Filter Results By:
Products
Applications
Manufacturers
Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
product
Threat Warning
Long-range, multi-threat capabilities provide continuous tracking while search and verification of surface-to-air and air-to-air missile launches for unsurpassed survivability.
-
product
Infrared Camera for CO Detection and Electrical Inspections
FLIR GF346
The FLIR GF346 optical gas imaging camera detects carbon monoxide (CO) and 17 additional gases without the need to interrupt your plant's production process. CO emissions can be a significant threat to primary steel manufacturing operations; even the slightest leak in a vent stack or pipe can have a devastating effect. With the FLIR GF346, inspectors can scan large areas from a safe distance, pinpointing leaks in real-time, reducing repair down-time, and providing repair verification.
-
product
Fiber Monitoring System for Optical Networks
The Remote Fiber Monitoring System offered by M2 Optics is a key asset for any network operator seeking to ensure the performance and integrity of the optical fiber infrastructure. In addition to significantly reducing service times to meet customer service and SLA requirements, the system provides an extra level of intrusion detection against the serious threat of malicious data theft affecting today's networks.
-
product
Thermal Imaging Camera
IRT301
Wuhan JOHO Technology Co., Ltd
IRT301 Thermal Imaging CameraIRT301, a fixed-site thermal security camera lets you aware of intruders and other threats to your facility clearly in total darkness, smoke, mist and other harsh situation. It is compatible with a wide variety of third-party accessories, permit them easy to integrate. It enable to control and operation over digital and analog networks. With 384x288 pixel detector, it delivers high quality thermal image in any harsh environmental conditions, IRT301 is ideal for both indoor and outdoor surveillance, applications covered from industrial monitoring to city or boundary security monitoring. ApplicationBorder security and surveillanceRoad, channel, warehouse monitoringBuilding and industrial safety monitoringKey FeaturesRugged, waterproof and dustproof designHigh resolution, high frame rateAdvanced image processing technologyStandard interfaceVarious lenses and pan-tilt optionsTechnical specificationDetectorDetector MaterialUFPA microbolometer, AsiResolution384x288, 25mSpectral range8m~14mNETD80mK@30LensFocus
-
product
High-Speed Maneuvering Surface Target (HSMST)
Kratos Defense & Security Solutions, Inc.
The Kratos C2 is currently in use and supporting mission operations for the U.S. Navy and Army utilizing the High-Speed Maneuvering Surface Target (HSMST), developed in response to a requirement for a 40+ knot target to represent littoral threats encountered by the fleet and which would retain 35 kt capability in advanced sea states. Kratos has successfully supported weapons testing missions that required waves of multiple independently controlled HSMST’s (more than 10 vessels) coming from multiple axes.
-
product
Cargo and Vehicle Inspection
In a world where threats continue to evolve and concealment techniques become more sophisticated, our customers are facing more complex, difficult missions than ever.
-
product
Application Monitoring Tool
Strong application monitoring tool enables IT teams, to get thorough insights into application health and response-time data. Go proactive with Motadata, which is one of the best application performance monitoring tools (APM) to identify potential threats that might bring operations down and fix the issue before it becomes a problem. Real-time metrics dashboard helps you stay on top of your application performance. Resolve application performance management issues before they impact your users or customers.
-
product
Cyber Security Assessment
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
product
Power Supplies
RM - SERIES
With dual PCI-E connectors, the RM Series carries all its essentials to power your system. Enjoy the graphic rendered programs and games without the threat of overheating. Its dark aluminum chassis not only looks good, but dramatically relieves heat built-up. The 120mm cooling fan enhances the already efficient heat dissipation rate and helps balance the cooling system with noise level. The RM Series is great for high end users to everyday casual users. Whatever your system needs, the RM Series can deliver.
-
product
Biological Detection
Collaborating with government agencies in the USA and UK in the field of biological threat detection, Kromek is working towards the common goal of improving the early detection of biological threats anytime and anywhere, making the world safer and healthier.
-
product
Network Traffic Visibility
Organisations and businesses are relying more on the network than ever before. In many instances, the network has become the business, such as is the case for managed service providers (MSPs), residential ISPs, mobile carriers, data centers, etc. Unfortunately, at the same time, networks have never been under this level of threat from malicious sources who want to disrupt or even damage infrastructure with various motivations.
-
product
Archival Storage Rooms
Darwin Chambers Company’s NFPA, GSA, and NARA Directive 1571-compliant Archival Storage Chambers are engineered to provide maximum value, efficiency and conformance with all applicable standards and codes. Archival chambers provide environmental controls for storing records and materials (including paper documents and items with high fibrous content, various films, microfiche, and photographic materials) that require permanent protection for storage and preservation. Our high-performance systems are offered with nearly unlimited operational fail safes, includ- ing full system and control redundancy. In addition to keyed entry, numerous security options are also available, due to the often irreplaceable nature of the materials to be stored and preserved in this type of chamber. Our chambers are engineered to accommodate the loads and unique requirements of the specific materials to be stored, with industry-leading control and uniformity of both temperature and humidity variables. Design considerations include both functional and operational efficiencies and reliability, the safety and comfort of operating personnel, and the ongoing protection of the archived materials from fire, water, light degradation, pests, mold and natural contaminants, pollutants and other man- made threats.
-
product
GNSS Simulation Engine
Skydel
Test a wide range of applications with advanced GNSS Simulators and helpful tools that generate basic scenarios all the way to complex threat environments, leveraging the power and scalability of the Skydel Simulation Engine. Skydel powers each of Safran Federal Systems' advanced software-defined simulators including BroadSim, BroadSim Anechoic and BroadSim Wavefront.
