Filter Results By:
Products
Applications
Manufacturers
Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
product
Jamming
ARA antennas have been successfully deployed by the US military to combat IED's throughout the world. These antennas cover frequency ranges from 20 MHz to over 6 GHz while providing excellent gain and RF threat spatial coverage.
-
product
PrAMC Based On QorIQ P4040/P4080, 10 GbE, SFP+
AMC710C
The AMC710C is a flexible processor AMC for general purpose processing with the quad-core QorIQ P4040 with Data Path Acceleration Architecture intended for router and UTM (unified threat management) applications.
-
product
Sensor Enabled Neural Threat Recognition And Identification
SENTRI
The system is a breakthrough technology that recognizes gunshots and explosions and sends range and bearing details to cameras which can then locate the source of the event.
-
product
Test And Simulation Devices
BreakingPoint
Control global threat intelligence at Internet-scale to create massive-scale, high fidelity simulation and testing conditions for battle-testing infrastructures, devices, applications, and people.
-
product
Position Sensors for Hazardous Environments
Intrinsically Safe systems provide a safe operating environment for personnel and equipment. Intrinsic Safety (IS) is based on the principle of restricting the electrical energy transmitted into a hazardous area, thereby ensuring that anysparks or heated surfaces that may occur as a result of electrical failures areinsufficient to cause ignition. The threat of an explosion is eliminated.
-
product
Radar Threat and Target Simulation Unit
MS 1605
PTG is used to field/LAB evaluation / testing of RADAR. PC is used to control the profile of the target generation. PTG will work in both stand alone and remote mode. The PTG has keypad and LCD for stand-alone operation. The PC can interface the PTG through the USB link. The operator can communicate through the GUI to the PTG. MIL1553B Communication used for Interfacing with RADAR.
-
product
High Definition Mid-Range Surveillance System
Ranger® HDC MR
The Ranger HDC MR sets a new standard for surveillance with its ability to detect illegal activities even in degraded weather conditions, utilizing embedded analytics and image processing to reduce the cognitive workload, enabling operators to distinguish quickly between true threats and false alarms. The HDC MR is not only a superior system in bad weather, it also provides increased uptime and reduces cyber risks -- a reliable tool that adds days of efficient surveillance and reduces risk compared to previous generations of systems.
-
product
Agile Signal Generators (UXG)
XSeries
Get a powerful building block, whether you need a dependable LO or a scalable threat simulator More accurately simulate multi-emitter scenarios for radar, EW and antenna test with the fastest switching, phase coherency, and extensive pulse-modulation Test sooner and increase confidence in EW system performance by generating complex signal simulations when you need them Increase the reliability of your test system: the UXG is a slide-in replacement for legacy fast-switching sources
-
product
Forensics and Investigation
Our Forensics and Investigation solutions will give you attack context, infrastructure-wide visibility, codified expertise, rich intelligence, and insights gained from front-line experience responding to the world’s most impactful threats. So, you’ll have everything you need to rapidly detect, triage, investigate, and minimize the impact of attacks. Develop attack context in near-real time and facilitate rapid investigations. Safely execute and analyze malware in a secure environment to strengthen threat intelligence.
-
product
GPS Jamming & Spoofing Detection
Patented GPS jamming and spoofing sensor technology, available in multiple configurations to fit your application. Tested and proven for more than a decade, our unique algorithms detect live threats and take action in seconds, while outputting data for post event analysis.
-
product
Application Monitoring Tool
Strong application monitoring tool enables IT teams, to get thorough insights into application health and response-time data. Go proactive with Motadata, which is one of the best application performance monitoring tools (APM) to identify potential threats that might bring operations down and fix the issue before it becomes a problem. Real-time metrics dashboard helps you stay on top of your application performance. Resolve application performance management issues before they impact your users or customers.
-
product
Security Testing Service
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws
-
product
IntelOwl
Intel Owl is an Open Source Intelligence, or OSINT solution to get threat intelligence data about a specific file, an IP or a domain from a single API at scale. It integrates a number of analyzers available online and is for everyone who needs a single point to query for info about a specific file or observable.
