Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
product
Threat Warning
Long-range, multi-threat capabilities provide continuous tracking while search and verification of surface-to-air and air-to-air missile launches for unsurpassed survivability.
-
product
Threat Detection/Analysis
Schweitzer Engineering Laboratories, Inc.
Several SEL devices have built-in malware detection or can identify nonauthorized network traffic.
-
product
Radar Threat and Target Simulation Unit
MS 1605
PTG is used to field/LAB evaluation / testing of RADAR. PC is used to control the profile of the target generation. PTG will work in both stand alone and remote mode. The PTG has keypad and LCD for stand-alone operation. The PC can interface the PTG through the USB link. The operator can communicate through the GUI to the PTG. MIL1553B Communication used for Interfacing with RADAR.
-
product
Phobos Threat Warner System
QR020
Gain military advantage with the world's most compact and accessible R-ESM system. Phobos delivers increased real-time intelligence in the most complex operational environments.
-
product
Bio-Threat Detection & Collection
IBAC 2
The IBAC 2 is a fully automated bio-detection sensor that can support continual, 24/7, air monitoring or can be set to targeting sampling windows to align to hours of operation. It alarms in less than 60 seconds when a bio-threat is present. IBAC can be configured to support automated aerosol sampling either in conjunction with its’ triggered alarms or at a set frequency sampling time. In wide service throughout the world, IBAC 2 is used to collect and detect aerosolized agents for all four classes of biological threats (spore, viral, cellular, and protein toxins) with low false alarm.
-
product
Portable Range Threat Simulators
The Textron System's PRTS™ and HPRTS™ are medium and long-range, programmable, ruggedized Radio Frequency (RF) test and training tools. Our PRTS family of range simulators delivers high-fidelity environments for training ranges.
-
product
Testing and Assessment Services for Unmanned Aerial Vehicles
Unmanned aerial vehicles (UAVs), more commonly known as drones, have many applications. UAVs can be used in agriculture for crop spraying, movie making and aerial photography, disaster relief, and can even imitate flying animals for conservation or research purposes. Our services can help you make sure your UAVs meet international norms and standards. We test materials and resilience, confirming that your drones do not pose a threat to human health or the environment. Our services can help you make sure your UAVs meet international norms and standards. We test materials and resilience, confirming that your drones do not pose a threat to human health or the environment. Our team of experts is dedicated to UAVs and their applications – and a global network of offices. We can give you the advice and expertise you need to speed your drones to market. Our team of experts is dedicated to UAVs and their applications – and a global network of offices. We can give you the advice and expertise you need to speed your drones to market.
-
product
Security and Traffic Monitoring System
Information System Technologies Inc.
ISTI’s versatile sensor nodes can support multiple sensing types including acoustic, seismic, visible/IR, and scanning laser. Several eye-safe scanning lasers form a distributed wireless sensor network and can continuously and accurately track as well as monitor ground vehicles and personnel in a surveillance area. This system provides super-fine angular and range resolution to precisely locate moving targets. Among other key benefits are: day/night operational capability, continuous monitoring and surveillance without blind spots, 360 degrees field-of-view, large coverage area, multiple closely spaced target tracking, threat classification, and automatic alarm generation. The system can be used in applications such as traffic monitoring, intrusion detection, border control, airport runway collision and incursion avoidance, and perimeter security.
-
product
Cloud Security
Cloud Security Assessment is the most critical phase before the product is finally deployed and Product is finally ready to handle real-world cyber security threats.
-
product
Detector Ecosystem
PERL™
Revolutionizing R/ N threat detection and identification through advanced algorithms and hardware designs optimized for maximizing signal extraction in low signal-to-clutter conditions
-
product
Azure Data Lake Storage
Eliminate data silos with a single storage platform. Optimize costs with tiered storage and policy management. Authenticate data using Azure Active Directory (Azure AD) and role-based access control (RBAC). And help protect data with security features like encryption at rest and advanced threat protection.
-
product
Environmental Shock Simulation Machine For Drop Testing
# Simulates environmental handling threats small handheld products must survive.# Gauges your product?s ability to survive handling environments.# Controls key test variables: product orientation at impact; nature of the impact surface.# Maintains orientation to just prior to impact then releases for unrestrained impact.# llows user changeable impact surfaces to better simulate the handing environment.# Includes 4 ch short transient shock instrumentation system.
-
product
Perimeter Security And Coastal Surveillance Systems
These systems comprise of Radars and Cameras and can give early warming to the commanders about any intrusion/breach of perimeter of any restricted area. These can be integrated with jammers to tackle drone threats too.
-
product
Gas Detection
Explosive or toxic gases are a constant threat in industry as well as civil and military security. Second Sight is an innovative instrument to protect infrastructures and population throuht early warning.
-
product
Jamming
ARA antennas have been successfully deployed by the US military to combat IED's throughout the world. These antennas cover frequency ranges from 20 MHz to over 6 GHz while providing excellent gain and RF threat spatial coverage.
-
product
Security Vehicles
When you need to set up robust security operations in a temporary or outdoor location, our security vehicles can provide a tried and tested solution. For use at festivals, public ceremonies, sports events and other outdoor functions, our mobile check point and scan truck will help keep your guests or members of the public safe from security threats.
