Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
product
Surveillance System for Long-Range Applications
ThermoVision™ (THV) 3000 MultiSensor
The ThermoVision™ (THV) 3000 detects and classifies illegal activities and threats in total darkness, smoke, sand haze, and broad daylight conditions. The thermal camera is equipped with a long-wave, cooled Quantum Well Infrared Photodetector (QWIP) and switchable optics offering three different fields of view. It provides excellent situational awareness while also closely monitoring suspect activities in real-time. Ideal applications include perimeter security, border and coastal surveillance, force protection, and mid-range threat detection.
-
product
UXG X-Series Vector Adapter, Modified Version, 50 MHz To 20 GHz
N5192A
The N5192A is part of the UXG family of signal generation products designed for threat simulation; simulate complex signal environments for radar/EW.
-
product
All Hazards Detection & Identification Tool
MX908
MX908™ leverages high-pressure mass spectrometry (HPMS) to deliver dramatically enhanced sensitivity and broader threat category coverage. MX908 hosts an all hazards threat list which has been upgraded to include a broader spectrum of chemical warfare agents (CWA), explosives and high priority toxic industrial chemical (TIC) targets. From military grade, commercial and improvised explosives to novel threat materials, MX908 supports the needs of the modern mission.
-
product
Deep Packet Inspection
FlowPro
FlowPro is inserted into areas of the network when visibility is needed. It uses a deep packet inspection (DPI) to compile a flow cache, and exports traffic and threat details reflecting 100% of all communications that pass by. FlowPro is a great complement to the Scrutinizer Incident Response System and ensures the security team has insight where they need it.
-
product
Compact Long range HD Multi-spectral Surveillance System
TacFLIR® 280-HD
TacFLIR 280-HD is a high-performance land-based imaging system designed to identify and track smugglers, terrorists, or any other threat – day and night, and in the toughest terrain. Tailored for mobile deployment with high definition imaging and powerful optics and INS, TacFLIR 280-HD reveals the details necessary for long range vehicle detection, identification, and threat assessment.
-
product
Red Team Engagement
Red Team Assessment (Red Teaming) is an activity where a group of white hat hackers (or penetration tester) perform a series of activities to assess the company’s security readiness towards real-world cyber threats. Red teaming aims to ‘attack’ an organization’s digital and physical infrastructure to evaluate the organization’s security defense and posture, at the same time targeting to obtain any sensitive and beneficial information. Red Teaming usually emulates several malicious actors to penetrate the organization’s digital and physical infrastructure security.
-
product
UXG X-Series Agile Signal Generator, Modified Version
N5191A
et closer to reality: simulate increasingly complex signal environments for radar, EW & antenna-test Test sooner & increase confidence in EW systems by generating signal simulations when you need them: the UXG is a scalable threat simulator Use pulse descriptor words (PDWs) to generate long pulse trains & individually control pulse characteristics Quickly characterize antennas over a wide frequency range with fast frequency tuning Performance without requiring an export license
-
product
Infrared Camera Window with PIRma-Lock
FLIR IR Windows Series
FLIR's IR Windows add a barrier between you and energized equipment, protecting you from arc flash accidents. IR windows are easy to install, easy to use, and will help you work with greater confidence. You’ll perform inspections more efficiently and reduce the threat of arc flash injury, all while staying in compliance with NFPA 70E requirements. Choose the anodized aluminum frame, or opt for durable stainless steel to prevent mixed metal issues.
-
product
Network Traffic Visibility
Organisations and businesses are relying more on the network than ever before. In many instances, the network has become the business, such as is the case for managed service providers (MSPs), residential ISPs, mobile carriers, data centers, etc. Unfortunately, at the same time, networks have never been under this level of threat from malicious sources who want to disrupt or even damage infrastructure with various motivations.
-
product
Test And Simulation Devices
BreakingPoint
Control global threat intelligence at Internet-scale to create massive-scale, high fidelity simulation and testing conditions for battle-testing infrastructures, devices, applications, and people.
-
product
Special Operations Intelligence Collection Systems
Scientific Research Corp. STI Division
SRC designs, develops, produces, and supports the Joint Threat Warning System for Special Operations. This family of systems is used on air, land, and sea to provide threat situational awareness and intelligence collection capabilities for high-value missions.
-
product
Cyber Assurance
As the Internet of Things (IoT) continues to expand, connecting more and more of our world through communication devices, a growing trend has emerged: cyber security threats.
-
product
Visual Fault Locators
Visual fault locators are used to identify problems with your fiber. GAOTek visual fault locators typically are applied for fiber tracing, fiber routine, and continuity checking. Imagine being able to easily identify when and where a fiber is breaking, bending, or when there’s a threat to the fiber layer.
-
product
Security Testing Services
Alphabin Technology Consulting
Fortify your digital defenses and enhance the resilience of your systems to safeguard against cyber threats.