-
product
Infrared Camera for CO Detection and Electrical Inspections
FLIR GF346
The FLIR GF346 optical gas imaging camera detects carbon monoxide (CO) and 17 additional gases without the need to interrupt your plant's production process. CO emissions can be a significant threat to primary steel manufacturing operations; even the slightest leak in a vent stack or pipe can have a devastating effect. With the FLIR GF346, inspectors can scan large areas from a safe distance, pinpointing leaks in real-time, reducing repair down-time, and providing repair verification.
-
product
Web DDOS Protection
DDoS attacks continue to increase and still cause great damage today. In addition to the frequency, the complexity and duration of an attack cause major problems for the defense. Therefore, the deployed solution should intervene precisely and quickly to best protect you from threats and high costs due to downtime.
-
product
Multi-Spectral UV/Laser Range Stimulator
Phantom™
The Phantom is a long-range laser and ultraviolet (UV) stimulator capable of testing aircraft electro-optical sensor suites up to 5 km. Phantom can operate as an independent laser and/or UV stimulator or can be integrated with our other electro-optical and radio frequency range systems (see GTESS and PRTS). The Phantom provides both a laser threat and a synchronized temporal missile plume signature to stimulate both the aircraft’s laser and missile warning systems. Training aircrew to counter maneuver a Laser Beam Riders (LBR) threat is considered essential to survival and in-air training. The Phantom can be deployed either on a shoulder or tripod mount.
-
product
Archival Storage Rooms
Darwin Chambers Company’s NFPA, GSA, and NARA Directive 1571-compliant Archival Storage Chambers are engineered to provide maximum value, efficiency and conformance with all applicable standards and codes. Archival chambers provide environmental controls for storing records and materials (including paper documents and items with high fibrous content, various films, microfiche, and photographic materials) that require permanent protection for storage and preservation. Our high-performance systems are offered with nearly unlimited operational fail safes, includ- ing full system and control redundancy. In addition to keyed entry, numerous security options are also available, due to the often irreplaceable nature of the materials to be stored and preserved in this type of chamber. Our chambers are engineered to accommodate the loads and unique requirements of the specific materials to be stored, with industry-leading control and uniformity of both temperature and humidity variables. Design considerations include both functional and operational efficiencies and reliability, the safety and comfort of operating personnel, and the ongoing protection of the archived materials from fire, water, light degradation, pests, mold and natural contaminants, pollutants and other man- made threats.
-
product
Counter-Drone Solutions
ARDRONIS
The proliferation of malicious and non-cooperative drones is an ever-increasing threat to aviation and sensitive site security. Whether it be disruption of critical national infrastructure at home or risk of life to forward-deployed personnel abroad, civil and government organizations and agencies; all of them require affordable and reliable counter-drone solutions. Protective measures can only be taken after a threat is detected. To effectively counter the threat, early warning is necessary – every second counts.
-
product
Focus Risk View
Fasoo RiskView is a tool for security administrators that monitor activity related to unstructured data and user activities with confidential data. It gathers information from Fasoo Usage Tracer (the log analysis utility for Fasoo Enterprise DRM) and Fasoo eData Manager. It has APIs that can be configured to import log data from other security technology components, including firewalls, DLP, databases, and even physical security systems (e.g., entry/exit data from keycard or biometric systems) and employee attendance records. Fasoo RiskView includes a decision making framework that security administrators as well as business managers can use to review suspicious activities and after relevant investigations, in order to decide whether or not to take action to address these concerns with potential insider threats.
-
product
Aviation Security
Aviation is highly regulated, from ICAO Annex 17 to National Security Programs. Due to its high profile and the subsequent multitude of threats, regulation safeguards travel security. Our expertise will support your business, by supplying market leading X-Ray and Metal detection products along with maintenance, that meet the regulator requirements and best fit your business.
