Filter Results By:
Products
Applications
Manufacturers
Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
product
Phobos Threat Warner System
QR020
Gain military advantage with the world's most compact and accessible R-ESM system. Phobos delivers increased real-time intelligence in the most complex operational environments.
-
product
TDL Training Tools and Services
Curtiss-Wright Defense Solutions
To prepare for the threats of the battlefield, warfighters must be familiar with what they will encounter. With extensive experience in tactical data link training and technology, Curtiss-Wright has the tools and expertise to provide your organization with solutions that facilitate tactical data link communication on the battlefield. Develop realistic testing and training scenarios with intuitive tools for TDL simulation and count on our expert team to provide a variety of comprehensive training programs.
-
product
Red Team Engagement
Red Team Assessment (Red Teaming) is an activity where a group of white hat hackers (or penetration tester) perform a series of activities to assess the company’s security readiness towards real-world cyber threats. Red teaming aims to ‘attack’ an organization’s digital and physical infrastructure to evaluate the organization’s security defense and posture, at the same time targeting to obtain any sensitive and beneficial information. Red Teaming usually emulates several malicious actors to penetrate the organization’s digital and physical infrastructure security.
-
product
Digital Map Systems
Elbit Systems of America’s Global Digital Map Unit is built on a proven design that accommodates multiple data formats and provides unmatched situational awareness to aircrews. The GDMU displays detailed map, flight plan, and threat information to aircrews. Each system performs interactive functions with the mission computers and generates digital video map data for head down displays.
-
product
Jamming
ARA antennas have been successfully deployed by the US military to combat IED's throughout the world. These antennas cover frequency ranges from 20 MHz to over 6 GHz while providing excellent gain and RF threat spatial coverage.
-
product
Web DDOS Protection
DDoS attacks continue to increase and still cause great damage today. In addition to the frequency, the complexity and duration of an attack cause major problems for the defense. Therefore, the deployed solution should intervene precisely and quickly to best protect you from threats and high costs due to downtime.
-
product
Hold Baggage Screening
With millions of bags and parcels flowing through airport security, border crossings and warehouse every single day, Explosive Detection Systems (EDS) have to comply with global threat detection standards without impacting throughput.
-
product
PrAMC Based On QorIQ P4040/P4080, 10 GbE, SFP+
AMC710C
The AMC710C is a flexible processor AMC for general purpose processing with the quad-core QorIQ P4040 with Data Path Acceleration Architecture intended for router and UTM (unified threat management) applications.
-
product
Vehicle Based Gunshot Localisation
ACLOGUS
Incoming direct fire poses a threat to the vehicle and, when manned, to its crew. Traditional acoustic systems to detect and localize incoming Small Arms Fire do not work when the vehicle is driving, which is in essence the key to survive on the battlefield in the first place.
-
product
Focus Risk View
Fasoo RiskView is a tool for security administrators that monitor activity related to unstructured data and user activities with confidential data. It gathers information from Fasoo Usage Tracer (the log analysis utility for Fasoo Enterprise DRM) and Fasoo eData Manager. It has APIs that can be configured to import log data from other security technology components, including firewalls, DLP, databases, and even physical security systems (e.g., entry/exit data from keycard or biometric systems) and employee attendance records. Fasoo RiskView includes a decision making framework that security administrators as well as business managers can use to review suspicious activities and after relevant investigations, in order to decide whether or not to take action to address these concerns with potential insider threats.
-
product
Missile Warning System Testers
CI Systems provides a wide range of Missile Warning System (MWS) testers that can accurately simulate approaching threat signatures in the IR / Dual IR / UV /SWIR wavebands. These test systems can also test the MWS evaluation and acquisition of targets, tracking, and the performance of countermeasures. Also available is an infrared target simulator that projects an IR scene (background, target, and flare).
-
product
Log Management and SIEM Platform
NIKSUN® LogWave™
The next generation of threats requires the next generation cyber-defense platform. NIKSUN’s LogWave™ Log Management and SIEM platform makes data ingest, reporting, and alerting easier than ever. With unlimited scalability, flexible reporting, and intelligent alerting, see why NIKSUN LogWave™ is right for your organization.
-
product
Internet of Thing
The Internet of Things (IoT) offers breathtaking potential. But IoT success means navigating new technologies, multiple standards, intense competition, and security threats. Spirent helps developers, operators, and service providers optimize their IoT solution and get to market faster. Discover how below.
-
product
Cyber Threat Assessment Program
Scientific Research Corp. STI Division
SRC provides threat assessment support focused on cyber threats that may impact the ability to wirelessly link with other systems. This activity supports the development of test and evaluation capabilities important to not only identifying current deficiencies but also for developing next generation systems.
-
product
UXG X-Series Agile Signal Generator, 10 MHz to 40 GHz
N5193A
Get closer to reality: simulate increasingly complex signal environments for radar, EW & antenna-test Test sooner & increase confidence in EW systems by generating signal simulations when you need them: the UXG is a scalable threat simulator Use pulse descriptor words (PDWs) to generate long pulse trains & individually control pulse characteristics Accurately simulate multi-threat environments: 180-ns PDW update rate, chirps 10 to 25% of carrier frequency, pulses as narrow as 10 ns
-
product
Simulators/Threat Emitters
Antennas for RADAR test, simulation and training are designed for integration into complete threat RADAR simulators for use on combat training and test ranges or in simulators for training and evaluation of RADAR operators, aircrews, air-traffic-control or weather radar applications. All antennas for RADAR simulators have high RF power handling capabilities and generally use pressurized transmission lines. Dual-band, single aperture antennas and a cluster of separate antennas mounted to a single pedestal are ideally suited for RADAR simulators in mobile, fixed, shipboard and airborne environments.