-
product
Interference Modeling And Simulation
The CAST Navigation Jammers are designed to facilitate and support the testing, verification, and integration of single element Fixed Reception Pattern Antenna (FRPA) systems as well as multiple-element anti-jam antenna sub-systems such as Controlled Reception Pattern Antennas (CRPAs). These systems are an ideal solution for military and commercial laboratories where interference signal capability is required. CAST Jammer sub-systems provide precisely controlled signals for use in most types of GNSS testing applications, emulating interference conditions and threats that can occur in both urban and hostile environments.
-
product
Azure Data Lake Storage
Eliminate data silos with a single storage platform. Optimize costs with tiered storage and policy management. Authenticate data using Azure Active Directory (Azure AD) and role-based access control (RBAC). And help protect data with security features like encryption at rest and advanced threat protection.
-
product
1U 19” Network Appliance With AMD® Ryzen 7000 Family Processor
CSA-5100A
CSA-5100A is a powerful 1U rackmount network appliance, designed for mid-range network security applications like Firewall-as-a-Service (FWaaS) and Next-Generation Firewalls (NGFW), SD-WAN, End-to-end encryption, WAN optimization, cloud acceleration, NGFW, advanced threat prevention, mobile security, secure web gateway.
-
product
Agile Signal Generators (UXG)
XSeries
Get a powerful building block, whether you need a dependable LO or a scalable threat simulator More accurately simulate multi-emitter scenarios for radar, EW and antenna test with the fastest switching, phase coherency, and extensive pulse-modulation Test sooner and increase confidence in EW system performance by generating complex signal simulations when you need them Increase the reliability of your test system: the UXG is a slide-in replacement for legacy fast-switching sources
-
product
Gas Detection
Explosive or toxic gases are a constant threat in industry as well as civil and military security. Second Sight is an innovative instrument to protect infrastructures and population throuht early warning.
-
product
Power Supplies
MP-550B
With dual PCI-E connectors, the MP Series carries all its essentials to power your system. Enjoy the graphic rendered programs and games without the threat of overheating. Its dark aluminum chassis not only looks good, but dramatically relieves heat built-up. The 120mm fan enhances the already efficient heat dissipation rate and helps balance the cooling system with noise level. The MP Series is great for high end users to everyday casual users. Whatever your system needs, the MP Series can deliver.
-
product
Utility Detection Radar
DS2000
There’s a lot going on underground that you need to know about before you ever start to dig. The Leica DS2000 Utility Detection Radar finds all potential threats, including non-conductive pipes and fibre optics, increasing safety by lowering the risk of accidently hitting underground assets. Increase safety, speed up work and lower asset management costs with the ability to prevent hazardous outages and collect more information. The DS2000 betters your business by making it safer, faster and more efficient.
-
product
Telephone And Line Analyzer
TALAN™ 3.0
The TALAN 3.0 Telephone and Line Analyzer represents advanced capability to detect and locate illicit tampering and security vulnerabilities on digital, analog, and VoIP telephone systems. New hardware provides the ability to test twisted pairs against modern telecommunication threats including shield and ground.
-
product
Wireless Network Penetration Testing
LGMS wireless network penetration testing uses automated and manual penetration techniques to locate and map authorized and unauthorized wireless access points, review corporate access point configuration and then discover weaknesses that could allow an attacker to penetrate those networks. Potential internal and external threats are documented, and a recommended action plan is developed to address any security risks.
-
product
1553Guard
MIL-STD-1553 bus architecture is a threat that adversaries can leverage to compromise your equipment and spread malicious software through your Serial Data Bus (SDB) system. You need a solution that can not only identify current and future cyberattacks in real-time but also instantly eliminate those threats before they wreak havoc and interrupt the mission.
-
product
Torpedo defence
Ultra is a world-leader in torpedo defence for both submarines and surface ships, with systems currently operational with multiple NATO nations. Using a combination of passive and active sonars systems, Ultra’s technology provides platforms with the ability to detect and classify all known torpedoes. On detection of a threat torpedo the system automatically recommends the optimum evasion course, whilst simultaneously using countermeasures to confuse and defeat the weapon.
-
product
Interference Detection And Mitigation
Now more than ever, it’s critical to protect military systems from the threat of GNSSGlobal navigation satellite system (GNSS): A general term describing any satellite constellation that provides positioning, navigation, and timing (PNT) services on a global or regional basis. See also GPSGlobal Positioning System is a navigation satellite system. See also signal jamming and spoofing by using anti-jamming GPS and spoofing detection solutions.
-
product
Biological Wide-area AeRosol Detector
BioWARD
Standalone sensor in weatherproof enclosure detects thermal objects with consistent appearance/behavior to a bioaerosol plume and determines a threat probability
-
product
Bomb Jammer
Security Intelligence Technologies, Inc.
The Bomb Jammer is a defense technology used to counter RCIED theats. It comes in several configurations. The Covert Bomb Jamming System is our trunk mountable IED Jammer. Its low profile profile antenna setup make it an ideal vehicle jammer to defeat IED threats.
-
product
Cyber Security Assessment
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.





























