Filter Results By:
Products
Applications
Manufacturers
Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
product
Application Monitoring Tool
Strong application monitoring tool enables IT teams, to get thorough insights into application health and response-time data. Go proactive with Motadata, which is one of the best application performance monitoring tools (APM) to identify potential threats that might bring operations down and fix the issue before it becomes a problem. Real-time metrics dashboard helps you stay on top of your application performance. Resolve application performance management issues before they impact your users or customers.
-
product
Power Supplies
RM-1000B
With dual PCI-E connectors, the RM Series carries all its essentials to power your system. Enjoy the graphic rendered programs and games without the threat of overheating. Its dark aluminum chassis not only looks good, but dramatically relieves heat built-up. The 120mm cooling fan enhances the already efficient heat dissipation rate and helps balance the cooling system with noise level. The RM Series is great for high end users to everyday casual users. Whatever your system needs, the RM Series can deliver.
-
product
Test And Simulation Devices
BreakingPoint
Control global threat intelligence at Internet-scale to create massive-scale, high fidelity simulation and testing conditions for battle-testing infrastructures, devices, applications, and people.
-
product
Laser Warnings Systems
Elbit Systems of America’s laser warning systems use both coherent and non-coherent laser sources. We understand the full scope of issues associated with each laser threat and have the systems engineering expertise necessary to accurately and reliably detect, locate and categorize these threats. Each LWS is equipped with a direction indicator and provides complete threat coverage in a high dynamic range with audio and visual warnings.
-
product
Perimeter Security And Coastal Surveillance Systems
These systems comprise of Radars and Cameras and can give early warming to the commanders about any intrusion/breach of perimeter of any restricted area. These can be integrated with jammers to tackle drone threats too.
-
product
Cyber Threat Assessment Program
Scientific Research Corp. STI Division
SRC provides threat assessment support focused on cyber threats that may impact the ability to wirelessly link with other systems. This activity supports the development of test and evaluation capabilities important to not only identifying current deficiencies but also for developing next generation systems.
-
product
Cyber Assurance
As the Internet of Things (IoT) continues to expand, connecting more and more of our world through communication devices, a growing trend has emerged: cyber security threats.
-
product
Power Supplies
RM-750B
With dual PCI-E connectors, the RM Series carries all its essentials to power your system. Enjoy the graphic rendered programs and games without the threat of overheating. Its dark aluminum chassis not only looks good, but dramatically relieves heat built-up. The 120mm cooling fan enhances the already efficient heat dissipation rate and helps balance the cooling system with noise level. The RM Series is great for high end users to everyday casual users. Whatever your system needs, the RM Series can deliver.
-
product
Network Security Testing
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
product
Blocklist Based Filtering
Many businesses prefer to use blocklists prepared by external intelligence agencies to save the time of generating this data themselves. Also, to get as much exposure and intelligence of the threat landscape as possible. However, this blocklist information can be sent in various formats, making utilizing them a challenge. Luckily, FastNetMon is a flexible blacklisting feed filtering tool that supports a vast array of formats to receive, consume, and use blocklists from different intelligence feed providers. FastNetMon then enables you to block specific malicious and dangerous hosts using blocklist-based filtering.
-
product
Digital Map Systems
Elbit Systems of America’s Global Digital Map Unit is built on a proven design that accommodates multiple data formats and provides unmatched situational awareness to aircrews. The GDMU displays detailed map, flight plan, and threat information to aircrews. Each system performs interactive functions with the mission computers and generates digital video map data for head down displays.
-
product
Fixed Surveillance System for Perimeter Security
Argus
Argus is a fixed, rugged, preconfigured wide area surveillance system. Combining a best-in-class radar and thermal camera with Command and Control software, Argus is designed to detect and track multiple threats both near and far in the most demanding weather conditions 24 /7. When compared to other perimeter security solutions, Argus has the lowest initial cost per kilometer of secured space as well as the lowest lifetime cost.
-
product
Threat Detection/Analysis
Schweitzer Engineering Laboratories, Inc.
Several SEL devices have built-in malware detection or can identify nonauthorized network traffic.
-
product
Deep Packet Inspection
FlowPro
FlowPro is inserted into areas of the network when visibility is needed. It uses a deep packet inspection (DPI) to compile a flow cache, and exports traffic and threat details reflecting 100% of all communications that pass by. FlowPro is a great complement to the Scrutinizer Incident Response System and ensures the security team has insight where they need it.
-
product
Interference Simulation System
GSS7765
Combined with Spirent’s powerful GSS7000 or GSS9000 Series simulators, the GSS7765 interference generator creates the ultimate tool for testing against external jamming and unintentional interference. The GSS7765 enables you to create and generate custom waveforms, helping you to defend your systems against real-world threats.
-
product
Web DDOS Protection
DDoS attacks continue to increase and still cause great damage today. In addition to the frequency, the complexity and duration of an attack cause major problems for the defense. Therefore, the deployed solution should intervene precisely and quickly to best protect you from threats and high costs due to downtime.
