Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
product
Radar Threat and Target Simulation Unit
MS 1605
PTG is used to field/LAB evaluation / testing of RADAR. PC is used to control the profile of the target generation. PTG will work in both stand alone and remote mode. The PTG has keypad and LCD for stand-alone operation. The PC can interface the PTG through the USB link. The operator can communicate through the GUI to the PTG. MIL1553B Communication used for Interfacing with RADAR.
-
product
Cybersecurity and Compliance Solution
Application Audit
Application Audit, Compuware's mainframe cybersecurity and compliance solution, enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Using Application Audit, security staff can: Deter insider threats by capturing and analyzing start-to-finish user session activity. Integrate user behavior intelligence with popular SIEM engines to analyze the overall application environment. Support criminal/legal investigations with complete and credible forensics. Fulfill compliance mandates regarding protection of sensitive data. The Value of Application Audit. Provides deep insight into user behavior including data viewed, by whom and which applications were used to access it. Enables immediate analysis through the automatic delivery of data to SIEM platforms such as Splunk and QRadar, either directly or in combination with CorreLog zDefenderTM for z/OS or Syncsort Ironstream. Delivers granular intelligence and reporting capabilities needed to comply with regulations such as HIPAA and GDPR as well as security policies. Eliminates dependency on specialized mainframe knowledge. Separates the system administrator's duties from mainframe-inexperienced auditor's responsibilities with a web UI, so that no single person is in a position to engage in malicious activities without detection.
-
product
Situational Understanding Mission Intelligent Technology
SUMIT360™
The SUMIT360™ provides military armored vehicle operators with an innovative, 360 degree view of the environment around the vehicle utilizing advanced sensor technology to improve threat and obstacle detection that could pose a threat to ground forces, and their mission. Equipped with powerful multi-spectral sensors in each module, the system uses on-board processing to form seamless, stitched images to provide a full field of view in any terrain, and virtually any conditions, day or night. With additional target detection and identification capability, the system can also be paired with advanced analytics and Artificial Intelligence (AI) to provide vehicle crew, and transported troops a threat detection and classification to provide critical decision support before opening the hatch. The system also provides the ability to support remote or optionally manned configurations.
-
product
Network Security Testing
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
product
Spectrum Monitoring & Signal Intelligence
Modern spectrum monitoring and signal intelligence systems can capture, process, and record wide signal bandwidths at a broad range of frequencies. Engineers need flexible software to adapt these systems to new signal types and threats.
-
product
Infrared Camera for CO Detection and Electrical Inspections
FLIR GF346
The FLIR GF346 optical gas imaging camera detects carbon monoxide (CO) and 17 additional gases without the need to interrupt your plant's production process. CO emissions can be a significant threat to primary steel manufacturing operations; even the slightest leak in a vent stack or pipe can have a devastating effect. With the FLIR GF346, inspectors can scan large areas from a safe distance, pinpointing leaks in real-time, reducing repair down-time, and providing repair verification.
-
product
Aviation Security
Aviation is highly regulated, from ICAO Annex 17 to National Security Programs. Due to its high profile and the subsequent multitude of threats, regulation safeguards travel security. Our expertise will support your business, by supplying market leading X-Ray and Metal detection products along with maintenance, that meet the regulator requirements and best fit your business.
-
product
NAVAL LASER-WARNING SYSTEM
NLWS
Laser activity in your vicinity might mean the presence of a threat. Saab's Naval Laser-Warning System (NLWS) is capable of detecting and analysing lasers in blue-water and littoral combat environments. This system provides vitally important situational awareness to the command team about the presence of laser activity.
-
product
FlowSpec DDoS Mitigation
Large volumetric-based DDoS attacks are increasing in terms of frequency and scale at which they are perpetrated. With hundreds of-gigabits worth of attacks becoming commonplace, organizations not only face service interruptions for customers but the complete implosion of their infrastructure’s operation. In the face of this increasingly challenging threat landscape, BGP FlowSpec DDoS mitigation has emerged as one of the most effective techniques to mitigate DDoS attacks. Combined with an accurate and speedy detection system, it helps manage and synchronize working with firewalls to mitigate these attacks.
-
product
Advanced Threat Detection
The Passive Airborne Warning System (PAWS) family of IR-based Passive Warning Systems provides a comprehensive, turn-key solution for airborne platforms. The sophisticated IR missile warning systems enhances airborne platform survivability by providing advanced warning of the presence of threatening missiles and by automatic management to all types of applicable countermeasures available onboard.
-
product
Web Application Firewall
WAF
Your website security solution needs to keep up with the changing cyber threat. Protect your website with Cloudbric’s cloud WAF to block unknown and modified attacks.
-
product
Threat Detection/Analysis
Schweitzer Engineering Laboratories, Inc.
Several SEL devices have built-in malware detection or can identify nonauthorized network traffic.
-
product
Jamming
ARA antennas have been successfully deployed by the US military to combat IED's throughout the world. These antennas cover frequency ranges from 20 MHz to over 6 GHz while providing excellent gain and RF threat spatial coverage.
-
product
Biological Detection
Collaborating with government agencies in the USA and UK in the field of biological threat detection, Kromek is working towards the common goal of improving the early detection of biological threats anytime and anywhere, making the world safer and healthier.
-
product
PrAMC Based On QorIQ P4040/P4080, 10 GbE, SFP+
AMC710C
The AMC710C is a flexible processor AMC for general purpose processing with the quad-core QorIQ P4040 with Data Path Acceleration Architecture intended for router and UTM (unified threat management) applications.