-
product
Portable Mass Spectrometer
Continuity
Continuity™ - the most sensitive portable mass spectrometer designed to provide quality and reliable mass spectrometer analysis outside of the laboratory. Continuity™ was created to provide even higher sensitivity, greater specificity with built-in MS/MS, and larger mass range coverage than its ground-breaking counterpart Portability™. Like its counterpart, Continuity™ requires no sample preparation and is compatible with almost any ambient ionization source including ESI, APCI, TD-ESI, TD-APCI, and DBDI. It allows for a broad range of applications from clinical to drug to chemical and biological threats analysis. The user-friendly interface, rapid deployment, and real-time results make Continuity™ a great solution for fast, dependable, and highly sensitive field analysis for any user in any location. This potable mass spectrometer is the excellent solution for various challenging applications, including vapors/liquids/solids, CWAs/TICs, biological/biomedical, forensic, agriculture, food safety, security, and explosives.
-
product
Blocklist Based Filtering
Many businesses prefer to use blocklists prepared by external intelligence agencies to save the time of generating this data themselves. Also, to get as much exposure and intelligence of the threat landscape as possible. However, this blocklist information can be sent in various formats, making utilizing them a challenge. Luckily, FastNetMon is a flexible blacklisting feed filtering tool that supports a vast array of formats to receive, consume, and use blocklists from different intelligence feed providers. FastNetMon then enables you to block specific malicious and dangerous hosts using blocklist-based filtering.
-
product
Environmental Shock Simulation Machine For Drop Testing
# Simulates environmental handling threats small handheld products must survive.# Gauges your product?s ability to survive handling environments.# Controls key test variables: product orientation at impact; nature of the impact surface.# Maintains orientation to just prior to impact then releases for unrestrained impact.# llows user changeable impact surfaces to better simulate the handing environment.# Includes 4 ch short transient shock instrumentation system.
-
product
Vehicle Based Gunshot Localisation
ACLOGUS
Incoming direct fire poses a threat to the vehicle and, when manned, to its crew. Traditional acoustic systems to detect and localize incoming Small Arms Fire do not work when the vehicle is driving, which is in essence the key to survive on the battlefield in the first place.
-
product
Cybersecurity and Compliance Solution
Application Audit
Application Audit, Compuware's mainframe cybersecurity and compliance solution, enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Using Application Audit, security staff can: Deter insider threats by capturing and analyzing start-to-finish user session activity. Integrate user behavior intelligence with popular SIEM engines to analyze the overall application environment. Support criminal/legal investigations with complete and credible forensics. Fulfill compliance mandates regarding protection of sensitive data. The Value of Application Audit. Provides deep insight into user behavior including data viewed, by whom and which applications were used to access it. Enables immediate analysis through the automatic delivery of data to SIEM platforms such as Splunk and QRadar, either directly or in combination with CorreLog zDefenderTM for z/OS or Syncsort Ironstream. Delivers granular intelligence and reporting capabilities needed to comply with regulations such as HIPAA and GDPR as well as security policies. Eliminates dependency on specialized mainframe knowledge. Separates the system administrator's duties from mainframe-inexperienced auditor's responsibilities with a web UI, so that no single person is in a position to engage in malicious activities without detection.
-
product
Web Application Firewall
WAF
Your website security solution needs to keep up with the changing cyber threat. Protect your website with Cloudbric’s cloud WAF to block unknown and modified attacks.
-
product
CBRN Detection
At Kromek, we’ve built an internationally renowned reputation within the Radiological and Biological Threat Detection industry. For over 20 years, we’ve designed, developed, manufactured, and distributed products, systems, and solutions to make the world a safer and healthier place.
-
product
Advanced Threat Detection
The Passive Airborne Warning System (PAWS) family of IR-based Passive Warning Systems provides a comprehensive, turn-key solution for airborne platforms. The sophisticated IR missile warning systems enhances airborne platform survivability by providing advanced warning of the presence of threatening missiles and by automatic management to all types of applicable countermeasures available onboard.
-
product
Bio-Threat Detection & Collection
IBAC 2
The IBAC 2 is a fully automated bio-detection sensor that can support continual, 24/7, air monitoring or can be set to targeting sampling windows to align to hours of operation. It alarms in less than 60 seconds when a bio-threat is present. IBAC can be configured to support automated aerosol sampling either in conjunction with its’ triggered alarms or at a set frequency sampling time. In wide service throughout the world, IBAC 2 is used to collect and detect aerosolized agents for all four classes of biological threats (spore, viral, cellular, and protein toxins) with low false alarm.
-
product
Network Security Testing
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.