Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
Product
Red Team Engagement
-
Red Team Assessment (Red Teaming) is an activity where a group of white hat hackers (or penetration tester) perform a series of activities to assess the company’s security readiness towards real-world cyber threats. Red teaming aims to ‘attack’ an organization’s digital and physical infrastructure to evaluate the organization’s security defense and posture, at the same time targeting to obtain any sensitive and beneficial information. Red Teaming usually emulates several malicious actors to penetrate the organization’s digital and physical infrastructure security.
-
Product
Cyber Security Training
-
Elbit Systems of America's comprehensive attack scenario library reflects the most recent threat landscape. Our cyber security experts continuously update training scenarios with newly discovered attacks and tactics. Versatile network settings and attack scenarios equip cyber security teams with customized training specific to each team's organization.
-
Product
1U 19” Network Appliance With AMD® Ryzen 7000 Family Processor
CSA-5100A
Network Appliance
CSA-5100A is a powerful 1U rackmount network appliance, designed for mid-range network security applications like Firewall-as-a-Service (FWaaS) and Next-Generation Firewalls (NGFW), SD-WAN, End-to-end encryption, WAN optimization, cloud acceleration, NGFW, advanced threat prevention, mobile security, secure web gateway.
-
Product
Managed Threat Detection Service
GuardDuty
-
Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads. It monitors for activity such as unusual API calls or potentially unauthorized deployments that indicate a possible account compromise. GuardDuty also detects potentially compromised instances or reconnaissance by attackers.
-
Product
Virtualized Security Resilience Testing
BreakingPoint VE
-
Keysight Network Applications and Security
Ixia BreakingPoint Virtual Edition (VE) provides real-world application and threat simulation for complete performance and security testing, and its elastic deployment model allows you to achieve security resilience without sacrificing scalability or flexibility.
-
Product
Network Traffic Visibility
-
Organisations and businesses are relying more on the network than ever before. In many instances, the network has become the business, such as is the case for managed service providers (MSPs), residential ISPs, mobile carriers, data centers, etc. Unfortunately, at the same time, networks have never been under this level of threat from malicious sources who want to disrupt or even damage infrastructure with various motivations.
-
Product
Network Security Testing
-
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
Product
Open-Path Chemical Detection System
LaserWarn™
-
Block Engineering's LaserWarn is an open path gas detection system based on patented quantum cascade laser technology. LaserWarn detects chemical threats, leaks, and fugitive emissions over a coverage area of thousands of square feet, and can be used in both indoor and outdoor applications.
-
Product
Infrared Camera for CO Detection and Electrical Inspections
FLIR GF346
-
The FLIR GF346 optical gas imaging camera detects carbon monoxide (CO) and 17 additional gases without the need to interrupt your plant's production process. CO emissions can be a significant threat to primary steel manufacturing operations; even the slightest leak in a vent stack or pipe can have a devastating effect. With the FLIR GF346, inspectors can scan large areas from a safe distance, pinpointing leaks in real-time, reducing repair down-time, and providing repair verification.
-
Product
Interference Detection And Mitigation
-
Now more than ever, it’s critical to protect military systems from the threat of GNSSGlobal navigation satellite system (GNSS): A general term describing any satellite constellation that provides positioning, navigation, and timing (PNT) services on a global or regional basis. See also GPSGlobal Positioning System is a navigation satellite system. See also signal jamming and spoofing by using anti-jamming GPS and spoofing detection solutions.
-
Product
UXG X-Series Agile Vector Adapter, 50 MHz to 20 GHzNEW!
N5194A
Vector Baseband Generator
The N5194A is part of the UXG family of signal generation products designed for threat simulation; simulate complex signal environments for radar/EW.
-
Product
Mobile Network Monitoring
NetMobility®
-
The next generation of mobile network monitoring is here. With NIKSUN NetMobility® you gain unparalleled insights into subscriber behavior, carrier services, network health, cyber threats, and application performance to meet a wide range of service provider needs - Performance, Security, Operations, Management, and Planning.
-
Product
Internet of Thing
-
The Internet of Things (IoT) offers breathtaking potential. But IoT success means navigating new technologies, multiple standards, intense competition, and security threats. Spirent helps developers, operators, and service providers optimize their IoT solution and get to market faster. Discover how below.
-
Product
Global Lightning Network
-
Our Global Lightning Network® (GLN®) is tried and true, delivering hyperlocal real-time lightning data for threat assessment and integration.
