Filter Results By:
Products
Applications
Manufacturers
Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
product
Bio-Threat Detection & Collection
IBAC 2
The IBAC 2 is a fully automated bio-detection sensor that can support continual, 24/7, air monitoring or can be set to targeting sampling windows to align to hours of operation. It alarms in less than 60 seconds when a bio-threat is present. IBAC can be configured to support automated aerosol sampling either in conjunction with its’ triggered alarms or at a set frequency sampling time. In wide service throughout the world, IBAC 2 is used to collect and detect aerosolized agents for all four classes of biological threats (spore, viral, cellular, and protein toxins) with low false alarm.
-
product
Testing and Assessment Services for Unmanned Aerial Vehicles
Unmanned aerial vehicles (UAVs), more commonly known as drones, have many applications. UAVs can be used in agriculture for crop spraying, movie making and aerial photography, disaster relief, and can even imitate flying animals for conservation or research purposes. Our services can help you make sure your UAVs meet international norms and standards. We test materials and resilience, confirming that your drones do not pose a threat to human health or the environment. Our services can help you make sure your UAVs meet international norms and standards. We test materials and resilience, confirming that your drones do not pose a threat to human health or the environment. Our team of experts is dedicated to UAVs and their applications – and a global network of offices. We can give you the advice and expertise you need to speed your drones to market. Our team of experts is dedicated to UAVs and their applications – and a global network of offices. We can give you the advice and expertise you need to speed your drones to market.
-
product
Security Testing Service
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
product
Ground Threat Emitter Sensor System
GTESS
The Ground Threat Emitter Sensor System (GTESS) is a modular test and training system capable of stimulating multi-spectral aircraft electro-optic sensor suites at long range. The GTESS system integrates Textron Systems’ ultraviolet (Mallina™), infrared (Phoenix) and/or laser (Phantom™) ranged stimulators with an automated tracking system to facilitate fast-moving test, training and evaluation exercises. A fully integrated camera system for effective after action review. GTESS can also work in conjunction with Textron’s radio frequency (RF) range stimulator systems (PRTS™ & HPRTS) for complete multi-spectral testing.
-
product
Situational Awareness
SA is utilized to secure borders from illegal trafficking, to monitor supply line routes against the placement of roadside bombs, to provide our warfighters the tools they need to alert them to potential threats, and to identify and defeat the enemy, day or night.
-
product
High Definition Mid-Range Surveillance System
Ranger® HDC MR
The Ranger HDC MR sets a new standard for surveillance with its ability to detect illegal activities even in degraded weather conditions, utilizing embedded analytics and image processing to reduce the cognitive workload, enabling operators to distinguish quickly between true threats and false alarms. The HDC MR is not only a superior system in bad weather, it also provides increased uptime and reduces cyber risks -- a reliable tool that adds days of efficient surveillance and reduces risk compared to previous generations of systems.
-
product
Biological Detection
Collaborating with government agencies in the USA and UK in the field of biological threat detection, Kromek is working towards the common goal of improving the early detection of biological threats anytime and anywhere, making the world safer and healthier.
-
product
MWIR Systems
L3 Cincinnati Electronics’ high-performance cooled mid-wave (3.5 – 5.0 µm) IR imagers are based on our patented InSb focal plane array architecture. Ideal for all combat conditions, L3 Cincinnati Electronics technology improves situational awareness in combat intelligence, sighting & tracking systems, threat deterrence and perimeter & border security with all-weather observation, day or night. These IR sensors can be utilized in urban, rural and remote situations where there are extreme climatic and terrain conditions. Well-suited for fixed or portable payloads, these imaging systems offer a substantially lower total life-cycle cost in comparison to other commercial IR imaging sensors.
-
product
Threat Detection/Analysis
Schweitzer Engineering Laboratories, Inc.
Several SEL devices have built-in malware detection or can identify nonauthorized network traffic.
-
product
Global Lightning Network
Our Global Lightning Network® (GLN®) is tried and true, delivering hyperlocal real-time lightning data for threat assessment and integration.
-
product
Autonomous PNT Performance and Vulnerability Test Suite
PANACEA
PANACEA is an autonomous GNSS performance and threat environment simulator system designed to control simulation hardware and collect data from up to 32 GNSS receivers simultaneously.
-
product
Cloud Security Solutions
Online threats are constantly changing. Offering protection against the largest and most sophisticated attacks, Akamai helps you safeguard your websites and other Internet-facing applications from the risks of downtime and data theft. Built on the Akamai Intelligent Platform, Akamai Cloud Security Solutions provide the scale to stop the largest Distributed Denial-of-Service (DDoS) and web application attacks without reducing performance, as well as intelligence into the latest threats and the expertise to adapt to shifting tactics and attack vectors.
-
product
Spectrum Monitoring & Signal Intelligence
Modern spectrum monitoring and signal intelligence systems can capture, process, and record wide signal bandwidths at a broad range of frequencies. Engineers need flexible software to adapt these systems to new signal types and threats.
-
product
Application Monitoring Tool
Strong application monitoring tool enables IT teams, to get thorough insights into application health and response-time data. Go proactive with Motadata, which is one of the best application performance monitoring tools (APM) to identify potential threats that might bring operations down and fix the issue before it becomes a problem. Real-time metrics dashboard helps you stay on top of your application performance. Resolve application performance management issues before they impact your users or customers.
