Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
Product
Security Products
-
Security is no longer an option; it’s a requirement. As your trusted provider of platform security solutions, our comprehensive portfolio addresses a variety of threat models.
-
Product
Situational Understanding Mission Intelligent Technology
SUMIT360™
-
The SUMIT360™ provides military armored vehicle operators with an innovative, 360 degree view of the environment around the vehicle utilizing advanced sensor technology to improve threat and obstacle detection that could pose a threat to ground forces, and their mission. Equipped with powerful multi-spectral sensors in each module, the system uses on-board processing to form seamless, stitched images to provide a full field of view in any terrain, and virtually any conditions, day or night. With additional target detection and identification capability, the system can also be paired with advanced analytics and Artificial Intelligence (AI) to provide vehicle crew, and transported troops a threat detection and classification to provide critical decision support before opening the hatch. The system also provides the ability to support remote or optionally manned configurations.
-
Product
Cyber Security Assessment
-
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
Product
ESM/ELINT System
-
Shoghi’s Electronic Support Measures (ESM) are designed for electronic warfare techniques involving actions to detect, intercept, identify, locate, record, and/or analyze sources of radiated electromagnetic energy for the purposes of immediate threat recognition.
-
Product
Advanced DDoS
-
The barrier to entry has been obliterated by new tools that enable anyone with an Internet connection and a grievance to launch a DDoS attack. This is a true game changer in terms of the threat landscape and what businesses should consider themselves a potential target of attack. It used to be certain verticals would be likely targets for a DDoS attack; finance, gaming and e-commerce at the top of the list. Today, any business, for any reason, any real or perceived offense or affiliation, can become a target of a DDoS attack.
-
Product
Cloud Security Solutions
-
Online threats are constantly changing. Offering protection against the largest and most sophisticated attacks, Akamai helps you safeguard your websites and other Internet-facing applications from the risks of downtime and data theft. Built on the Akamai Intelligent Platform, Akamai Cloud Security Solutions provide the scale to stop the largest Distributed Denial-of-Service (DDoS) and web application attacks without reducing performance, as well as intelligence into the latest threats and the expertise to adapt to shifting tactics and attack vectors.
-
Product
Continuous Real-Time Data Feeds
Application and Threat Intelligence (Subscription)
-
Keysight Network Applications and Security
Test and simulation conditions must reflect the latest security threats and applications so that you can ensure your equipment and systems will perform reliably and protect networks from the most advanced and malicious traffic. With Ixia's BreakingPoint Application and Threat Intelligence (ATI) program, we do the research for you by identifying and generating security attacks and application protocols that keep you current.
-
Product
MWIR Systems
-
L3 Cincinnati Electronics’ high-performance cooled mid-wave (3.5 – 5.0 µm) IR imagers are based on our patented InSb focal plane array architecture. Ideal for all combat conditions, L3 Cincinnati Electronics technology improves situational awareness in combat intelligence, sighting & tracking systems, threat deterrence and perimeter & border security with all-weather observation, day or night. These IR sensors can be utilized in urban, rural and remote situations where there are extreme climatic and terrain conditions. Well-suited for fixed or portable payloads, these imaging systems offer a substantially lower total life-cycle cost in comparison to other commercial IR imaging sensors.
-
Product
Mobile Systems
-
Advanced vehicle-based platforms for real-time detection and identification of CBRN threats in complex and variable urban environments.
-
Product
Web Application Firewall
WAF
-
Your website security solution needs to keep up with the changing cyber threat. Protect your website with Cloudbric’s cloud WAF to block unknown and modified attacks.
-
Product
Agile Signal Generators (UXG)
XSeries
-
Get a powerful building block, whether you need a dependable LO or a scalable threat simulator More accurately simulate multi-emitter scenarios for radar, EW and antenna test with the fastest switching, phase coherency, and extensive pulse-modulation Test sooner and increase confidence in EW system performance by generating complex signal simulations when you need them Increase the reliability of your test system: the UXG is a slide-in replacement for legacy fast-switching sources
-
Product
Vehicle Based Gunshot Localisation
ACLOGUS
-
Incoming direct fire poses a threat to the vehicle and, when manned, to its crew. Traditional acoustic systems to detect and localize incoming Small Arms Fire do not work when the vehicle is driving, which is in essence the key to survive on the battlefield in the first place.
