infrastructure, network, and access channels such as mobile, security testing looks at making the applications free from vulnerabilities. We assist online service providers, website owners, and independent software vendors to manage application security risks. We offer a comprehensive range of white, grey, or black-box model security testing based on your stage in the development cycle.
-
product
Virtualized Security Resilience Testing
BreakingPoint VE
Keysight Network Applications and Security
Ixia BreakingPoint Virtual Edition (VE) provides real-world application and threat simulation for complete performance and security testing, and its elastic deployment model allows you to achieve security resilience without sacrificing scalability or flexibility.
-
product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 10GE/40GE Appliance
Keysight Network Applications and Security
Building upon the terabit-scale PerfectStorm platform, PerfectStorm ONE™ appliances offers enterprises, service providers, and technology vendors a revolutionary solution for generating stateful applications and malicious traffic, simulating millions of real-world end-user environments to test and validate infrastructure, a single device, or an entire system.
-
product
Penetration Testing Services
All web and mobile applications are vulnerable to attack. You are going to get hacked – it's not "if", it's "when." Before it happens, you want to make sure you have a mature security system in place. Our specialists in software security testing have a background in IT and software development, know different types of exploits, and have experience in performing thousands of pen tests. We get hired to hack into systems and determine weaknesses.
-
product
Security Testing Service
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
product
Security Testing
As the cyber world is becoming more-and-more vulnerable to attacks, security of enterprise & customer data and application availability are key concerns for enterprises. Any security breach can have wide-spread and far-reaching impacts including loss of customer trust and legal repercussions. To avoid this situation, we recommend security testing for your application.
-
product
Application Security Testing Solution
CxIAST
CxIAST provides dynamic vulnerability detection without impacting development cycle times. Unlike other application security testing solutions, CxIAST delivers results in zero time, making it a flawless fit for DevOps and CI/CD environments. CxIAST fills the critical application security gap by continuously monitoring application behavior and finding vulnerabilities that can only be detected on a running application.
-
product
API Security Testing
In the world of digital civilizations, use of API is getting popular increasingly as a technology enabler and it connects various applications and micro-services through end points. Hence securing these end points are quite critical for businesses to protect the confidential data. QA Mentor uses the concept of API Fuzzing by providing random data to the target API until any unexpected behaviours or errors are observed. In addition, QA Mentor uses other applicable methods of API security testing like SQL Injection on target API, tampering of API parameters etc. We follow a strict 10 pointer checklist in our API software security testing services process to ensure better coverage: