1~18 item / All 18 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~18 item / All 18 items
The "Virsec Security Platform" protects workloads and enterprise applications from dangerous cyber attacks that evade traditional security tools, securing them from within. It safeguards applications across various platforms from servers to the cloud, providing speed and accuracy while reducing noise and false alarms. Built on Trusted Execution technology, this technology ensures that business-critical applications are not compromised by performing detailed analysis of newly added programs through defenses at the memory and CPU levels. 【Features】 ■ Protection from zero-day attacks ■ Protection of database transactions ■ Defense against advanced threats ■ Detection of brute force attacks ■ Continuous policy-based authentication *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"TOPIA" is a vulnerability management tool developed for CISOs, MSSPs, and IT administrators. By consistently automating and managing challenges, it reduces the soaring labor and equipment costs associated with cybersecurity measures. With "Patchless Protection" and "Binary-Level Threat Detection," it protects assets from "Zero-Day" attacks. 【Features】 ■ Automatic application recognition and binary-level threat analysis ■ Patchless vulnerability management ■ Prediction and detection of "Zero-Day" attacks, protection of agents ■ Adding context to risk management processes ■ Prioritization through xTags' "Contextual Scoring" ■ Asset threat prioritization and analysis *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"ThreatQ" is a threat intelligence platform designed to enable the operation and management of threats. It is designed to provide SOC analysts with a platform to manage and enhance threat intelligence. It minimizes the time spent on manual tasks and reduces operational burdens, allowing analysts to focus on higher-priority threats through automation. 【Features】 ■ Build an effective and efficient SOC ■ Save time and costs ■ Deepen intelligence and capabilities to protect the organization ■ Intelligent security operations and response *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"insightVM" is a vulnerability scanner for IT security management that has been certified by NIST under the USGCB (U.S. Government Configuration Baseline). By using this product, you can build a vulnerability management environment based on true risk for your company. Additionally, by using the penetration testing tool "Metasploit," the time spent on vulnerability management is reduced, which helps lower your security-related costs. With "insightVM" and "Metasploit," all customers can obtain accurate and practical solutions for addressing threats and risks. 【Features of insightVM】 - Equipped with the "Real Risk Score" function that scores based on four elements - Significantly reduces management workload compared to using other products - Fewer false positives and missed detections - Vulnerability database updated daily - High-priority vulnerabilities are reflected in updates within 24 hours *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"Picus" is a continuous security validation software that enables automated cyber threat simulation and mitigation. Using samples of new threats, it continuously challenges customers' preparedness against emerging threats and identifies the strengths and weaknesses of security measures in real-time. It helps users maximize their security investments. 【Features】 ■ Challenges security technologies ■ Identifies security gaps ■ Maximizes security infrastructure ■ Operational efficiency *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "SecDevice HERCULES" is an innovative testing platform designed to ensure that developed IoT/IIoT devices comply with security standards, equipped with necessary vulnerability testing features. It supports EDSA CRT and VIT as specified in IEC 62443 and ISA-99, as well as the de facto standard for web application vulnerability testing, OWASP TOP10 2017. By implementing this product, multiple testing tools become unnecessary, allowing for the immediate establishment of a vulnerability testing environment that meets security compliance. 【Features】 ■ Covers major vulnerability tests ■ Compatible with various IoT/IIoT devices ■ Automation of vulnerability testing ■ Automatic packet capture and storage function ■ Automatic target detection function *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationUntil now, it has been difficult to gain comprehensive and real-time visibility into the status of ICS networks, devices, and processes. Using 'Guardian', we protect control networks from cyberattacks and operational disruptions, providing visibility into operations by quickly detecting cyberattacks and process anomalies. The new insights offered by this product help improve cyber resilience, reliability, and safety. 【Benefits of Implementation】 ■ Rapid detection of cybersecurity threats and incidents ■ Quick identification and remediation of operational anomalies ■ Time savings and avoidance of regulatory compliance fines ■ Reduction in troubleshooting and remediation efforts ■ Tracking industrial assets and their corresponding cybersecurity risks ■ Easy monitoring of remote sites from a central location *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"PerfectStorm ONE" is a load testing device equipped with a cutting-edge new engine boasting industry-leading traffic generation capabilities and performance. It can simultaneously generate mixed traffic with over 360 types of L7 protocols and more than 37,000 live security attacks on the same port. Application and security load testing of up to 40Gbps can be conducted simultaneously on the same port. 【Features】 ■ 60 million simultaneous TCP session capacity ■ Updates of over 37,000 new security attacks 2 to 3 times a month ■ Security fuzzing tests are also possible ■ Cost reduction through rapid network environment setup ■ Five preset levels according to security levels ensure robust attack defense after testing *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe network emulator developed by iTrinegy utilizes network monitoring technology to emulate various internet environments. When web, voice, and video are communicated over lines such as mobile, cloud, and satellite, it is crucial to understand the performance experienced by users. The "INE series" verifies performance in internet environments and eliminates factors that could lead to performance degradation in advance. With a rich lineup that meets customer needs, including "NE-ONE," which allows for delay settings in nanoseconds, and "INE Enterprise/INE Ultra." 【Benefits of Implementation】 ■ Reduces performance issues after release, contributing to a decrease in improvement workload ■ Contributes to a reduction in troubleshooting workload ■ Contributes to the efficiency of development and testing ■ Contributes to the enhancement of development capabilities *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationFox-IT's "Data Diode" complies with the North American Electric Reliability Corporation's critical infrastructure protection cybersecurity standards and has received numerous certifications, including NATO SECRET level and the "green scheme," earning trust from international organizations and governments worldwide. It provides complete protection against confidential data leaks that cannot be prevented by traditional firewalls, IPS, or UTM. By converting bidirectional IP communication into unidirectional communication "at the hardware (physical layer)," it completely blocks hacking from external sources. It has received security certification under CC (Common Criteria) EAL 7+ and has already built a strong track record in preventing confidential data leaks in over 40 countries. 