-
Product
Archival Storage Rooms
-
Darwin Chambers Company’s NFPA, GSA, and NARA Directive 1571-compliant Archival Storage Chambers are engineered to provide maximum value, efficiency and conformance with all applicable standards and codes. Archival chambers provide environmental controls for storing records and materials (including paper documents and items with high fibrous content, various films, microfiche, and photographic materials) that require permanent protection for storage and preservation. Our high-performance systems are offered with nearly unlimited operational fail safes, includ- ing full system and control redundancy. In addition to keyed entry, numerous security options are also available, due to the often irreplaceable nature of the materials to be stored and preserved in this type of chamber. Our chambers are engineered to accommodate the loads and unique requirements of the specific materials to be stored, with industry-leading control and uniformity of both temperature and humidity variables. Design considerations include both functional and operational efficiencies and reliability, the safety and comfort of operating personnel, and the ongoing protection of the archived materials from fire, water, light degradation, pests, mold and natural contaminants, pollutants and other man- made threats.
-
Product
Long-Range Perimeter Surveillance Doppler Radar
Ranger® R3D
-
The Ranger R3D is a dual mode, ground surveillance radar designed to provide efficient, 24/7 persistent surveillance, both within and beyond the fence. Operating in the Ka-band, the Ranger R3D leverages the resolution and accuracy of advanced FMCW technology and the extended range and terrain adaptability of Doppler in a single, compact, and lightweight package. Ruggedized for permanent, all-weather installations and mobile, stop-and-scan operations, its low minimum detection velocity (MDV) detects slow-moving threats such as walkers and crawlers.
-
Product
Laser Warnings Systems
-
Elbit Systems of America’s laser warning systems use both coherent and non-coherent laser sources. We understand the full scope of issues associated with each laser threat and have the systems engineering expertise necessary to accurately and reliably detect, locate and categorize these threats. Each LWS is equipped with a direction indicator and provides complete threat coverage in a high dynamic range with audio and visual warnings.
-
Product
Testing and Assessment Services for Unmanned Aerial Vehicles
-
Unmanned aerial vehicles (UAVs), more commonly known as drones, have many applications. UAVs can be used in agriculture for crop spraying, movie making and aerial photography, disaster relief, and can even imitate flying animals for conservation or research purposes. Our services can help you make sure your UAVs meet international norms and standards. We test materials and resilience, confirming that your drones do not pose a threat to human health or the environment. Our services can help you make sure your UAVs meet international norms and standards. We test materials and resilience, confirming that your drones do not pose a threat to human health or the environment. Our team of experts is dedicated to UAVs and their applications – and a global network of offices. We can give you the advice and expertise you need to speed your drones to market. Our team of experts is dedicated to UAVs and their applications – and a global network of offices. We can give you the advice and expertise you need to speed your drones to market.
-
Product
Wireless Network Penetration Testing
-
LGMS wireless network penetration testing uses automated and manual penetration techniques to locate and map authorized and unauthorized wireless access points, review corporate access point configuration and then discover weaknesses that could allow an attacker to penetrate those networks. Potential internal and external threats are documented, and a recommended action plan is developed to address any security risks.
-
Product
VFTLP+ Test System
4012
-
The Model 4012 VFTLP+™ test system was developed in early 2000 to add high speed measurements to the usual I-V plot, to measure and record the real TDDB waveform which causes oxide failure.*Accurate measurements of this waveform have finally been identified by Barth Electronics Inc. and CDM protection can now be based on known dimensional design parameters. We identify the response of your CDM protection circuits with 100ps risetime pulses which simulate the real CDM test. This is the only way with which to provide the total gate oxide threat voltage data.*Convenient, precise, repeatable operation*Computer controlled for automated testing
-
Product
Radar Threat and Target Simulation Unit
MS 1605
-
PTG is used to field/LAB evaluation / testing of RADAR. PC is used to control the profile of the target generation. PTG will work in both stand alone and remote mode. The PTG has keypad and LCD for stand-alone operation. The PC can interface the PTG through the USB link. The operator can communicate through the GUI to the PTG. MIL1553B Communication used for Interfacing with RADAR.
