IP Security
-
Product
Visible Security Cameras - Dome Cameras
-
Teledyne FLIR Visible Security Cameras - Dome Cameras
-
Product
Secure NFC
-
Mobile security is expanding from the largely deployed SIM technology to the growing NFC, embedded Secure Element (eSE) and embedded SIM (eSIM) technologies in smartphones, tablets, wearables, and laptops. ST provides an exhaustive offer of NFC and eSE/eSIM products to address secure mobile transaction applications such as secure connectivity, payment wireless charging and automotive: from the state-of-the-art ST21NFC to the ST54 integrating the widely deployed ST33.
-
Product
Standalone ASI To IP Converter
DTE-3120
-
DekTec's standalone power-over-ethernet enabled ASI to IP Converter, allowing zero-jitter transmission of Transport Streams to IP networks.
-
Product
Enterprise-Scale Application and Security Testing
PerfectStorm ONE 1GE/10GE Appliance
-
Keysight Network Applications and Security
PerfectStorm ONE facilitates network and security proof-of-concepts (POCs) and assessments, all in a compact device. This POC-in-a-box enables enterprises and service providers to select optimal devices and right-size data centers, as well as providing device vendors with a platform to fully showcase their product’s performance, resiliency, and throughput under realworld traffic loads.
-
Product
PCIe End Point IP Core
-
The Arasan PCI Express End Point is a high-speed, high-performance, and low-power IP core that is fully compliant to the PCI Express Specification 1.1 and 2.0. The IP core is designed for applications in computing, networking, storage, servers, wireless, and consumer electronics. The feature-rich IP core is highly configurable that allows a target design to be implemented with the least number of gates and highest performance.
-
Product
Radio over IP Testing
-
The transmission of data over the new generation of digital radio communications is proving increasingly popular with the emergency services, government, security, transport, construction, exploration, utilities and military sectors. However, RoIP/IP over Radio systems are frequently deployed in extremely challenging conditions such as natural disasters, storms, blackouts, difficult terrains (mountains, tall buildings) etc. Therefore, it is imperative that such systems are thoroughly tested prior to live deployment to ensure they will work effectively in potentially “life or death” situations.
-
Product
OEM Module For Conversion Between IP And ASI
DTM-3200-RA
-
The DTM-3200 converts IP to ASI, or ASI to IP. Integrate this compact module to extend the range of I/O standards supported by your product. Technical highlights include advanced IP-jitter filtering, ultra-low latency and zero-jitter IP transmission.
-
Product
Cloud Security Testing
-
Using a cloud infrastructure is no more a new phenomenon in the digital world. Businesses use it as a basic practice now a days due to numerous benefits associated with it. Hence, it should be a top most priority for the businesses to secure their cloud infrastructure as that’s the nucleus of their business from all aspects. In cloud security testing, the cloud infrastructure is screened to identify security risks and the areas which can be exploited by the attackers. Cloud security testing is mainly performed to ensure that cloud infrastructure can protect the confidential information of an organization. QA Mentor adopts three different approaches during the cloud security testing process:
-
Product
Foundation IP
TSMC
-
Our Foundation IPs embed power management features (multi-Vt/multi-channel libraries, multi-VDD characterization, integrated power-switches, source-biasing…) which allow designers to explore the SoC architecture. Optimal configurations can be generated to meet the application’s Performance, Power and Area constraints. We also complement our offering to reach best-in-class Energy Efficient SoC by serving Always-On power-domains with a dedicated offer, optimized to achieve the ultra-low-power requirements of battery-operated devices in sleep mode.
-
Product
Quad ASI To IP Conversion Module
DTM-3224
-
The DTM-3224 is a highly-integrated and cost-effective OEM module for converting four ASI transport streams to IP. The next-generation architecture of this device has support for IPv6 and for IGMP v3, enabling source-specific multicast.
