Filter Results By:
Products
Applications
Manufacturers
- LBA Group, Inc
product
Cable & Antenna Analyzer and Vector Network Analyzer
SiteOne 3028
The SiteOne 3028 is a Cable, Antenna Analyzer and a Vector Network Analyzer for cables, antennas and more, a truly handheld instrument. It covers all major communication bands from 50 kHz to 4400 MHz. It has a variety of measurement screens available, in order to accommodate all the different parameters in an antenna installation. These measurement screens can show two simultaneous graphs, from two different parameters in order to bring further clarity to your measurements.
-
product
Stratum 1 Network Time Server (NTP)
SyncServer S600
SyncServer S600 GPS / GNSS, Stratum 1 network time server with security-hardened NTP Reflector™ technology improves the security, accuracy and the reliability of the time services on the network for IT network administrators working to provide network time services in hardened network operations.
-
product
Analog DVR
Sylo Vision Technology Co., Limited
Security cameras capture an analog video signal and transfer that signal over coax cable to the Digital Video Recorder (DVR). Each camera may be powered by plugging in the power supply right at the camera or by using RG59 Siamese cable which bundles the video and the power cables. The DVR converts the analog signal to digital, compresses it, and then stores it on a hard drive for later retrieval. Intelligence is built into the DVR to handle such things as scheduling, motion detection, and digital zoom. Monitors for viewing the video are connected to the DVR, or it can be set up to publish over an internal network for viewing on PCs. The DVR can also be set up to broadcast over the Internet and can add password protection and other features. When broadcasting over the Internet, the video for all of the cameras is transmitted as one stream (one IP address). Therefore, it is very efficient.
-
product
Mini Fiber Optical Switch at Single Mode Latching 1310/1550nm 5V with LC/PC Connector
SUN-FSW-1x4
Guilin GLsun Science and Tech Group Co., LTD
GLsun 1*4 Optical Switch micaro optical switch informationFeatures•Low Insertion Loss•Wide Wavelength Range•Low Crosstalk•High Stability,High Reliability•Epoxy-free onOptical Path•Latching and Non-latchingApplications•F&D in Laboratory•System Monintoring•OADM•MAN(Metropolitan Area Network)•Network Security and MonitoringSpecificationsParameters Unit SUN-FSW-1×4Wavelength Range nm 850±40 / 1300±40 1260 ~ 1650Test Wavelength nm 850 / 1300 1310 / 1550Insertion Loss 1, 2 dB ≤1.0Return Loss 1, 2 dB MM ≥ 30 SM ≥ 50Crosstalk 1 dB ≥ 55PDL dB SM ≤0.1WDL dB ≤0.25Repeatability dB ≤±0.02Operating Voltage V 3.0 or 5.0Voltage Pluse Width(Latching) ms ≥ 20Durability Cycles ≥ 10 MillionSwitching Time ms ≤8Optical Power mW ≤500Operating Temperature ℃ 0 ~ +70Storage Temperature ℃ -40 ~ +85Relative Humidity % 5 ~ 95Dimension mm (L)33.5×(W)25.5×(H)9.5 ±0.2Note: 1 Within operating temperature and SOP.2 Excluding connectors.GLSUN 1x4 fiber optic switch micaro optical switch
-
product
1U Rackmount Network Appliance Platform With LGA1151 Socket Intel® Core™/Xeon® E-2100 Series Processor, Intel® C246/H310 And Up To 26 LANs
NA590
*LGA1151 socket 8th gen Intel® Core™/Xeon® E-2100 series processor (Coffee Lake)*Four DDR4-2666 U-DIMM for up to 64GB of memory*Max. up to twenty-six 10/100/1000 Mbps Ethernet ports*Two expandable LAN modules supporting 1GbE/10GbE/25GbE/40GbE/Fiber/Copper/Bypass*Supports 1U redundant power supply for optional*Supports IPMI/TPM for optional*Suitable for network security, cloud computing and data centers applications
-
product
Shoghi Technology Updates
Shoghi communications, a defense technology company supply strategic electronic security systems, Surveillance, Communication intelligence, cryptography and network security systems for aerospace and defense industry.Focused on Defense Technology, Shoghi delivers and supports a wide range of systems and solutions. Shoghi being an OEM Solutions provider, can provide customized solutions as per the customer requirement. Here are some Shoghi's technology articles.
-
product
802.11n wireless access point
SX-AP-4800AN2
SX-AP-4800AN2 is a dual band 802.11n wireless access point (base station) and is able to communicate with station devices (clients) supporting IEEE802.11a/b/g/n wireless networks. SX-AP-4800AN2 is ideal for business and factory environments supporting enterprise wireless security and PoE (Power over Ethernet).
-
product
3U CompactPCI Single Board
CP32104
LinkedHope Intelligent Technologies Co.,Ltd.
CP32104 is a 3U CompactPCI single board, low power, small size, high integration, high reliability embedded computer module compliant with PICMG® CompactPCI specifications.CP32104 offers a variety of processor options enabling customers to choose such as D2550、N2600 and N2800. The onboard memory, flash and SATA make sure CP32104 with good anti-shock and vibration performance.The design and production of CP32104 are controlled by full life-cycle management, so CP32104 can be long time available, as ensures maximum support for the maintenance of long life programs.Benefit from its high performance/power ratio, CP32104 works stably in extended temperature range, and is an ideal selection for high reliability and high availability required applications, like harsh environment communication, network security, video/image processing and can also be an ideal control unit in variant devices and equipment.
-
product
Satellite Clock
TCG 01-G
The TCG 01-G is a highly accurate, full featured GPS and GLONASS (GNSS) clock. With enhanced cyber security features that support NERC CIP requirements, the TCG 01-G is designed for use in modern day smart grid / smart substations, electricity distribution, transmission, generation protection and control systems. The clock synchronizes multiple IEDs (Intelligent Electronic Devices) within a network, including protection relays and remote telemetry units to enable accurate time stamping. The TCG 01-G supports IEEE 1588 v2 (PTP) and IEC 61850.
-
product
Spirent SecurityLabs
The Spirent SecurityLabs’ services are structured to produce high-impact results with minimal impact on the client organization. Our dedicated teams of experienced security professionals offer comprehensive scanning, penetration testing and monitoring services for networks, applications and devices, as well as source code analysis.
-
product
1U Rackmount Network Appliance Platform With Intel® Celeron® Processor J1900 Up To 2.42 GHz And 6 LANs
NA342R
The NA342R 1U rackmount network appliance platform supports the 22nm Intel® Celeron® J1900 quad-core processor (codename: Bay Trail). The x86-based network appliance NA342R supports 6 Gigabit Ethernet ports and aims to provide customers a powerful and cost effective network appliance for VPN, content filtering, UTM, network security gateway, and firewall solutions.In order to address the various network application needs, the NA342R supports one USB 3.0 port, one USB 2.0 port, one console RJ-45 port, and one VGA port. Two 2.5" SATA hard drive bays and one CompactFlash type-II socket are available for storing event logs. The network appliance also supports mainstream Windows® 7, Windows® 8 and Linux operating systems.
-
product
Network Security
PLANET Network Security solution is designed to build a strong and secure network for any commercial and industrial environments. By providing functions like cybersecurity, SPI firewall, VPN, IDP, antispam and antivirus, this collection includes VPN Security Gateway, 5G NR Gateway, Flat-type Smart Router, UTM Content Security Gateway and Wireless VPN Routers. A variety of product lines can satisfy all the demands of enterprises, SMBs, factories, communities and more for the network security including remote management and surveillance of IoT, IIoT and building automation applications.
-
product
GPON OLT
OLT-G8P
Hangzhou Softel Optic Co., Ltd.
This small capacity and enhancement mode cassette GPON OLT, meeting the requirements of ITU-T G.984/G.988 and relative standards of China Telecom/Unicom GPON, possessing super GPON access capacity, carrier-class reliability and the complete security function. It can satisfy long-distance optical fiber access requirement on account of its excellent management, maintenance and monitoring capability, abundant service features and flexible network mode.
-
product
Technician Tools
Besides DG’s vehicle network engineering tools, DG Technologies also offers a variety of diagnostic pass-thru tools for technicians. DG’s hardware and software products are used by a variety of aftermarket customers such as: Mechanics, Technicians, Locksmiths and Vehicle Security Professionals. DG has diagnostic and reprogramming products for automotive vehicles, heavy-duty vehicles and everything in between; all with coverage for engine, brakes, transmission & body. Each of these pass-thru translator tools comes with their own standard diagnostic software and can be used in conjunction with most OEM software to reflash and translate the more detailed manufacturer-specific information acquired from DG’s hardware.
-
product
Network Appliances
Companies use a network appliance because it provides the following benefits over general purpose servers or computers:Easy deployment - Simply unpack, power on, configure IP and you're done.Compatibility - Removes local environmental factors.Long-term brand value - An appliance is visible, attractive and a constant reminder to your value.Purpose design - Appliances optimize performance, security and scalability.
-
product
Cybersecurity Penetration Testing Assessments
Tripwire Professional Services
Organizations do all that they can to protect their critical cyber assets, but they don’t always systematically test their defenses. Penetration tests—otherwise known as pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems. Whether we are testing an application or network environment, Tripwire’s pen testing will not only identify vulnerabilities, but it will also demonstrate them through exploitation—definitively determining if unauthorized access or other malicious activity is possible.
-
product
Bypass Network TAPs
Bypass TAPs (bypass switches) are used to connect a monitored network segment to an active, in-line security device and monitor the device's health. If your security tool goes off-line, the bypass TAP automatically 'switches to bypass mode' keeping your network link up while you resolve the issue. Garland's Bypass TAPs with failsafe technology guarantee 100% network up-time and let your security devices see every bit, byte, and packet.®
-
product
Serial Device Servers
Connect and share RS-232 serial devices on wireless or wired Ethernet networks, with enterprise security support and multiple serial port modes for maximum flexibility in any environment.
-
product
10GbE Network Attached Storage
HSR10
Curtiss-Wright Defense Solutions
The High-Speed Recorder 10 (HSR10) is a network attached storage (NAS) device designed for high-speed network recording based on a double 10 Gigabit Ethernet (GbE) port layout. What’s more, to adhere to security requirements for mission-critical applications, this unit is designed with two-layer encryption and follows industry-standard NAS protocols permitting system design flexibility.
-
product
Wireless Network Penetration Testing
LGMS wireless network penetration testing uses automated and manual penetration techniques to locate and map authorized and unauthorized wireless access points, review corporate access point configuration and then discover weaknesses that could allow an attacker to penetrate those networks. Potential internal and external threats are documented, and a recommended action plan is developed to address any security risks.
-
product
Ethernet MACsec PHY
Macom Technology Solutions Holdings Inc.
IEEE 802.1AE Media Access Control Security (MACsec) is an industry standard security technology that provides secure communication for Ethernet traffic. MACOM’s wire-speed Ethernet MACsec PHY products offer highly scalable and cost-effective encryption solutions to address the data security issues in wireless, carrier, data center and cloud networks. Combining MACOM’s strength in high speed, high performance mixed-signal I/O and industry leading CMOS silicon technology, MACOM’s MACsec PHY products provide line-rate encryption and authentication at a very low power-footprint that enables encryption at wire-speed on every port. They are ideal for adoption on switch/router line cards, data center interconnect (DCI) transponder and wireless xHaul aggregation systems to provide security function in addition to the connectivity to optical and copper modules.
-
product
PICMG 1.3 Full-size CPU Card With LGA1150 4th Gen Intel® Core™ I7/i5/i3 Processor, Intel® Q87, SATA3, USB 3.0, DVI-D, VGA, DisplayPort And Dual LAN
SHB130
The PICMG 1.3 full-size CPU card, SHB130, designed for the new architecture 4th Generation Intel® Core™ processors (codename: Haswell/Haswell Refresh) with Intel® Q87 chipset on 22nm technology using LGA1150 socket. The outstanding SHB130 with new Intel® architecture delivers up to double the graphics performance over the previous generation. The new graphics solution has high levels of integration to enable new form factors and designs with excellent visual quality built in. In addition, The PICMG 1.3 full-size CPU card comes with two DDR3 1333/1600 MHz unbuffered ECC DIMM slots up to 16 GB of system memory and six SATA 6Gbps ports with RAID 0, 1, 5, 10. The PCI Express 2.0 available on the new Intel® Core™ processor provides flexible x16, x4 or x1 lanes for versatile applications. The high performance SHB130 with improved graphics ability is ideal for applications such as network security, storage server, POS, kiosk, medical, gaming, digital signage, and surveillance security monitoring.