-
product
Power Supplies
RM - SERIES
With dual PCI-E connectors, the RM Series carries all its essentials to power your system. Enjoy the graphic rendered programs and games without the threat of overheating. Its dark aluminum chassis not only looks good, but dramatically relieves heat built-up. The 120mm cooling fan enhances the already efficient heat dissipation rate and helps balance the cooling system with noise level. The RM Series is great for high end users to everyday casual users. Whatever your system needs, the RM Series can deliver.
-
product
Portable Mass Spectrometer
Continuity
Continuity™ - the most sensitive portable mass spectrometer designed to provide quality and reliable mass spectrometer analysis outside of the laboratory. Continuity™ was created to provide even higher sensitivity, greater specificity with built-in MS/MS, and larger mass range coverage than its ground-breaking counterpart Portability™. Like its counterpart, Continuity™ requires no sample preparation and is compatible with almost any ambient ionization source including ESI, APCI, TD-ESI, TD-APCI, and DBDI. It allows for a broad range of applications from clinical to drug to chemical and biological threats analysis. The user-friendly interface, rapid deployment, and real-time results make Continuity™ a great solution for fast, dependable, and highly sensitive field analysis for any user in any location. This potable mass spectrometer is the excellent solution for various challenging applications, including vapors/liquids/solids, CWAs/TICs, biological/biomedical, forensic, agriculture, food safety, security, and explosives.
-
product
Handheld Narcotics Analyzer
TruNarc™
The global drug problem is increasing, with trafficking of meth, heroin, and emerging threats like fentanyl, and carfentanil, impacting communities worldwide. Law enforcement officials need to quickly identify suspected narcotics in the field to help keep drugs, and drug dealers, off the streets. Now with the expanded v1.7 library, the Thermo Scientific™ TruNarc™ Handheld Narcotics Analyzer enables officers, customs, border control, and other personnel to scan more than 415 suspected illicit substances in a single, definitive test.
-
product
Special Operations Intelligence Collection Systems
Scientific Research Corp. STI Division
SRC designs, develops, produces, and supports the Joint Threat Warning System for Special Operations. This family of systems is used on air, land, and sea to provide threat situational awareness and intelligence collection capabilities for high-value missions.
-
product
Threat Warning
Long-range, multi-threat capabilities provide continuous tracking while search and verification of surface-to-air and air-to-air missile launches for unsurpassed survivability.
-
product
Telephone And Line Analyzer
TALAN™ 3.0
The TALAN 3.0 Telephone and Line Analyzer represents advanced capability to detect and locate illicit tampering and security vulnerabilities on digital, analog, and VoIP telephone systems. New hardware provides the ability to test twisted pairs against modern telecommunication threats including shield and ground.
-
product
Wireless Network Penetration Testing
LGMS wireless network penetration testing uses automated and manual penetration techniques to locate and map authorized and unauthorized wireless access points, review corporate access point configuration and then discover weaknesses that could allow an attacker to penetrate those networks. Potential internal and external threats are documented, and a recommended action plan is developed to address any security risks.
-
product
Interference Detection And Mitigation
Now more than ever, it’s critical to protect military systems from the threat of GNSSGlobal navigation satellite system (GNSS): A general term describing any satellite constellation that provides positioning, navigation, and timing (PNT) services on a global or regional basis. See also GPSGlobal Positioning System is a navigation satellite system. See also signal jamming and spoofing by using anti-jamming GPS and spoofing detection solutions.
-
product
ESM/ELINT System
Shoghi’s Electronic Support Measures (ESM) are designed for electronic warfare techniques involving actions to detect, intercept, identify, locate, record, and/or analyze sources of radiated electromagnetic energy for the purposes of immediate threat recognition.
-
product
Mobile Network Monitoring
NetMobility®
The next generation of mobile network monitoring is here. With NIKSUN NetMobility® you gain unparalleled insights into subscriber behavior, carrier services, network health, cyber threats, and application performance to meet a wide range of service provider needs - Performance, Security, Operations, Management, and Planning.
-
product
Security and Traffic Monitoring System
Information System Technologies Inc.
ISTI’s versatile sensor nodes can support multiple sensing types including acoustic, seismic, visible/IR, and scanning laser. Several eye-safe scanning lasers form a distributed wireless sensor network and can continuously and accurately track as well as monitor ground vehicles and personnel in a surveillance area. This system provides super-fine angular and range resolution to precisely locate moving targets. Among other key benefits are: day/night operational capability, continuous monitoring and surveillance without blind spots, 360 degrees field-of-view, large coverage area, multiple closely spaced target tracking, threat classification, and automatic alarm generation. The system can be used in applications such as traffic monitoring, intrusion detection, border control, airport runway collision and incursion avoidance, and perimeter security.
-
product
Cyber Assurance
As the Internet of Things (IoT) continues to expand, connecting more and more of our world through communication devices, a growing trend has emerged: cyber security threats.
-
product
Bomb Jammer
Security Intelligence Technologies, Inc.
The Bomb Jammer is a defense technology used to counter RCIED theats. It comes in several configurations. The Covert Bomb Jamming System is our trunk mountable IED Jammer. Its low profile profile antenna setup make it an ideal vehicle jammer to defeat IED threats.
-
product
Torpedo defence
Ultra is a world-leader in torpedo defence for both submarines and surface ships, with systems currently operational with multiple NATO nations. Using a combination of passive and active sonars systems, Ultra’s technology provides platforms with the ability to detect and classify all known torpedoes. On detection of a threat torpedo the system automatically recommends the optimum evasion course, whilst simultaneously using countermeasures to confuse and defeat the weapon.