-
Product
Cyber Threat Assessment Program
-
Scientific Research Corp. STI Division
SRC provides threat assessment support focused on cyber threats that may impact the ability to wirelessly link with other systems. This activity supports the development of test and evaluation capabilities important to not only identifying current deficiencies but also for developing next generation systems.
-
Product
Visual Fault Locators
-
Visual fault locators are used to identify problems with your fiber. GAOTek visual fault locators typically are applied for fiber tracing, fiber routine, and continuity checking. Imagine being able to easily identify when and where a fiber is breaking, bending, or when there’s a threat to the fiber layer.
-
Product
Environmental Shock Simulation Machine For Drop Testing
-
# Simulates environmental handling threats small handheld products must survive.# Gauges your product?s ability to survive handling environments.# Controls key test variables: product orientation at impact; nature of the impact surface.# Maintains orientation to just prior to impact then releases for unrestrained impact.# llows user changeable impact surfaces to better simulate the handing environment.# Includes 4 ch short transient shock instrumentation system.
-
Product
NAVAL LASER-WARNING SYSTEM
NLWS
-
Laser activity in your vicinity might mean the presence of a threat. Saab's Naval Laser-Warning System (NLWS) is capable of detecting and analysing lasers in blue-water and littoral combat environments. This system provides vitally important situational awareness to the command team about the presence of laser activity.
-
Product
Gas Detection
-
Explosive or toxic gases are a constant threat in industry as well as civil and military security. Second Sight is an innovative instrument to protect infrastructures and population throuht early warning.
-
Product
Windows Server IoT
-
Includes advanced security features to protect IoT devices and edge computing systems from threats. Offers tools for remote device management, simplifying the control of IoT devices and edge servers.
-
Product
GPS Jamming & Spoofing Detection
-
Patented GPS jamming and spoofing sensor technology, available in multiple configurations to fit your application. Tested and proven for more than a decade, our unique algorithms detect live threats and take action in seconds, while outputting data for post event analysis.
-
Product
Malware Analysis Tool
ThreatAnalyzer®
-
See how you can defend your network from targeted attacks, advanced malware and Zero-days with ThreatAnalyzer®, the industry''s premier malware analysis sandbox. Our dynamic malware analysis sandbox (formerly known as CWSandbox) is used to dig deep into malware to reveal its impact on your organization so you can respond quickly – knowing what''s happening on your network and what systems or data are at the greatest risk.
-
Product
Situational Awareness
-
SA is utilized to secure borders from illegal trafficking, to monitor supply line routes against the placement of roadside bombs, to provide our warfighters the tools they need to alert them to potential threats, and to identify and defeat the enemy, day or night.
-
Product
Test And Simulation Devices
BreakingPoint
-
Control global threat intelligence at Internet-scale to create massive-scale, high fidelity simulation and testing conditions for battle-testing infrastructures, devices, applications, and people.
-
Product
Systems
-
We design and build discrete systems and complete solutions for communications, ISR and protection of forces. Our products include reconnaissance, communication and navigation systems; geo-location systems; EW systems; threat warning systems and adversary emulation systems.
-
Product
Torpedo defence
-
Ultra is a world-leader in torpedo defence for both submarines and surface ships, with systems currently operational with multiple NATO nations. Using a combination of passive and active sonars systems, Ultra’s technology provides platforms with the ability to detect and classify all known torpedoes. On detection of a threat torpedo the system automatically recommends the optimum evasion course, whilst simultaneously using countermeasures to confuse and defeat the weapon.
-
Product
High Definition Mid-Range Surveillance System
Ranger® HDC MR
-
The Ranger HDC MR sets a new standard for surveillance with its ability to detect illegal activities even in degraded weather conditions, utilizing embedded analytics and image processing to reduce the cognitive workload, enabling operators to distinguish quickly between true threats and false alarms. The HDC MR is not only a superior system in bad weather, it also provides increased uptime and reduces cyber risks -- a reliable tool that adds days of efficient surveillance and reduces risk compared to previous generations of systems.
-
Product
Fixed Surveillance System for Perimeter Security
Argus
-
Argus is a fixed, rugged, preconfigured wide area surveillance system. Combining a best-in-class radar and thermal camera with Command and Control software, Argus is designed to detect and track multiple threats both near and far in the most demanding weather conditions 24 /7. When compared to other perimeter security solutions, Argus has the lowest initial cost per kilometer of secured space as well as the lowest lifetime cost.



























