Cyber Security
See Also: Cyber, Phishing, Pen Testing, DDoS
-
product
Industrial & Security
Kromek's custom configurations of Cadmium Zinc Telluride (CZT) based detector tiles and linear arrays can be implemented into custom Advanced Imaging platforms for various Industry and Security applications.
-
product
Multi-Protocol Wireless Application Networking System with Open, Integrated, Secure & Scalable System for Data Aggregation & Viewing
Ion
Jacobs’ vendor agnostic architecture was designed and implemented with the goal of an open Industrial Internet of Things (IoT) solution. ion© adapts and applies technology that enables our customers to gain efficiencies and savings, through connecting our client’s sites then collecting and displaying data in a unified interface. This provides custom insights to our clients, empowering them to ensure safety and respond quickly. The Jacobs ion© solution has been operationally deployed for over a decade and enables innovative approaches for data accuracy, data timeliness, and safety — greatly improving information flow and productivity.
-
product
Quantum-Safe Security
CN4000 Series
The CN4000 series are the ideal optimized, high-performance encryptors for Small to Medium Enterprises (SME). They also enable an ideal cost effective “encrypt everywhere” solution for Large Enterprises. Despite their small form-factor, the CN4000 Series encryptors have the same robust security credentials as the rack-mounted models.
-
product
Secure Voice & Data Communications in EURO-ISDN
ELCRODAT 6-2
Rohde & Schwarz ELCRODAT products protect voice and data communications in digital and analog armed forces and government networks in all German and NATO security classifications.The ELCRODAT 6-2 is the first encryption unit approved for transmitting information classified as TOP SECRET that uses a public key method for key agreement. Together with the public key method, the noise generator in the encryption unit enables mutual authentication and key agreement. New session keys are generated in the encryption unit for each connection. The keys do not leave the units and are deleted after the session for maximum security.
-
product
Global Security Cameras
Our products optimize the reaction time and push the operational envelope!
-
product
Cyber Forensics
Cyber Forensics deals in safeguarding the digital evidence gathered during the cyber attack, identifying the duration of the attack, and locating the geographical location of the attack followed by mapping them.
-
product
Visible Security Cameras - Dome Cameras
Teledyne FLIR Visible Security Cameras - Dome Cameras
-
product
Security and Traffic Monitoring System
Information System Technologies Inc.
ISTI’s versatile sensor nodes can support multiple sensing types including acoustic, seismic, visible/IR, and scanning laser. Several eye-safe scanning lasers form a distributed wireless sensor network and can continuously and accurately track as well as monitor ground vehicles and personnel in a surveillance area. This system provides super-fine angular and range resolution to precisely locate moving targets. Among other key benefits are: day/night operational capability, continuous monitoring and surveillance without blind spots, 360 degrees field-of-view, large coverage area, multiple closely spaced target tracking, threat classification, and automatic alarm generation. The system can be used in applications such as traffic monitoring, intrusion detection, border control, airport runway collision and incursion avoidance, and perimeter security.
-
product
Cyber Threat Assessment Program
Scientific Research Corp. STI Division
SRC provides threat assessment support focused on cyber threats that may impact the ability to wirelessly link with other systems. This activity supports the development of test and evaluation capabilities important to not only identifying current deficiencies but also for developing next generation systems.
-
product
Security Policy Change Automation
FireFlow
Confidently automate your security policy change process - from planning through risk analysis, implementation and validation.
-
product
Cyber Drill And Blue Team Exercise Stimulation
LGMS Security Team will approach the Cyber Drill as a simulation of the possible occurrences during a cyber incident. Based on the defined scenario, LGMS Security Team will perform a technical simulation so as to accurately capture the responses of client’s team in responding to such incidents.In order to obtain the best results, LGMS Security Team will only use information that can be obtained either through public information or by any means of deception techniques.
-
product
Security & Search Systems
Discreet and robust gamma radiation detector, specifically designed for law enforcement and first responders to interdict nuclear and radioactive materials.
-
product
Security Testing Service
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
product
Visible PTZ Security Cameras
Quasar™ 4K IR PTZ Cameras
With crisp 4K video resolution, on-board long-range IR illumination, and 22x or 31x optical zoom options, FLIR Quasar™4K IR PTZ cameras deliver critical situational awareness. Exceptional field of view gives operators the ability to seamlessly monitor key details throughout large areas. The combination of high-performance optics and sensors, exceptional low light visible imaging, and effortless integration with all major third-party VMS and FLIR United VMS makes Quasar 4K IR PTZ cameras an ideal solution for critical infrastructure sites and remote facilities that require close monitoring.