【Features】 ■ Complete protection against confidential data leaks that cannot be prevented by traditional firewalls, IPS, or UTM ■ Guarantees unidirectional communication through simple hardware ■ Certified for security under CC EAL 7+ ■ Completely blocks external hacking by converting to unidirectional communication at the hardware (physical layer) *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"Reveal(x)" utilizes new AI and ML technologies to dramatically reduce the time required for incident response and security measures through visible performance, advanced behavior analysis, and automated investigation. Unlike traditional solutions that merely flag potential issues, it accelerates security operations using a "3-in-1 workflow" that automates "discovery, correlation, and investigation." By identifying encrypted traffic, rogue nodes, IoT devices, and BYOD systems at the moment they communicate on the network, it eliminates blind spots and reveals issues and threats in the environment before they impact the business. **Features** - Automatically discovers and classifies all connected devices - Makes it easy to pay special attention to critical assets such as databases - Analyzes over 40 protocols and decrypts SSL and PFS traffic - Provides access to a complete set of L2 to L7 data for transactions, including context and inter-layer dependencies for a single event *For more details, please refer to the PDF document or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "Endace Analytics Platform" is an integrated platform that dramatically reduces response effort through innovative architecture. It features powerful hardware capable of capturing packets at speeds of up to 40Gbps with 100% packet loss prevention, while also being able to host commercial tools for security threat detection, IDS, NPM, APM, and more internally. This unique and innovative solution is trusted by many companies, including those in finance, telecommunications, large enterprises, and web business operators. 【Features】 ■ Dramatically reduces response effort through innovative architecture ■ Capable of capturing packets at speeds of up to 40Gbps with 100% packet loss prevention ■ Can host commercial tools internally ■ Improves the resources of network devices ■ Provides accurate and complete NetFlow data *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationToday's cybersecurity environment is filled with sophisticated bot automation programs that engage in fraudulent activities by hackers, unscrupulous competitors, and scammers. Automated threats and malicious bots attack businesses day and night in many ways, including the misuse of account credentials, payment card holder information, and causing application service denial. Distil Networks defends online applications from web scraping, attacks, exploitation, and misuse of websites and APIs that cannot be prevented by simple plugins, such as those that block various bot issues included in the OWASP Automated Threat Handbook. 【Features】 ■ Blocks 99.9% of malicious bots without affecting users ■ Proactively predicts bot activity ■ Analyzes over 200 attributes of information from each client request ■ Device-based rate limiting and predictive analytics *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "D3 Security Platform" builds and orchestrates incident response/case management plans, integrates with third-party technologies, and provides a hub for applying data-driven decisions across incidents, investigations, and enterprise-wide risk visions. This technology serves as a backbone for managing events filtered by all security tools from start to finish and functions as the "System of Record" (SoR) for all threat investigations. 【Incident Response Module Features】 ■ Ready-to-use NIST/SANS standards-based playbooks ■ Advanced notification settings to improve SOC communication ■ Granular access controls and audit trails ■ Tracking of timestamps for all actions within the system ■ Deployment options for SaaS or on-premises *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "CTS-NTG Series" is a high-speed network traffic generator suitable for performance evaluation of cyber ranges and various security solutions and devices. It utilizes real threats derived from extensive and ongoing research on the internet, enabling the reproduction of realistic cyber attack scenarios in 21 types of single vector forms, as well as advanced multi-vector scenarios. By comprehensively verifying the performance, stability, and security of organizations and network infrastructures from various angles, it facilitates long-term defense against the increasingly powerful cyber attacks of the future. 【Features】 ■ Compatible with network traffic generators ■ Compatible with cyber ranges ■ Robust enough to be mounted in military racks ■ High-speed traffic generation ■ Protection of sensitive data in secure metal appliances *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "RPS-24" is an automatic switching switch for L2/3 switches and routers. Unlike software-based "route changes" such as spanning tree, the switching is performed using mechanical "latching relays," ensuring reliable backup. Even if the power goes out, the connection is maintained. Additionally, we offer the manual and IP-controlled A/B switching switch "IPS-16/32," which also supports 100G optical interfaces. 【Features】 ■ Backup solution ■ Unmanned operation possible with automatic switching ■ Local and remote control ■ Backup device failure detection through constant monitoring of A and B ports ■ Compact size (supports 24 channels in a 1U chassis) *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"CORE IMPACT" is a penetration testing tool that visualizes the effectiveness of security measures for various IT assets. It simulates attack patterns executed by crackers and demonstrates whether IT assets with security measures can truly defend against them. By considering and understanding security measures from the attacker's perspective, it becomes possible to recognize what should be done next and what is lacking, thereby reducing unnecessary investments in security measures. 【Features】 ■ Over 3,000 types of exploit codes ■ High operability achieved through a dedicated GUI ■ Capable of conducting penetration tests on control systems ■ Equipped with an industry-leading automated web application testing engine ■ A wide variety of reporting functions to implement correct vulnerability remediation measures *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe Fiber series converters/repeaters support multi-rate capabilities, accommodating SONET/SDH, Fiber Channel, and video interfaces (SDI/HD-SDI, DVB-ASI), making them applicable to various needs. The CDR (Clock Data Recovery/only for dual modules) function enables relay with a single module, which was impossible with conventional converters, allowing for cost-effective and reliable long-distance transmission of various lines.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration