Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
product
Bio-Threat Detection & Collection
IBAC 2
The IBAC 2 is a fully automated bio-detection sensor that can support continual, 24/7, air monitoring or can be set to targeting sampling windows to align to hours of operation. It alarms in less than 60 seconds when a bio-threat is present. IBAC can be configured to support automated aerosol sampling either in conjunction with its’ triggered alarms or at a set frequency sampling time. In wide service throughout the world, IBAC 2 is used to collect and detect aerosolized agents for all four classes of biological threats (spore, viral, cellular, and protein toxins) with low false alarm.
-
product
Portable Range Threat Simulators
The Textron System's PRTS™ and HPRTS™ are medium and long-range, programmable, ruggedized Radio Frequency (RF) test and training tools. Our PRTS family of range simulators delivers high-fidelity environments for training ranges.
-
product
Ground Threat Emitter Sensor System
GTESS
The Ground Threat Emitter Sensor System (GTESS) is a modular test and training system capable of stimulating multi-spectral aircraft electro-optic sensor suites at long range. The GTESS system integrates Textron Systems’ ultraviolet (Mallina™), infrared (Phoenix) and/or laser (Phantom™) ranged stimulators with an automated tracking system to facilitate fast-moving test, training and evaluation exercises. A fully integrated camera system for effective after action review. GTESS can also work in conjunction with Textron’s radio frequency (RF) range stimulator systems (PRTS™ & HPRTS) for complete multi-spectral testing.
-
product
Simulators/Threat Emitters
Antennas for RADAR test, simulation and training are designed for integration into complete threat RADAR simulators for use on combat training and test ranges or in simulators for training and evaluation of RADAR operators, aircrews, air-traffic-control or weather radar applications. All antennas for RADAR simulators have high RF power handling capabilities and generally use pressurized transmission lines. Dual-band, single aperture antennas and a cluster of separate antennas mounted to a single pedestal are ideally suited for RADAR simulators in mobile, fixed, shipboard and airborne environments.
-
product
Threat Detection/Analysis
Schweitzer Engineering Laboratories, Inc.
Several SEL devices have built-in malware detection or can identify nonauthorized network traffic.
-
product
Managed Threat Detection Service
GuardDuty
Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads. It monitors for activity such as unusual API calls or potentially unauthorized deployments that indicate a possible account compromise. GuardDuty also detects potentially compromised instances or reconnaissance by attackers.
-
product
Mobile Systems
Advanced vehicle-based platforms for real-time detection and identification of CBRN threats in complex and variable urban environments.
-
product
Radar Threat and Target Simulation Unit
MS 1605
PTG is used to field/LAB evaluation / testing of RADAR. PC is used to control the profile of the target generation. PTG will work in both stand alone and remote mode. The PTG has keypad and LCD for stand-alone operation. The PC can interface the PTG through the USB link. The operator can communicate through the GUI to the PTG. MIL1553B Communication used for Interfacing with RADAR.
-
product
Telephone And Line Analyzer
TALAN™ 3.0
The TALAN 3.0 Telephone and Line Analyzer represents advanced capability to detect and locate illicit tampering and security vulnerabilities on digital, analog, and VoIP telephone systems. New hardware provides the ability to test twisted pairs against modern telecommunication threats including shield and ground.
-
product
High-Speed Maneuvering Surface Target (HSMST)
Kratos Defense & Security Solutions, Inc.
The Kratos C2 is currently in use and supporting mission operations for the U.S. Navy and Army utilizing the High-Speed Maneuvering Surface Target (HSMST), developed in response to a requirement for a 40+ knot target to represent littoral threats encountered by the fleet and which would retain 35 kt capability in advanced sea states. Kratos has successfully supported weapons testing missions that required waves of multiple independently controlled HSMST’s (more than 10 vessels) coming from multiple axes.
-
product
Perimeter Security And Coastal Surveillance Systems
These systems comprise of Radars and Cameras and can give early warming to the commanders about any intrusion/breach of perimeter of any restricted area. These can be integrated with jammers to tackle drone threats too.
-
product
Cyber Security Training
Elbit Systems of America's comprehensive attack scenario library reflects the most recent threat landscape. Our cyber security experts continuously update training scenarios with newly discovered attacks and tactics. Versatile network settings and attack scenarios equip cyber security teams with customized training specific to each team's organization.
-
product
Red Team Engagement
Red Team Assessment (Red Teaming) is an activity where a group of white hat hackers (or penetration tester) perform a series of activities to assess the company’s security readiness towards real-world cyber threats. Red teaming aims to ‘attack’ an organization’s digital and physical infrastructure to evaluate the organization’s security defense and posture, at the same time targeting to obtain any sensitive and beneficial information. Red Teaming usually emulates several malicious actors to penetrate the organization’s digital and physical infrastructure security.
-
product
UXG X-Series Agile Signal Generator, Modified Version
N5191A
et closer to reality: simulate increasingly complex signal environments for radar, EW & antenna-test Test sooner & increase confidence in EW systems by generating signal simulations when you need them: the UXG is a scalable threat simulator Use pulse descriptor words (PDWs) to generate long pulse trains & individually control pulse characteristics Quickly characterize antennas over a wide frequency range with fast frequency tuning Performance without requiring an export license
-
product
Checkpoint Security System
ConneCT
The ConneCTTM Checkpoint Security System is an advanced aviation security explosive detection system (EDS) engineered to deliver superior threat detection, dramatically improved passenger throughput, and low total cost of ownership.
