Filter Results By:

Products

Applications

Manufacturers

Showing results: 121 - 132 of 132 items found.

  • Simulators/Threat Emitters

    Antenna Research Associates

    Antennas for RADAR test, simulation and training are designed for integration into complete threat RADAR simulators for use on combat training and test ranges or in simulators for training and evaluation of RADAR operators, aircrews, air-traffic-control or weather radar applications. All antennas for RADAR simulators have high RF power handling capabilities and generally use pressurized transmission lines. Dual-band, single aperture antennas and a cluster of separate antennas mounted to a single pedestal are ideally suited for RADAR simulators in mobile, fixed, shipboard and airborne environments.

  • Interference Modeling And Simulation

    CAST Navigation

    The CAST Navigation Jammers are designed to facilitate and support the testing, verification, and integration of single element Fixed Reception Pattern Antenna (FRPA) systems as well as multiple-element anti-jam antenna sub-systems such as Controlled Reception Pattern Antennas (CRPAs). These systems are an ideal solution for military and commercial laboratories where interference signal capability is required. CAST Jammer sub-systems provide precisely controlled signals for use in most types of GNSS testing applications, emulating interference conditions and threats that can occur in both urban and hostile environments.

  • Thermal Imaging Camera

    IRT301 - Wuhan JOHO Technology Co., Ltd

    IRT301 Thermal Imaging CameraIRT301, a fixed-site thermal security camera lets you aware of intruders and other threats to your facility clearly in total darkness, smoke, mist and other harsh situation. It is compatible with a wide variety of third-party accessories, permit them easy to integrate. It enable to control and operation over digital and analog networks. With 384x288 pixel detector, it delivers high quality thermal image in any harsh environmental conditions, IRT301 is ideal for both indoor and outdoor surveillance, applications covered from industrial monitoring to city or boundary security monitoring. ApplicationBorder security and surveillanceRoad, channel, warehouse monitoringBuilding and industrial safety monitoringKey FeaturesRugged, waterproof and dustproof designHigh resolution, high frame rateAdvanced image processing technologyStandard interfaceVarious lenses and pan-tilt optionsTechnical specificationDetectorDetector MaterialUFPA microbolometer, AsiResolution384x288, 25mSpectral range8m~14mNETD80mK@30LensFocus

  • MWIR Systems

    L-3 Cincinnati Electronics

    L3 Cincinnati Electronics’ high-performance cooled mid-wave (3.5 – 5.0 µm) IR imagers are based on our patented InSb focal plane array architecture. Ideal for all combat conditions, L3 Cincinnati Electronics technology improves situational awareness in combat intelligence, sighting & tracking systems, threat deterrence and perimeter & border security with all-weather observation, day or night. These IR sensors can be utilized in urban, rural and remote situations where there are extreme climatic and terrain conditions. Well-suited for fixed or portable payloads, these imaging systems offer a substantially lower total life-cycle cost in comparison to other commercial IR imaging sensors.

  • Handheld Analyzer for Narcotics Identification

    BWT-840000994 - B&W Tek, Inc.

    The TacticID®–N Plus is a field-ready handheld instrument specifically designed for non-contact forensic analysis of narcotics, pharmaceutical drugs, cutting agents and precursors by law enforcement personnel.Featuring an intuitive workflow and touchscreen, samples can be nondestructively analyzed through opaque and transparent packaging, with sample threat level displayed prominently for first responders,safety personnel, law enforcement, bomb squads, customs and border patrol, and hazmat team to act quickly with minimal sample contact. The TacticID®–N Plus utilizes laboratory-proven Raman spectroscopy, whichallows users to obtain actionable identification of illicit substances without ever compromising the integrity of the sample or the chain of evidence.

  • Arbitrary Waveform Generators

    Proteus Series - Tabor Electronics Ltd.

    The new Proteus Arbitrary Waveform Generator is ideal for applications in Quantum Computing, Electronic Warfare, Radar, and next generation communications such as 5G, 6G, Ultrawide Bandwidth (UWB), and WiFi (802.11) 6 and 7. Built on the latest RF DAC and RF ADC technology, the series has sample rates up to 9GS/s and multiple Nyquist zone frequency range capability in excess of 10GHz. It’s an innovative task oriented programming environment, and user programmable FPGA. When used in combination with its optional RF Digitizer it gives you the ability to change waveforms in real-time - ideal for improving the coherence time of a Qubit, characterizing an RF amplifier, or responding to an EW threat.