-
product
Handheld Analyzer for Narcotics Identification
BWT-840000994
The TacticID®–N Plus is a field-ready handheld instrument specifically designed for non-contact forensic analysis of narcotics, pharmaceutical drugs, cutting agents and precursors by law enforcement personnel.Featuring an intuitive workflow and touchscreen, samples can be nondestructively analyzed through opaque and transparent packaging, with sample threat level displayed prominently for first responders,safety personnel, law enforcement, bomb squads, customs and border patrol, and hazmat team to act quickly with minimal sample contact. The TacticID®–N Plus utilizes laboratory-proven Raman spectroscopy, whichallows users to obtain actionable identification of illicit substances without ever compromising the integrity of the sample or the chain of evidence.
-
product
Cyber Assurance
As the Internet of Things (IoT) continues to expand, connecting more and more of our world through communication devices, a growing trend has emerged: cyber security threats.
-
product
Log Management and SIEM Platform
NIKSUN® LogWave™
The next generation of threats requires the next generation cyber-defense platform. NIKSUN’s LogWave™ Log Management and SIEM platform makes data ingest, reporting, and alerting easier than ever. With unlimited scalability, flexible reporting, and intelligent alerting, see why NIKSUN LogWave™ is right for your organization.
-
product
Digital Map Systems
Elbit Systems of America’s Global Digital Map Unit is built on a proven design that accommodates multiple data formats and provides unmatched situational awareness to aircrews. The GDMU displays detailed map, flight plan, and threat information to aircrews. Each system performs interactive functions with the mission computers and generates digital video map data for head down displays.
-
product
Laser Warnings Systems
Elbit Systems of America’s laser warning systems use both coherent and non-coherent laser sources. We understand the full scope of issues associated with each laser threat and have the systems engineering expertise necessary to accurately and reliably detect, locate and categorize these threats. Each LWS is equipped with a direction indicator and provides complete threat coverage in a high dynamic range with audio and visual warnings.
-
product
Internet of Thing
The Internet of Things (IoT) offers breathtaking potential. But IoT success means navigating new technologies, multiple standards, intense competition, and security threats. Spirent helps developers, operators, and service providers optimize their IoT solution and get to market faster. Discover how below.
-
product
Radar Threat and Target Simulation Unit
MS 1605
PTG is used to field/LAB evaluation / testing of RADAR. PC is used to control the profile of the target generation. PTG will work in both stand alone and remote mode. The PTG has keypad and LCD for stand-alone operation. The PC can interface the PTG through the USB link. The operator can communicate through the GUI to the PTG. MIL1553B Communication used for Interfacing with RADAR.
-
product
FlowSpec DDoS Mitigation
Large volumetric-based DDoS attacks are increasing in terms of frequency and scale at which they are perpetrated. With hundreds of-gigabits worth of attacks becoming commonplace, organizations not only face service interruptions for customers but the complete implosion of their infrastructure’s operation. In the face of this increasingly challenging threat landscape, BGP FlowSpec DDoS mitigation has emerged as one of the most effective techniques to mitigate DDoS attacks. Combined with an accurate and speedy detection system, it helps manage and synchronize working with firewalls to mitigate these attacks.
-
product
High-Resolution Spectroscopic Personal Radiation Detector
identiFINDER® R300
The identiFINDER R300 is the world’s highest performing, pager-sized spectroscopic personal radiation detector (SPRD). It provides continuous detection and full threat identification (ANSI N42.48 library). The simple two-button user interface facilitates expedited threat response. Visible, audible, and tactile alarms rapidly alert the operator via the easy-to-read color display. On-board Bluetooth, web server, and GPS technologies make interagency communication easier than ever. The R300 is ideal for belt-worn passive-scanning, security checkpoints, border patrol, and first response.
-
product
Cargo and Vehicle Inspection
In a world where threats continue to evolve and concealment techniques become more sophisticated, our customers are facing more complex, difficult missions than ever.
-
product
NAVAL LASER-WARNING SYSTEM
NLWS
Laser activity in your vicinity might mean the presence of a threat. Saab's Naval Laser-Warning System (NLWS) is capable of detecting and analysing lasers in blue-water and littoral combat environments. This system provides vitally important situational awareness to the command team about the presence of laser activity.
-
product
Sensors
We design, develop and produce state-of-the-art SIGINT sensors that seek, exploit, identify, and locate sources of RF energy, underwater sound, light, heat and other complex phenomena. These sensors recognize threats, gather intelligence, and allow our customers to make informed, strategic response decisions.
-
product
PrAMC Based On QorIQ P4040/P4080, 10 GbE, SFP+
AMC710C
The AMC710C is a flexible processor AMC for general purpose processing with the quad-core QorIQ P4040 with Data Path Acceleration Architecture intended for router and UTM (unified threat management) applications.
-
product
Focus Risk View
Fasoo RiskView is a tool for security administrators that monitor activity related to unstructured data and user activities with confidential data. It gathers information from Fasoo Usage Tracer (the log analysis utility for Fasoo Enterprise DRM) and Fasoo eData Manager. It has APIs that can be configured to import log data from other security technology components, including firewalls, DLP, databases, and even physical security systems (e.g., entry/exit data from keycard or biometric systems) and employee attendance records. Fasoo RiskView includes a decision making framework that security administrators as well as business managers can use to review suspicious activities and after relevant investigations, in order to decide whether or not to take action to address these concerns with potential insider threats.
-
product
Perimeter Security And Coastal Surveillance Systems
These systems comprise of Radars and Cameras and can give early warming to the commanders about any intrusion/breach of perimeter of any restricted area. These can be integrated with jammers to tackle drone threats too.
-
product
Cloud Security
Cloud Security Assessment is the most critical phase before the product is finally deployed and Product is finally ready to handle real-world cyber security threats.





























