Showing results: 61 - 75 of 132 items found.
-
GAO Tek Inc.
Visual fault locators are used to identify problems with your fiber. GAOTek visual fault locators typically are applied for fiber tracing, fiber routine, and continuity checking. Imagine being able to easily identify when and where a fiber is breaking, bending, or when there’s a threat to the fiber layer.
-
Microsoft Azure
Eliminate data silos with a single storage platform. Optimize costs with tiered storage and policy management. Authenticate data using Azure Active Directory (Azure AD) and role-based access control (RBAC). And help protect data with security features like encryption at rest and advanced threat protection.
-
Positek Limited
Intrinsically Safe systems provide a safe operating environment for personnel and equipment. Intrinsic Safety (IS) is based on the principle of restricting the electrical energy transmitted into a hazardous area, thereby ensuring that anysparks or heated surfaces that may occur as a result of electrical failures areinsufficient to cause ignition. The threat of an explosion is eliminated.
-
IntelOwl
Intel Owl is an Open Source Intelligence, or OSINT solution to get threat intelligence data about a specific file, an IP or a domain from a single API at scale. It integrates a number of analyzers available online and is for everyone who needs a single point to query for info about a specific file or observable.
-
NIKSUN® LogWave™ -
Niksun
The next generation of threats requires the next generation cyber-defense platform. NIKSUN’s LogWave™ Log Management and SIEM platform makes data ingest, reporting, and alerting easier than ever. With unlimited scalability, flexible reporting, and intelligent alerting, see why NIKSUN LogWave™ is right for your organization.
-
Elbit Systems of America®
Elbit Systems of America's comprehensive attack scenario library reflects the most recent threat landscape. Our cyber security experts continuously update training scenarios with newly discovered attacks and tactics. Versatile network settings and attack scenarios equip cyber security teams with customized training specific to each team's organization.
-
7Layers, Inc.
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
HORNE Cyber
Compliance does not ensure protection from all threats – it is just a minimum requirements baseline. Mandatory regulations were designed to protect customer data. As technology advances and your organization continues to grow, a compliance mindset puts your organization at risk. To protect your customer data, sensitive corporate data, operations and reputation, more is required.
-
BreakingPoint VE -
Keysight Network Applications and Security
Ixia BreakingPoint Virtual Edition (VE) provides real-world application and threat simulation for complete performance and security testing, and its elastic deployment model allows you to achieve security resilience without sacrificing scalability or flexibility.
-
Phantom™ -
Textron Systems
The Phantom is a long-range laser and ultraviolet (UV) stimulator capable of testing aircraft electro-optical sensor suites up to 5 km. Phantom can operate as an independent laser and/or UV stimulator or can be integrated with our other electro-optical and radio frequency range systems (see GTESS and PRTS). The Phantom provides both a laser threat and a synchronized temporal missile plume signature to stimulate both the aircraft’s laser and missile warning systems. Training aircrew to counter maneuver a Laser Beam Riders (LBR) threat is considered essential to survival and in-air training. The Phantom can be deployed either on a shoulder or tripod mount.
-
Fido® X4 -
Teledyne FLIR
The Fido X4 is a premium handheld explosives trace detector (ETD) that delivers unmatched sensitivity for a broad range of explosives, so you can easily detect threats at levels others can’t. Next generation FLIR TrueTrace® detection technology features a new five-channel sensor array that delivers expanded threat coverage, enhanced sensitivity, and identification in a wide range of environmental conditions. The simplified user interface features onboard video tutorials, user prompts, and color- coded alarms with strength indicators so you can operate quickly and decisively. Analysis and reporting of results are made simple through multiple modern connectivity options, allowing critical data to be shared quickly. From high-volume checkpoint and randomized screenings to foot patrol and standoff operations, Fido X4 is ready to go when and where you need it.
-
ANDRE™ -
Research Electronics Intl.
The ANDRE is a handheld broadband receiver that detects known, unknown, illegal, disruptive, or interfering transmissions. The ANDRE locates nearby RF, infrared, visible light, carrier current, and other types of transmitters. Quickly and discretely identify threats using the ANDRE Deluxe’s wide range of accessories specifically designed to receive transmissions from 10 kHz up to 12 GHz.
-
Todd Research Limited
When you need to set up robust security operations in a temporary or outdoor location, our security vehicles can provide a tried and tested solution. For use at festivals, public ceremonies, sports events and other outdoor functions, our mobile check point and scan truck will help keep your guests or members of the public safe from security threats.
-
Todd Research Limited
Aviation is highly regulated, from ICAO Annex 17 to National Security Programs. Due to its high profile and the subsequent multitude of threats, regulation safeguards travel security. Our expertise will support your business, by supplying market leading X-Ray and Metal detection products along with maintenance, that meet the regulator requirements and best fit your business.
-
LGMS
LGMS wireless network penetration testing uses automated and manual penetration techniques to locate and map authorized and unauthorized wireless access points, review corporate access point configuration and then discover weaknesses that could allow an attacker to penetrate those networks. Potential internal and external threats are documented, and a recommended action plan is developed to address any security risks.