-
product
CBRN Detection
At Kromek, we’ve built an internationally renowned reputation within the Radiological and Biological Threat Detection industry. For over 20 years, we’ve designed, developed, manufactured, and distributed products, systems, and solutions to make the world a safer and healthier place.
-
product
Multi-Spectral UV/Laser Range Stimulator
Phantom™
The Phantom is a long-range laser and ultraviolet (UV) stimulator capable of testing aircraft electro-optical sensor suites up to 5 km. Phantom can operate as an independent laser and/or UV stimulator or can be integrated with our other electro-optical and radio frequency range systems (see GTESS and PRTS). The Phantom provides both a laser threat and a synchronized temporal missile plume signature to stimulate both the aircraft’s laser and missile warning systems. Training aircrew to counter maneuver a Laser Beam Riders (LBR) threat is considered essential to survival and in-air training. The Phantom can be deployed either on a shoulder or tripod mount.
-
product
High Definition Mid-Range Surveillance System
Ranger® HDC MR
The Ranger HDC MR sets a new standard for surveillance with its ability to detect illegal activities even in degraded weather conditions, utilizing embedded analytics and image processing to reduce the cognitive workload, enabling operators to distinguish quickly between true threats and false alarms. The HDC MR is not only a superior system in bad weather, it also provides increased uptime and reduces cyber risks -- a reliable tool that adds days of efficient surveillance and reduces risk compared to previous generations of systems.
-
product
Telephone And Line Analyzer
TALAN™ 3.0
The TALAN 3.0 Telephone and Line Analyzer represents advanced capability to detect and locate illicit tampering and security vulnerabilities on digital, analog, and VoIP telephone systems. New hardware provides the ability to test twisted pairs against modern telecommunication threats including shield and ground.
-
product
Compact Long range HD Multi-spectral Surveillance System
TacFLIR® 280-HD
TacFLIR 280-HD is a high-performance land-based imaging system designed to identify and track smugglers, terrorists, or any other threat – day and night, and in the toughest terrain. Tailored for mobile deployment with high definition imaging and powerful optics and INS, TacFLIR 280-HD reveals the details necessary for long range vehicle detection, identification, and threat assessment.
-
product
UXG X-Series Agile Vector Adapter, 50 MHz to 20 GHzNEW!
N5194A
The N5194A is part of the UXG family of signal generation products designed for threat simulation; simulate complex signal environments for radar/EW.
-
product
Security Testing Services
Alphabin Technology Consulting
Fortify your digital defenses and enhance the resilience of your systems to safeguard against cyber threats.
-
product
NAVAL LASER-WARNING SYSTEM
NLWS
Laser activity in your vicinity might mean the presence of a threat. Saab's Naval Laser-Warning System (NLWS) is capable of detecting and analysing lasers in blue-water and littoral combat environments. This system provides vitally important situational awareness to the command team about the presence of laser activity.
-
product
Position Sensors for Hazardous Environments
Intrinsically Safe systems provide a safe operating environment for personnel and equipment. Intrinsic Safety (IS) is based on the principle of restricting the electrical energy transmitted into a hazardous area, thereby ensuring that anysparks or heated surfaces that may occur as a result of electrical failures areinsufficient to cause ignition. The threat of an explosion is eliminated.
-
product
Sensor Enabled Neural Threat Recognition And Identification
SENTRI
The system is a breakthrough technology that recognizes gunshots and explosions and sends range and bearing details to cameras which can then locate the source of the event.
-
product
Security/Detection
If your design challenge is to create the best motion sensor or motion detector - fire sensor or fire detector, smoke sensor or smoke detector - you've come to the right company. Dexter's sensor technologies are at multiple fronts today, reducing the threat of combat on land, sea and air. Yet the industry leading advantages of Dexter sensors - low cost, high sensitivity, low energy consumption and long life - make them the perfect motion sensor for home, office and facility applications. Dexter thin-film and silicon detectors can target precise threats, whether defined by movement, temperature or body mass. Intensive MIL-STD-883H testing performed by Trialon Corporation, an independent testing facility, confirm that Dexter Research's silicon-based temperature sensor detectors meet the same rugged requirements of 1,000G's for mechanical shock and 30G's in random vibration for which our thin-film detectors are famous. Download Dexter's report here (PDF).
-
product
GNSS Simulation Engine
Skydel
Test a wide range of applications with advanced GNSS Simulators and helpful tools that generate basic scenarios all the way to complex threat environments, leveraging the power and scalability of the Skydel Simulation Engine. Skydel powers each of Safran Federal Systems' advanced software-defined simulators including BroadSim, BroadSim Anechoic and BroadSim Wavefront.
-
product
Cloud Security Solutions
Online threats are constantly changing. Offering protection against the largest and most sophisticated attacks, Akamai helps you safeguard your websites and other Internet-facing applications from the risks of downtime and data theft. Built on the Akamai Intelligent Platform, Akamai Cloud Security Solutions provide the scale to stop the largest Distributed Denial-of-Service (DDoS) and web application attacks without reducing performance, as well as intelligence into the latest threats and the expertise to adapt to shifting tactics and attack vectors.