-
Product
3U VPX Virtual Secure Router
VSR347D
-
The VSR347D takes advantage of Abaco’s SBC347D hardware with an optimized environment running Juniper Networks’ vSRX Virtual Firewall, providing high levels of network security and performance in a single 3U VPX slot.
-
Product
Security Labs Community Edition
-
*Hack and Patch Real Applications- Get hands-on experience with top vulnerabilities and see the fix impact in a live app, in real-time.*Level-Up Your Coding Approach- Add secure coding to your list of skills by fixing issues that you face regularly, in the languages you’re most comfortable with. *Complete Labs in Minutes- With labs under 10 minutes, you can learn fast and gauge your progress in real-time for quick feedback.
-
Product
Fixed Surveillance System for Perimeter Security
Argus
-
Argus is a fixed, rugged, preconfigured wide area surveillance system. Combining a best-in-class radar and thermal camera with Command and Control software, Argus is designed to detect and track multiple threats both near and far in the most demanding weather conditions 24 /7. When compared to other perimeter security solutions, Argus has the lowest initial cost per kilometer of secured space as well as the lowest lifetime cost.
-
Product
PXI 32 Chan I/O Parallel I/P Prog Threshold
40-412-111
Digital I/O Module
A 32-channel Digital I/O module with high output voltage and currentcapability and a dual variable threshold input. Each of the 32 channel outputs can be used to drive the output high or low usinga high current capacity drive capable of sourcing 0.4A from the high side or 0.5Asink on the low side for each channel. The module is available in two versions witheither serial or parallel capture of the input levels.
-
Product
Day/Night IP Surveillance Camera
ENVIROMUX-IPCAM-N
-
View and control the camera from the ENVIROMUX web interface, the camera web interface, included software, or with a compatible cell phone. With the ENVIROMUX-2D/5D/16D, a triggered snapshot can be forwarded in alert e-mails. A snapshot can be triggered by any programmed event (motion detection, door open/close, glass break, smoke, liquid detection, etc.). Image sensor: 1/4" progressive scan CMOS sensor. Video Streaming: simultaneous Motion JPEG and MPEG-4. Frame rate: 30fps at 640x480 (VGA) resolution. Lens: F2.0, 4.3 mm (0.17 in), 12 infrared LEDs for night vision. RJ45 connector. Wireless models: wireless IEEE 802.11 b/g up to 54 Mbps. Regulatory approvals: CE, FCC, RoHS.
-
Product
Open Source Service to Help Secure and Trust Your Software
Community Attestation Service / CAS
-
- CAS stores all signatures inside of immudb, the standard for open source immutable databases.- CAS is protected against tampering. All attestation data is integrity-checked and cryptographically verified by the CAS client.- CAS is also protected against MITM attacks. The public key below is checked by every communication.A Software Bill of Materials (SBOM) is a list of components in a piece of software.Like a list of ingredients on food packaging -- where you might consult a label to avoid foods that may cause an allergy -- SBOMs can help companies avoid use of software that may harm their organization.If defects are later found in a specific part, the SBOM makes it easy to locate affected products.
-
Product
IP Camera Onvif Cloud P2P
-
Sylo Vision Technology Co., Limited
An Internet protocol camera, or IP camera, is a type of digital video camera commonly employed for surveillance, and which, unlike analog closed circuit television (CCTV) cameras, can send and receive data via a computer network and the Internet.
-
Product
Rapidly Compile Networks For Implementation On Lattice SensAI IP Cores
Neural Network Compiler
-
Analyze networks for fit in the chosen number of engines and allocated memory. After compilation, simulate networks for functionality and performance prior to testing in hardware. Graphical display of networks supports analysis and understanding.
-
Product
High Core Density 2U Network Appliance With Security And Acceleration Features Ready. Ideal For Network Security And Crypto Acceleration Workloads.