-
product
Lawful Interception
Lawful Interception is the legally sanctioned official surveillance of private communications, such as telephone calls, SMS and Email messages etc. It is a security process which allows service providers to support law enforcement agencies to identify, monitor and deliver all electronic communication of specified individuals and groups when requested. Shoghi’s Lawful Interception solutions focus on officially intercepting private communications to support legal and/or criminal investigations. The lawful interception solution offered by us covers all available networks such as fixed line network, cellular networks and Internet networks. Shoghi Lawful Interception solution is capable of lawfully intercepting, storing and analyzing communication content.
-
product
Mobile Network Monitoring
NetMobility®
The next generation of mobile network monitoring is here. With NIKSUN NetMobility® you gain unparalleled insights into subscriber behavior, carrier services, network health, cyber threats, and application performance to meet a wide range of service provider needs - Performance, Security, Operations, Management, and Planning.
-
product
Security and Traffic Monitoring System
Information System Technologies Inc.
ISTI’s versatile sensor nodes can support multiple sensing types including acoustic, seismic, visible/IR, and scanning laser. Several eye-safe scanning lasers form a distributed wireless sensor network and can continuously and accurately track as well as monitor ground vehicles and personnel in a surveillance area. This system provides super-fine angular and range resolution to precisely locate moving targets. Among other key benefits are: day/night operational capability, continuous monitoring and surveillance without blind spots, 360 degrees field-of-view, large coverage area, multiple closely spaced target tracking, threat classification, and automatic alarm generation. The system can be used in applications such as traffic monitoring, intrusion detection, border control, airport runway collision and incursion avoidance, and perimeter security.
-
product
Virtualized Front End Processor
quantumFEP
Kratos Defense & Security Solutions, Inc.
OpenSpace quantumFEP provides the digital processing and network connectivity needed between the Command & Control (C2) system and the RF Signal processing equipment. All of the digital processing functions in a typical satellite ground system are included - command and telemetry processing, recording, AES COMSEC security, CSSDS processing, packet-level FEC, and network gateway interface support.
-
product
VPN Server
What is a Virtual VPN server? A Virtual VPN server (aka virtual private network server or virtualized VPN Server) is a type of router that provides hosting and delivery of VPN services. It may also be viewed as an IP Network instance that terminates VPN connections such as Ipsec, OpenVPN and similar. Traditionally, a VPN server is a hardware computing device installed and configured with software that provides virtual Private Network (VPN) service. Patton has decoupled the VPN software from the dedicated hardware using virtualization technology to create a virtualized version of the network function or VNF. The VNF form of the server provides VPN tunnel management, network protection, firewall security, and IPsec router functionality-as well as VoIP security including TLS/SRTP.
-
product
EO/IR Surveillance Systems
Multi-sensor systems for perimeter surveillance, security and force protection are available in a variety of lens and sensor combinations, and can be customized to meet any mobile or stationary mission requirement. These systems may be operated independently or in a fully integrated sensor network.
-
product
P1 Vulnerability Knowledge Base
VKB
With more than 1800 identified & listed vulnerabilities P1 Security Vulnerability Knowledge Base (VKB) is a unique telecom-dedicated Vulnerability Database, with absolutely no other equivalent on the market. It is the result of years of expertise and vulnerability assessments successfully led by our engineers on the Core & Radio Networks & Network Elements of many of the biggest Telecom operators in the World.
-
product
Network Test Solution
CyPerf
Realism: Create digital twin of users, applications, and attacks to replicate and test QoE in real-world network environments.Native authentication: Send application and security traffic over authenticated sessions at high scale.Highly scalable: Supports millions of concurrent users and millions of connections per second that elastically scale up and down, enabling both resiliency and chaos testing.Containerized agents: Deploy lightweight traffic agents as containerized pods on-prem, VMs, managed Kubernetes deployments, private or public cloud (AWS, GCP, Azure)Lab and live network testing: Test performance and security both pre-deployment in a lab or safely in live production networks.Flexible: Portable subscription-based software solution with a robust and intuitive cloud-native GUI management dashboard
-
product
Network Monitor & Analyzer
CommView
CommView is a powerful network monitor and analyzer designed for LAN administrators, security professionals, network programmers, home users…virtually anyone who wants a full picture of the traffic flowing through a PC or LAN segment. Includes a VoIP analyzer.