Filter Results By:
Products
Applications
Manufacturers
Penetration Testing
1) security check for code exploits. 2) conformal coat pierce test connection. 3) hardness indent.
See Also: Pen Testing, Pentest, Application Security Testing, Conformal Coating, Penetration Hardness, Network Security, Vulnerability, Indenters, Forensics
- Omnicor
product
Network Testing Tools
Network IP traffic packet generators are used for network performance testing under maximum or partial throughput conditions. Network health can be analyzed by network traffic measurement in a testbed network, using an IP network traffic generator such as IP Traffic Test and Measure. The traffic generator sends packets, often with a unique packet identifier, making it possible to keep track of the packet delivery in the network.Network impairment simulation (emulation) is a technique for testing the performance of real applications over a virtual network. The aim is to assess performance, predict the impact of change, analyze impairment conditions or otherwise optimize technology decision-making. Measurements usually focus on simulation of conditions like delay, jitter, latency, dropped packets and limited bandwidth.
-
product
Penetrometers
Penetrometers measure the firmness or hardness of fruit. Penetrometers are ideal for determining the best time to harvest fruit or to test its progress to maturity. The firmness of fruit is one of the most widely used parameters in testing its maturity, together with measuring the fruits sugar content using refractometers. Electronic penetrometers come with different diameter penetration points. This allows for fruit of different size and hardness to be tested. It is important that this first part of the measurement process is done correctly if the readings obtained are to be valid in making adequate decisions as to when the fruit should be harvested. It is important the the samples that are measured are representative of the entire crop, considering a sufficient minimum quantity sample, size and quality.
-
product
High Impact Shock Test System
KRD16 series
High impact shock test system meets MIL-S-901D standard which covers shock testing requirements for ship board machinery, equipment, systems, and structures, excluding submarine pressure hull penetrations. The purpose of these requirements is to verify the ability of shipboard installations to withstand shock loadings which may be incurred during wartime service due to the effects of nuclear or conventional weapons.
-
product
Penetration Testing Services
All web and mobile applications are vulnerable to attack. You are going to get hacked – it's not "if", it's "when." Before it happens, you want to make sure you have a mature security system in place. Our specialists in software security testing have a background in IT and software development, know different types of exploits, and have experience in performing thousands of pen tests. We get hired to hack into systems and determine weaknesses.
-
product
SST Security Assessment
Self-Service Terminal (SST) penetration testing is an activity which identifies vulnerabilities in SST that may potentially exist due to the lack of physical security measures, technical configuration or process controls.
-
product
Penetration Testing Services
We are vendor neutral and platform agnostic. This means that you get unbiased testing and appraisal of any and every environment. We keep a very clear and level head too. We are not fazed by high pressure situations so we can and do advise on incident response- in real-time when needed.CHECK, CREST and Tiger accredited security testing.
-
product
Cyber Security Testing Services
Cyber security testing is often also referred to as pen testing or penetration testing. Such tests validate the cyber security defences of your applications, network infrastructure and even your team members. Our cyber security testers are highly trained and certified ethical hackers.
-
product
Vulnerability Assessment And Penetration Testing
VA&PT
If new web applications are installed into your organization’s network, you have shifted your business physically to another network, or if your site requires IT governance and regulatory compliance, you should opt for Penetration Testing.
-
product
Concrete Strength Testers
This category of products comprises the range of instruments utilized to evaluate construction material strength. The range of instruments is typically considered to be two parts. The first are non-destructive field tests of compressive strength. The second are tensile field tester systems to either determine the tensile strength of an overlay or bond material, or tensile strength of anchors embedded in the concrete. The first group is pure Non-Destructive Testing where the strength of the material is determined by correlation to another parameter more easily available and readily apparent. This is typically the hardness of the concrete or the resistance to penetration by either a pin or probe. The Windsor Probe, Windsor Pin and our line of Rebound Hammers all fall within this category. These are widely used standard tests and as such have seen use throughout the world.
-
product
RFID Fuzzing Tool
NFC Kill
The world's only RFID fuzzing tool. Securely disable RFID badges. Test and harden RFID hardware. Audit access control failure modes. Test and reduce the attack surface for pen-test customers. RFID Penetration testing.
-
product
Masks Particle Filtration Efficiency Tester
Sataton Instruments Technology CO., Ltd
Face masks particle filtration efficiency (BFE) tester is device to determine the particle filter penetration and filtration efficiency for respiratory protective devices and face masks. The tester with particle generator can provide sodium chloride particles and paraffin oil particles. It can measure the particle penetration, filtering efficiency and the breathing resistance delta P. It is widely used in quality control, research and development, certification, manufacturing or testing industry, etc.
-
product
Network Penetration Testing
Metasploit
Network penetration testing (aka pen testing) and timely identification of network vulnerabilities is something every organization needs done before hackers or disgruntled insiders exploit the weaknesses.
-
product
High Strain Pile Driving Analyzer, Pile Testing Machine
SG-PDA
It is a state-of-the-art testing equipment to perform high strain pile bearing testing on piles.It will provide prediction on the pile bearing capacity, pile integrity, driving stresses and hammer performance for a given pile penetration. It is a relative low cost type of pile testing compared to static load test (MLT or CRP). The testing technique is quick and accurate.It can also be used to perform high strain pile bearing monitoring to evaluate pile driving information for pile bearing capacity, pile integrity, driving stresses and transferred energy against pile penetration. The results are essential for the actual pile driving process and to obtain valuable data on the hammer, pile & soil system for re-design on the piled foundation (if necessary).