  • VFTLP+ Test System

    4012 - Barth Electronics, Inc

    The Model 4012 VFTLP+™ test system was developed in early 2000 to add high speed measurements to the usual I-V plot, to measure and record the real TDDB waveform which causes oxide failure.*Accurate measurements of this waveform have finally been identified by Barth Electronics Inc. and CDM protection can now be based on known dimensional design parameters. We identify the response of your CDM protection circuits with 100ps risetime pulses which simulate the real CDM test. This is the only way with which to provide the total gate oxide threat voltage data.*Convenient, precise, repeatable operation*Computer controlled for automated testing

  • Security Testing Service

    Testhouse Ltd

    No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws

  • Focus Risk View

    Fasoo, Inc.

    Fasoo RiskView is a tool for security administrators that monitor activity related to unstructured data and user activities with confidential data. It gathers information from Fasoo Usage Tracer (the log analysis utility for Fasoo Enterprise DRM) and Fasoo eData Manager. It has APIs that can be configured to import log data from other security technology components, including firewalls, DLP, databases, and even physical security systems (e.g., entry/exit data from keycard or biometric systems) and employee attendance records. Fasoo RiskView includes a decision making framework that security administrators as well as business managers can use to review suspicious activities and after relevant investigations, in order to decide whether or not to take action to address these concerns with potential insider threats.

  • Portable Mass Spectrometer

    Continuity - BaySpec, Inc.

    Continuity™ - the most sensitive portable mass spectrometer designed to provide quality and reliable mass spectrometer analysis outside of the laboratory. Continuity™ was created to provide even higher sensitivity, greater specificity with built-in MS/MS, and larger mass range coverage than its ground-breaking counterpart Portability™. Like its counterpart, Continuity™ requires no sample preparation and is compatible with almost any ambient ionization source including ESI, APCI, TD-ESI, TD-APCI, and DBDI. It allows for a broad range of applications from clinical to drug to chemical and biological threats analysis. The user-friendly interface, rapid deployment, and real-time results make Continuity™ a great solution for fast, dependable, and highly sensitive field analysis for any user in any location. This potable mass spectrometer is the excellent solution for various challenging applications, including vapors/liquids/solids, CWAs/TICs, biological/biomedical, forensic, agriculture, food safety, security, and explosives.

  • Archival Storage Rooms

    Darwin Chambers Company

    Darwin Chambers Company’s NFPA, GSA, and NARA Directive 1571-compliant Archival Storage Chambers are engineered to provide maximum value, efficiency and conformance with all applicable standards and codes. Archival chambers provide environmental controls for storing records and materials (including paper documents and items with high fibrous content, various films, microfiche, and photographic materials) that require permanent protection for storage and preservation. Our high-performance systems are offered with nearly unlimited operational fail safes, includ- ing full system and control redundancy. In addition to keyed entry, numerous security options are also available, due to the often irreplaceable nature of the materials to be stored and preserved in this type of chamber. Our chambers are engineered to accommodate the loads and unique requirements of the specific materials to be stored, with industry-leading control and uniformity of both temperature and humidity variables. Design considerations include both functional and operational efficiencies and reliability, the safety and comfort of operating personnel, and the ongoing protection of the archived materials from fire, water, light degradation, pests, mold and natural contaminants, pollutants and other man- made threats.

  • Cybersecurity and Compliance Solution

    Application Audit - Compuware Corp.

    Application Audit, Compuware's mainframe cybersecurity and compliance solution, enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Using Application Audit, security staff can: Deter insider threats by capturing and analyzing start-to-finish user session activity. Integrate user behavior intelligence with popular SIEM engines to analyze the overall application environment. Support criminal/legal investigations with complete and credible forensics. Fulfill compliance mandates regarding protection of sensitive data. The Value of Application Audit. Provides deep insight into user behavior including data viewed, by whom and which applications were used to access it. Enables immediate analysis through the automatic delivery of data to SIEM platforms such as Splunk and QRadar, either directly or in combination with CorreLog zDefenderTM for z/OS or Syncsort Ironstream. Delivers granular intelligence and reporting capabilities needed to comply with regulations such as HIPAA and GDPR as well as security policies. Eliminates dependency on specialized mainframe knowledge. Separates the system administrator's duties from mainframe-inexperienced auditor's responsibilities with a web UI, so that no single person is in a position to engage in malicious activities without detection.

Get Help