-
Product
Power Supplies
RM-750B
-
With dual PCI-E connectors, the RM Series carries all its essentials to power your system. Enjoy the graphic rendered programs and games without the threat of overheating. Its dark aluminum chassis not only looks good, but dramatically relieves heat built-up. The 120mm cooling fan enhances the already efficient heat dissipation rate and helps balance the cooling system with noise level. The RM Series is great for high end users to everyday casual users. Whatever your system needs, the RM Series can deliver.
-
Product
Cyber Assurance
-
As the Internet of Things (IoT) continues to expand, connecting more and more of our world through communication devices, a growing trend has emerged: cyber security threats.
-
Product
SaaS Platform.
GreyMatter
-
Security practitioners are often on the defensive. There aren’t enough hours in the day or people with the broad skill sets needed to keep up with threats evolving at machine speed. That’s why we’re committed to making automation work across the entire security lifecycle. We believe the only way to make security possible is to automate away the repetitive and mundane. That’s why we built ReliaQuest GreyMatter, the first unified threat detection, investigation and response SaaS platform.
-
Product
Advanced Sensors & Security Systems
-
Applied Research Associates, Inc.
ARA has provided security services since the mid-1980s and today provides tools to maximize physical security that are highly scalable and affordable, offering our government and commercial customers advanced perimeter security, threat pattern analysis, and intrusion detection. We integrate our detection and assessment capabilities to provide a real-time, complete operational picture to keep personnel and assets secure, day and night. Our engineers are experts in design and integration of multiple sensor types and other intrusion detection systems to create customizable, integrated mobile security systems.
-
Product
Portable Range Threat Simulators
Simulator
The Textron System's PRTS™ and HPRTS™ are medium and long-range, programmable, ruggedized Radio Frequency (RF) test and training tools. Our PRTS family of range simulators delivers high-fidelity environments for training ranges.
-
Product
Log Management and SIEM Platform
NIKSUN® LogWave™
-
The next generation of threats requires the next generation cyber-defense platform. NIKSUN’s LogWave™ Log Management and SIEM platform makes data ingest, reporting, and alerting easier than ever. With unlimited scalability, flexible reporting, and intelligent alerting, see why NIKSUN LogWave™ is right for your organization.
-
Product
Blocklist Based Filtering
-
Many businesses prefer to use blocklists prepared by external intelligence agencies to save the time of generating this data themselves. Also, to get as much exposure and intelligence of the threat landscape as possible. However, this blocklist information can be sent in various formats, making utilizing them a challenge. Luckily, FastNetMon is a flexible blacklisting feed filtering tool that supports a vast array of formats to receive, consume, and use blocklists from different intelligence feed providers. FastNetMon then enables you to block specific malicious and dangerous hosts using blocklist-based filtering.
-
Product
Application Monitoring Tool
-
Strong application monitoring tool enables IT teams, to get thorough insights into application health and response-time data. Go proactive with Motadata, which is one of the best application performance monitoring tools (APM) to identify potential threats that might bring operations down and fix the issue before it becomes a problem. Real-time metrics dashboard helps you stay on top of your application performance. Resolve application performance management issues before they impact your users or customers.
-
Product
Security Testing Services
-
Alphabin Technology Consulting
Fortify your digital defenses and enhance the resilience of your systems to safeguard against cyber threats.
-
Product
All Hazards Detection & Identification Tool
MX908
-
MX908™ leverages high-pressure mass spectrometry (HPMS) to deliver dramatically enhanced sensitivity and broader threat category coverage. MX908 hosts an all hazards threat list which has been upgraded to include a broader spectrum of chemical warfare agents (CWA), explosives and high priority toxic industrial chemical (TIC) targets. From military grade, commercial and improvised explosives to novel threat materials, MX908 supports the needs of the modern mission.
-
Product
Compact Long range HD Multi-spectral Surveillance System
TacFLIR® 280-HD
-
TacFLIR 280-HD is a high-performance land-based imaging system designed to identify and track smugglers, terrorists, or any other threat – day and night, and in the toughest terrain. Tailored for mobile deployment with high definition imaging and powerful optics and INS, TacFLIR 280-HD reveals the details necessary for long range vehicle detection, identification, and threat assessment.





