-
product
ESM/ELINT System
Shoghi’s Electronic Support Measures (ESM) are designed for electronic warfare techniques involving actions to detect, intercept, identify, locate, record, and/or analyze sources of radiated electromagnetic energy for the purposes of immediate threat recognition.
-
product
Deep Packet Inspection
FlowPro
FlowPro is inserted into areas of the network when visibility is needed. It uses a deep packet inspection (DPI) to compile a flow cache, and exports traffic and threat details reflecting 100% of all communications that pass by. FlowPro is a great complement to the Scrutinizer Incident Response System and ensures the security team has insight where they need it.
-
product
Web Application Firewall
WAF
Your website security solution needs to keep up with the changing cyber threat. Protect your website with Cloudbric’s cloud WAF to block unknown and modified attacks.
-
product
Ground Threat Emitter Sensor System
GTESS
The Ground Threat Emitter Sensor System (GTESS) is a modular test and training system capable of stimulating multi-spectral aircraft electro-optic sensor suites at long range. The GTESS system integrates Textron Systems’ ultraviolet (Mallina™), infrared (Phoenix) and/or laser (Phantom™) ranged stimulators with an automated tracking system to facilitate fast-moving test, training and evaluation exercises. A fully integrated camera system for effective after action review. GTESS can also work in conjunction with Textron’s radio frequency (RF) range stimulator systems (PRTS™ & HPRTS) for complete multi-spectral testing.
-
product
Advanced DDoS
The barrier to entry has been obliterated by new tools that enable anyone with an Internet connection and a grievance to launch a DDoS attack. This is a true game changer in terms of the threat landscape and what businesses should consider themselves a potential target of attack. It used to be certain verticals would be likely targets for a DDoS attack; finance, gaming and e-commerce at the top of the list. Today, any business, for any reason, any real or perceived offense or affiliation, can become a target of a DDoS attack.
-
product
UXG X-Series Agile Signal Generator, Modified Version
N5191A
et closer to reality: simulate increasingly complex signal environments for radar, EW & antenna-test Test sooner & increase confidence in EW systems by generating signal simulations when you need them: the UXG is a scalable threat simulator Use pulse descriptor words (PDWs) to generate long pulse trains & individually control pulse characteristics Quickly characterize antennas over a wide frequency range with fast frequency tuning Performance without requiring an export license
-
product
Network Security Testing
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
product
Long-Range Perimeter Surveillance Doppler Radar
Ranger® R3D
The Ranger R3D is a dual mode, ground surveillance radar designed to provide efficient, 24/7 persistent surveillance, both within and beyond the fence. Operating in the Ka-band, the Ranger R3D leverages the resolution and accuracy of advanced FMCW technology and the extended range and terrain adaptability of Doppler in a single, compact, and lightweight package. Ruggedized for permanent, all-weather installations and mobile, stop-and-scan operations, its low minimum detection velocity (MDV) detects slow-moving threats such as walkers and crawlers.
-
product
Security Products
Security is no longer an option; it’s a requirement. As your trusted provider of platform security solutions, our comprehensive portfolio addresses a variety of threat models.
-
product
Power Supplies
MP-550B
With dual PCI-E connectors, the MP Series carries all its essentials to power your system. Enjoy the graphic rendered programs and games without the threat of overheating. Its dark aluminum chassis not only looks good, but dramatically relieves heat built-up. The 120mm fan enhances the already efficient heat dissipation rate and helps balance the cooling system with noise level. The MP Series is great for high end users to everyday casual users. Whatever your system needs, the MP Series can deliver.
-
product
Fixed Surveillance System for Perimeter Security
Argus
Argus is a fixed, rugged, preconfigured wide area surveillance system. Combining a best-in-class radar and thermal camera with Command and Control software, Argus is designed to detect and track multiple threats both near and far in the most demanding weather conditions 24 /7. When compared to other perimeter security solutions, Argus has the lowest initial cost per kilometer of secured space as well as the lowest lifetime cost.
-
product
Position Sensors for Hazardous Environments
Intrinsically Safe systems provide a safe operating environment for personnel and equipment. Intrinsic Safety (IS) is based on the principle of restricting the electrical energy transmitted into a hazardous area, thereby ensuring that anysparks or heated surfaces that may occur as a result of electrical failures areinsufficient to cause ignition. The threat of an explosion is eliminated.
-
product
Missile Warning System Testers
CI Systems provides a wide range of Missile Warning System (MWS) testers that can accurately simulate approaching threat signatures in the IR / Dual IR / UV /SWIR wavebands. These test systems can also test the MWS evaluation and acquisition of targets, tracking, and the performance of countermeasures. Also available is an infrared target simulator that projects an IR scene (background, target, and flare).
-
product
Autonomous PNT Performance and Vulnerability Test Suite
PANACEA
PANACEA is an autonomous GNSS performance and threat environment simulator system designed to control simulation hardware and collect data from up to 32 GNSS receivers simultaneously.
-
product
Threat Detection/Analysis
Schweitzer Engineering Laboratories, Inc.
Several SEL devices have built-in malware detection or can identify nonauthorized network traffic.
-
product
Web DDOS Protection
DDoS attacks continue to increase and still cause great damage today. In addition to the frequency, the complexity and duration of an attack cause major problems for the defense. Therefore, the deployed solution should intervene precisely and quickly to best protect you from threats and high costs due to downtime.
-
product
1553Guard
MIL-STD-1553 bus architecture is a threat that adversaries can leverage to compromise your equipment and spread malicious software through your Serial Data Bus (SDB) system. You need a solution that can not only identify current and future cyberattacks in real-time but also instantly eliminate those threats before they wreak havoc and interrupt the mission.





