FWA-6080
Network Appliance
Single AMD EPYC™ 7003 Processors, up to 64 Cores16 x DDR4 ECC RDIMM slotsHot-swap 2.5" disk bays and system fan, redundant PSU, 2 x HH/HL Gen4 PCIe x16 slotIntegrated security features with secure boot, memory encryption, and virtualizationIPMI v2.0 compliant, with web interface8 x Advantech network module expansions w/ PCIe Gen4 bandwidth
-
Product
Quantum-Safe Security
CN4000 Series
-
The CN4000 series are the ideal optimized, high-performance encryptors for Small to Medium Enterprises (SME). They also enable an ideal cost effective “encrypt everywhere” solution for Large Enterprises. Despite their small form-factor, the CN4000 Series encryptors have the same robust security credentials as the rack-mounted models.
-
Product
4x4 HDMI Matrix Switch with RS232 and IP Control
HSM-I-04-04
-
4x4 HDMI matrix switch with RS232 and IP control. Supports HDCP, deep color, multi-channel digital audio (up to 7.1 channels), and may be used with any combination of DVI (PC) or HDMI (HDTV) sources and displays.
-
Product
Intelligent Chatbot for Network Security Policy Management
AlgoBot
-
AlgoBot, is an intelligent chatbot that handles network security policy management tasks for you. AlgoBot answers your questions, submitted in plain English, and personally assists with security policy change management processes – without requiring manual inputs or additional research.
-
Product
Hybrid Network Security Policy Management
AlgoSec Cloud
-
Across cloud, SDN, on-premises and anything in between - one platform to manage it all.
-
Product
Network Security
TrustMonitor™
-
TrustMonitor™ provides continuous monitoring of the trust network by:*(Analyzing content & constraints for validity of credentials*Monitoring that certificate authorities are available to support validation*Easily scaling to incorporate new certificate authorities (no agent required)
-
Product
NAND Controller IP
ONFI
-
Arasan is the leading supplier of mobile storage IP and its products are used by most first tier memory suppliers. Arasan's deep experience with NAND flash memory interfaces and mobile storage standards began in 2001 when it joined the SD Association and shipped industry first SD card IP in 2003. Arasan is a current member of ONFI and JEDEC.
-
Product
Full-HD Mini Dome Security Camera
FLIR ARIEL™ CM-3202
-
The Ariel CM-3202 mini dome camera offers 1080p video and fast frame rates in high-motion, low light scenes. True wide dynamic range (WDR) on the CM-3202 captures sharp video in complex environments, such as critical infrastructure sites, commercial offices, and large campuses. With a strong H.265 built-in motion processing architecture, the Ariel CM-3202 mini dome delivers predictable, efficient streaming and storage, reducing utility costs and total cost of ownership (TCO).
-
Product
Develop - Simulate - Validate JTAG / IJTAG based IP
NEBULA
-
You, your vendors and your customers being able to use one common interface to control and observe on-chip IP, resources and instruments. The figure below shows an example IC. The new IEEE 1149.1-2013 standard supports an init-data register for configuring the analog paramaters of I/O as well as controlling on-chip PLLs. The standard further extends this by defining in BSDL user test data registers or 'scan chains'. These registers enable the ability of generic software to control and observe mission mode IP and instruments simply by describing the register interface in BSDL.
-
Product
IP + TVI + CVI + AHD+ Analog 5 in 1 Tester
-
*IP+TVI+CVI+AHD+Analog 5 in 1 CCTV. *4.3 inch capacitive touch screen. *Onvif/Hikvision,Duhua,etc more than 80 brand ip camera test.
-
Product
Secure Voice & Data Communications in EURO-ISDN
ELCRODAT 6-2
-
Rohde & Schwarz ELCRODAT products protect voice and data communications in digital and analog armed forces and government networks in all German and NATO security classifications.The ELCRODAT 6-2 is the first encryption unit approved for transmitting information classified as TOP SECRET that uses a public key method for key agreement. Together with the public key method, the noise generator in the encryption unit enables mutual authentication and key agreement. New session keys are generated in the encryption unit for each connection. The keys do not leave the units and are deleted after the session for maximum security.





