-
product
Situational Awareness
SA is utilized to secure borders from illegal trafficking, to monitor supply line routes against the placement of roadside bombs, to provide our warfighters the tools they need to alert them to potential threats, and to identify and defeat the enemy, day or night.
-
product
Multispectral Fixed Camera for Perimeter Protection
FH-Series ID
The FLIR FH-Series ID are ruggedized, multispectral fixed cameras that integrate industry-leading thermal imaging with 4K visible imaging to provide reliable intruder-detection capabilities for perimeter security. Built-in convolutional neural network (CNN) analytics accurately detect and classify human and vehicle threats moving at high or low speeds, minimizing false alarms and daily operations costs. Custom scheduling enables security operators to set intrusion analytics to run on visible streams during the day and on thermal streams throughout the night, establishing optimized coverage for any lighting condition.
-
product
Adjunct Simulation Engine
Curtiss-Wright Defense Solutions
Responding to the increasing need for realistic and effective military training to counter today’s varied threats while keeping to the budget, TCG ASE offers high fidelity, real-time, and configurable simulated tactical data link information for operational and training networks.
-
product
Security Products
Security is no longer an option; it’s a requirement. As your trusted provider of platform security solutions, our comprehensive portfolio addresses a variety of threat models.
-
product
Blocklist Based Filtering
Many businesses prefer to use blocklists prepared by external intelligence agencies to save the time of generating this data themselves. Also, to get as much exposure and intelligence of the threat landscape as possible. However, this blocklist information can be sent in various formats, making utilizing them a challenge. Luckily, FastNetMon is a flexible blacklisting feed filtering tool that supports a vast array of formats to receive, consume, and use blocklists from different intelligence feed providers. FastNetMon then enables you to block specific malicious and dangerous hosts using blocklist-based filtering.
-
product
MWIR Systems
L3 Cincinnati Electronics’ high-performance cooled mid-wave (3.5 – 5.0 µm) IR imagers are based on our patented InSb focal plane array architecture. Ideal for all combat conditions, L3 Cincinnati Electronics technology improves situational awareness in combat intelligence, sighting & tracking systems, threat deterrence and perimeter & border security with all-weather observation, day or night. These IR sensors can be utilized in urban, rural and remote situations where there are extreme climatic and terrain conditions. Well-suited for fixed or portable payloads, these imaging systems offer a substantially lower total life-cycle cost in comparison to other commercial IR imaging sensors.
-
product
Advanced DDoS
The barrier to entry has been obliterated by new tools that enable anyone with an Internet connection and a grievance to launch a DDoS attack. This is a true game changer in terms of the threat landscape and what businesses should consider themselves a potential target of attack. It used to be certain verticals would be likely targets for a DDoS attack; finance, gaming and e-commerce at the top of the list. Today, any business, for any reason, any real or perceived offense or affiliation, can become a target of a DDoS attack.
-
product
Security intelligence & analytics
Detect and prioritize threats that pose the greatest risk. dentify high-risk threats with near real-time correlation and behavioral anomaly detection. Detect vulnerabilities, manage risks and identify high-priority incidents among billions of data points.Gain full visibility into network, application and user activity.
-
product
Environmental Shock Simulation Machine For Drop Testing
# Simulates environmental handling threats small handheld products must survive.# Gauges your product?s ability to survive handling environments.# Controls key test variables: product orientation at impact; nature of the impact surface.# Maintains orientation to just prior to impact then releases for unrestrained impact.# llows user changeable impact surfaces to better simulate the handing environment.# Includes 4 ch short transient shock instrumentation system.
-
product
Vehicle Based Gunshot Localisation
ACLOGUS
Incoming direct fire poses a threat to the vehicle and, when manned, to its crew. Traditional acoustic systems to detect and localize incoming Small Arms Fire do not work when the vehicle is driving, which is in essence the key to survive on the battlefield in the first place.
-
product
Detector Ecosystem
PERL™
Revolutionizing R/ N threat detection and identification through advanced algorithms and hardware designs optimized for maximizing signal extraction in low signal-to-clutter conditions
-
product
GPS Jamming & Spoofing Detection
Patented GPS jamming and spoofing sensor technology, available in multiple configurations to fit your application. Tested and proven for more than a decade, our unique algorithms detect live threats and take action in seconds, while outputting data for post event analysis.
-
product
Fixed Surveillance System for Perimeter Security
Argus
Argus is a fixed, rugged, preconfigured wide area surveillance system. Combining a best-in-class radar and thermal camera with Command and Control software, Argus is designed to detect and track multiple threats both near and far in the most demanding weather conditions 24 /7. When compared to other perimeter security solutions, Argus has the lowest initial cost per kilometer of secured space as well as the lowest lifetime cost.
-
product
High-Speed Maneuvering Surface Target (HSMST)
Kratos Defense & Security Solutions, Inc.
The Kratos C2 is currently in use and supporting mission operations for the U.S. Navy and Army utilizing the High-Speed Maneuvering Surface Target (HSMST), developed in response to a requirement for a 40+ knot target to represent littoral threats encountered by the fleet and which would retain 35 kt capability in advanced sea states. Kratos has successfully supported weapons testing missions that required waves of multiple independently controlled HSMST’s (more than 10 vessels) coming from multiple axes.
-
product
SaaS Platform.
GreyMatter
Security practitioners are often on the defensive. There aren’t enough hours in the day or people with the broad skill sets needed to keep up with threats evolving at machine speed. That’s why we’re committed to making automation work across the entire security lifecycle. We believe the only way to make security possible is to automate away the repetitive and mundane. That’s why we built ReliaQuest GreyMatter, the first unified threat detection, investigation and response SaaS platform.





