-
product
Compact Long range HD Multi-spectral Surveillance System
TacFLIR® 280-HD
TacFLIR 280-HD is a high-performance land-based imaging system designed to identify and track smugglers, terrorists, or any other threat – day and night, and in the toughest terrain. Tailored for mobile deployment with high definition imaging and powerful optics and INS, TacFLIR 280-HD reveals the details necessary for long range vehicle detection, identification, and threat assessment.
-
product
Cargo and Vehicle Inspection
In a world where threats continue to evolve and concealment techniques become more sophisticated, our customers are facing more complex, difficult missions than ever.
-
product
Telephone And Line Analyzer
TALAN™ 3.0
The TALAN 3.0 Telephone and Line Analyzer represents advanced capability to detect and locate illicit tampering and security vulnerabilities on digital, analog, and VoIP telephone systems. New hardware provides the ability to test twisted pairs against modern telecommunication threats including shield and ground.
-
product
Red Team Engagement
Red Team Assessment (Red Teaming) is an activity where a group of white hat hackers (or penetration tester) perform a series of activities to assess the company’s security readiness towards real-world cyber threats. Red teaming aims to ‘attack’ an organization’s digital and physical infrastructure to evaluate the organization’s security defense and posture, at the same time targeting to obtain any sensitive and beneficial information. Red Teaming usually emulates several malicious actors to penetrate the organization’s digital and physical infrastructure security.
-
product
Situational Understanding Mission Intelligent Technology
SUMIT360™
The SUMIT360™ provides military armored vehicle operators with an innovative, 360 degree view of the environment around the vehicle utilizing advanced sensor technology to improve threat and obstacle detection that could pose a threat to ground forces, and their mission. Equipped with powerful multi-spectral sensors in each module, the system uses on-board processing to form seamless, stitched images to provide a full field of view in any terrain, and virtually any conditions, day or night. With additional target detection and identification capability, the system can also be paired with advanced analytics and Artificial Intelligence (AI) to provide vehicle crew, and transported troops a threat detection and classification to provide critical decision support before opening the hatch. The system also provides the ability to support remote or optionally manned configurations.
-
product
TDL Training Tools and Services
Curtiss-Wright Defense Solutions
To prepare for the threats of the battlefield, warfighters must be familiar with what they will encounter. With extensive experience in tactical data link training and technology, Curtiss-Wright has the tools and expertise to provide your organization with solutions that facilitate tactical data link communication on the battlefield.
-
product
Radiation Detection & Measurement Products
Detect, localize, identify, and measure radioactivity in any scenario. From routine monitoring and surveillance to emergency response situations, our advanced, integrated radiation detection instruments mitigate the threat and keep you safe. Our product portfolio of radiation detection solutions provides comprehensive, real-time monitoring, early warning, and complete information in the palm of your hand, in the work place, and in your neighborhood.
-
product
SaaS Platform.
GreyMatter
Security practitioners are often on the defensive. There aren’t enough hours in the day or people with the broad skill sets needed to keep up with threats evolving at machine speed. That’s why we’re committed to making automation work across the entire security lifecycle. We believe the only way to make security possible is to automate away the repetitive and mundane. That’s why we built ReliaQuest GreyMatter, the first unified threat detection, investigation and response SaaS platform.
-
product
Spectrum Monitoring & Signal Intelligence
Modern spectrum monitoring and signal intelligence systems can capture, process, and record wide signal bandwidths at a broad range of frequencies. Engineers need flexible software to adapt these systems to new signal types and threats.
-
product
Cyber Security Assessment
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
product
Deep Packet Inspection
FlowPro
FlowPro is inserted into areas of the network when visibility is needed. It uses a deep packet inspection (DPI) to compile a flow cache, and exports traffic and threat details reflecting 100% of all communications that pass by. FlowPro is a great complement to the Scrutinizer Incident Response System and ensures the security team has insight where they need it.
-
product
Managed Threat Detection Service
GuardDuty
Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads. It monitors for activity such as unusual API calls or potentially unauthorized deployments that indicate a possible account compromise. GuardDuty also detects potentially compromised instances or reconnaissance by attackers.
-
product
Multi-Spectral UV/Laser Range Stimulator
Phantom™
The Phantom is a long-range laser and ultraviolet (UV) stimulator capable of testing aircraft electro-optical sensor suites up to 5 km. Phantom can operate as an independent laser and/or UV stimulator or can be integrated with our other electro-optical and radio frequency range systems (see GTESS and PRTS). The Phantom provides both a laser threat and a synchronized temporal missile plume signature to stimulate both the aircraft’s laser and missile warning systems. Training aircrew to counter maneuver a Laser Beam Riders (LBR) threat is considered essential to survival and in-air training. The Phantom can be deployed either on a shoulder or tripod mount.
-
product
Advanced Threat Detection
The Passive Airborne Warning System (PAWS) family of IR-based Passive Warning Systems provides a comprehensive, turn-key solution for airborne platforms. The sophisticated IR missile warning systems enhances airborne platform survivability by providing advanced warning of the presence of threatening missiles and by automatic management to all types of applicable countermeasures available onboard.





