-
product
MWIR Systems
L3 Cincinnati Electronics’ high-performance cooled mid-wave (3.5 – 5.0 µm) IR imagers are based on our patented InSb focal plane array architecture. Ideal for all combat conditions, L3 Cincinnati Electronics technology improves situational awareness in combat intelligence, sighting & tracking systems, threat deterrence and perimeter & border security with all-weather observation, day or night. These IR sensors can be utilized in urban, rural and remote situations where there are extreme climatic and terrain conditions. Well-suited for fixed or portable payloads, these imaging systems offer a substantially lower total life-cycle cost in comparison to other commercial IR imaging sensors.
-
product
Spectrum Monitoring & Signal Intelligence
Modern spectrum monitoring and signal intelligence systems can capture, process, and record wide signal bandwidths at a broad range of frequencies. Engineers need flexible software to adapt these systems to new signal types and threats.
-
product
Multi-Spectral UV/Laser Range Stimulator
Phantom™
The Phantom is a long-range laser and ultraviolet (UV) stimulator capable of testing aircraft electro-optical sensor suites up to 5 km. Phantom can operate as an independent laser and/or UV stimulator or can be integrated with our other electro-optical and radio frequency range systems (see GTESS and PRTS). The Phantom provides both a laser threat and a synchronized temporal missile plume signature to stimulate both the aircraft’s laser and missile warning systems. Training aircrew to counter maneuver a Laser Beam Riders (LBR) threat is considered essential to survival and in-air training. The Phantom can be deployed either on a shoulder or tripod mount.
-
product
NAVAL LASER-WARNING SYSTEM
NLWS
Laser activity in your vicinity might mean the presence of a threat. Saab's Naval Laser-Warning System (NLWS) is capable of detecting and analysing lasers in blue-water and littoral combat environments. This system provides vitally important situational awareness to the command team about the presence of laser activity.
-
product
Application Monitoring Tool
Strong application monitoring tool enables IT teams, to get thorough insights into application health and response-time data. Go proactive with Motadata, which is one of the best application performance monitoring tools (APM) to identify potential threats that might bring operations down and fix the issue before it becomes a problem. Real-time metrics dashboard helps you stay on top of your application performance. Resolve application performance management issues before they impact your users or customers.
-
product
Power Supplies
RM - SERIES
With dual PCI-E connectors, the RM Series carries all its essentials to power your system. Enjoy the graphic rendered programs and games without the threat of overheating. Its dark aluminum chassis not only looks good, but dramatically relieves heat built-up. The 120mm cooling fan enhances the already efficient heat dissipation rate and helps balance the cooling system with noise level. The RM Series is great for high end users to everyday casual users. Whatever your system needs, the RM Series can deliver.
-
product
Adjunct Simulation Engine
Curtiss-Wright Defense Solutions
Responding to the increasing need for realistic and effective military training to counter today’s varied threats while keeping to the budget, TCG ASE offers high fidelity, real-time, and configurable simulated tactical data link information for operational and training networks.
-
product
Counter-Drone Solutions
ARDRONIS
The proliferation of malicious and non-cooperative drones is an ever-increasing threat to aviation and sensitive site security. Whether it be disruption of critical national infrastructure at home or risk of life to forward-deployed personnel abroad, civil and government organizations and agencies; all of them require affordable and reliable counter-drone solutions. Protective measures can only be taken after a threat is detected. To effectively counter the threat, early warning is necessary – every second counts.
-
product
Azure Data Lake Storage
Eliminate data silos with a single storage platform. Optimize costs with tiered storage and policy management. Authenticate data using Azure Active Directory (Azure AD) and role-based access control (RBAC). And help protect data with security features like encryption at rest and advanced threat protection.
-
product
Infrared Camera for CO Detection and Electrical Inspections
FLIR GF346
The FLIR GF346 optical gas imaging camera detects carbon monoxide (CO) and 17 additional gases without the need to interrupt your plant's production process. CO emissions can be a significant threat to primary steel manufacturing operations; even the slightest leak in a vent stack or pipe can have a devastating effect. With the FLIR GF346, inspectors can scan large areas from a safe distance, pinpointing leaks in real-time, reducing repair down-time, and providing repair verification.
-
product
1553Guard
MIL-STD-1553 bus architecture is a threat that adversaries can leverage to compromise your equipment and spread malicious software through your Serial Data Bus (SDB) system. You need a solution that can not only identify current and future cyberattacks in real-time but also instantly eliminate those threats before they wreak havoc and interrupt the mission.
-
product
Cyber Assurance
As the Internet of Things (IoT) continues to expand, connecting more and more of our world through communication devices, a growing trend has emerged: cyber security threats.
-
product
Infrared Camera Window with PIRma-Lock
FLIR IR Windows Series
FLIR's IR Windows add a barrier between you and energized equipment, protecting you from arc flash accidents. IR windows are easy to install, easy to use, and will help you work with greater confidence. You’ll perform inspections more efficiently and reduce the threat of arc flash injury, all while staying in compliance with NFPA 70E requirements. Choose the anodized aluminum frame, or opt for durable stainless steel to prevent mixed metal issues.
-
product
Cyber Security Assessment
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
product
Security and Traffic Monitoring System
Information System Technologies Inc.
ISTI’s versatile sensor nodes can support multiple sensing types including acoustic, seismic, visible/IR, and scanning laser. Several eye-safe scanning lasers form a distributed wireless sensor network and can continuously and accurately track as well as monitor ground vehicles and personnel in a surveillance area. This system provides super-fine angular and range resolution to precisely locate moving targets. Among other key benefits are: day/night operational capability, continuous monitoring and surveillance without blind spots, 360 degrees field-of-view, large coverage area, multiple closely spaced target tracking, threat classification, and automatic alarm generation. The system can be used in applications such as traffic monitoring, intrusion detection, border control, airport runway collision and incursion avoidance, and perimeter security.





