-
product
Application Penetration Testing:
Penetration testing (or pen testing) is a simulated security exercise in which ethical hackers attempts to exploit the vulnerabilities of an application system (web or mobile). The objective of this exercise is to identify any possible loopholes present in the system’s defence mechanism which the real hackers could take advantage of. QA Mentor practices the following stages while exercising this:
-
product
Penetration Testing
Our penetration testing services reveal real vulnerabilities that matter to your environment. Ultimately LGMS will provide advisory and guidance to help your business to become more secure.
-
product
Intelligence – Led Penetration Testing
An Intelligence-Led Penetration Test (Intel-led Pentest) closely mimics the tactics and techniques of sophisticated and persistent cyber attackers with the intention of compromising an organization’s critical systems.
-
product
Veracode Platform
The Veracode Continuous Software Security Platform contains all of the application security testing types you need in one place – static analysis, dynamic analysis, software composition analysis, and manual penetration testing – ensuring that you have a comprehensive view of your risk from design through deployment.
-
product
Hydrostatic Head Pressure Tester
Sataton Instruments Technology CO., Ltd
Hydrostatic head pressure tester is designed to determine the resistance to water penetration of materials by hydrostatic pressure method. By measuring the opposition to the passage of water through the tested specimen, the tester is to provide standard testing conditions for operator to note the test terminal point. The tester is primarily intended for ducks, tarpaulins, tentings, waterproof materials and other materials which are used for impermeable application, such as chemical protective clothing or medical protective clothing.
-
product
Telecom, Embedded Hardware-S/W Systems
Network Penetration Testing is a technique that identifies security vulnerabilities in the application by applying different malicious processes to break network security.
-
product
Mobile Application Penetration Testing
A Mobile application is an application that runs on mobile devices. It has become a dominant and popular business tool today. Corporates are empowering mobile devices by offering more and more services on mobile and handheld devices. Unfortunately, mobile devices like notebook computers, PDAs, Pocket PCs, smartphones, and BlackBerrys are all attractive targets for malicious attackers. By accessing your corporate network via email, VPNs, and other means of remote access, a successful compromise can result in the exposure of Personally Identifiable Information, corporate secrets, customer data, and additional sensitive information.
-
product
Cybersecurity Penetration Testing Assessments
Tripwire Professional Services
Organizations do all that they can to protect their critical cyber assets, but they don’t always systematically test their defenses. Penetration tests—otherwise known as pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems. Whether we are testing an application or network environment, Tripwire’s pen testing will not only identify vulnerabilities, but it will also demonstrate them through exploitation—definitively determining if unauthorized access or other malicious activity is possible.
-
product
Extendible Test Leads
The Extendable Tip Probe permits testing in those hard to reach areas. The tips are fully insulated with durable Kynar. This prevents accidental shorting of adjacent components. The tip is stainless steel and is very sharp, allowing for penetration of conformal coatings. The rubber lead is 18 gauge, 48" long.
-
product
Microhardness Tester
MT91 Series
Newage Testing Instruments, Inc.
The Newage MT91 System is an automatic microhardness testing system that uses the Rockwell method for the hardness result. Hardness is measured based on the depth of penetration rather than using an optical system to determine hardness based on the impression diameter.
-
product
Veracode Platform
ChongqingTop Oil Purifier Manufacture Co., Ltd.
The Veracode Continuous Software Security Platform contains all of the application security testing types you need in one place – static analysis, dynamic analysis, software composition analysis, and manual penetration testing – ensuring that you have a comprehensive view of your risk from design through deployment.
-
product
CREST Penetration Testing
CREST is a not for profit organization that serves the needs of a technical information security marketplace that requires the services of a regulated professional services industry.
-
product
Open-source Penetration Testing Tool
SecSmash
Secsmash is a modular framework for leveraging credentials to enterprise security tools to own the enterprise. Instead of spinning up your own C2 on a pentest, leverage the C2 that organizations have already deployed. HTTP integrator takes inputs, and extractions to generate new inputs, to drive a chain of HTTP request to authenticate to the target system, enumerate connected hosts, and run commands.
-
product
Mobile App Penetration Testing
To verify the functionalities of your software, to check for the quality of your product, and to see that the applicationis working against business requirements, opt for Functional Testing.
-
product
Flat One Side Baseplates
BE-FOS
Bemcoil-FOS (Flat One Side) is made from 18 gauge, 304 stainless steel sheet combined with 11 gauge (0.120 inch thick), 304 stainless steel plate. Bemcoil-FOS can be circuited to allow tapped or clearance hole penetrations for mounting. This material is sometimes specified as a liquid nitrogen cooled water getter plate material in optical testing systems.
-
product
Web Application Penetration Testing
Web Application Penetration Testing – to identify, analyze, and report vulnerabilities in a given web application. LGMS adopts a robust technology and process-based approach supported by a well-documented methodology to identify potential security flaws in the web application and the underlying environment.
-
product
Spirent SecurityLabs
The Spirent SecurityLabs’ services are structured to produce high-impact results with minimal impact on the client organization. Our dedicated teams of experienced security professionals offer comprehensive scanning, penetration testing and monitoring services for networks, applications and devices, as well as source code analysis.
-
product
Wireless Network Penetration Testing
LGMS wireless network penetration testing uses automated and manual penetration techniques to locate and map authorized and unauthorized wireless access points, review corporate access point configuration and then discover weaknesses that could allow an attacker to penetrate those networks. Potential internal and external threats are documented, and a recommended action plan is developed to address any security risks.