Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
product
Threat Detection/Analysis
Schweitzer Engineering Laboratories, Inc.
Several SEL devices have built-in malware detection or can identify nonauthorized network traffic.
-
product
Threat Warning
Long-range, multi-threat capabilities provide continuous tracking while search and verification of surface-to-air and air-to-air missile launches for unsurpassed survivability.
-
product
Advanced Threat Detection
The Passive Airborne Warning System (PAWS) family of IR-based Passive Warning Systems provides a comprehensive, turn-key solution for airborne platforms. The sophisticated IR missile warning systems enhances airborne platform survivability by providing advanced warning of the presence of threatening missiles and by automatic management to all types of applicable countermeasures available onboard.
-
product
Global Threat Intelligence
Arbor has a long history in botnet research and DDoS mitigation. However, as DDoS has moved from just a diversion to be a feature of malware and botnets used in cybercrime and APT attacks, Arbor has expanded its research team and research capabilities to tackle additional threat types.
-
product
Cyber Threat Assessment Program
Scientific Research Corp. STI Division
SRC provides threat assessment support focused on cyber threats that may impact the ability to wirelessly link with other systems. This activity supports the development of test and evaluation capabilities important to not only identifying current deficiencies but also for developing next generation systems.
-
product
Managed Threat Detection Service
GuardDuty
Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads. It monitors for activity such as unusual API calls or potentially unauthorized deployments that indicate a possible account compromise. GuardDuty also detects potentially compromised instances or reconnaissance by attackers.
-
product
Phobos Threat Warner System
QR020
Gain military advantage with the world's most compact and accessible R-ESM system. Phobos delivers increased real-time intelligence in the most complex operational environments.
-
product
Portable Range Threat Simulators
The Textron System's PRTS™ and HPRTS™ are medium and long-range, programmable, ruggedized Radio Frequency (RF) test and training tools. Our PRTS family of range simulators delivers high-fidelity environments for training ranges.
-
product
Ground Threat Emitter Sensor System
GTESS
The Ground Threat Emitter Sensor System (GTESS) is a modular test and training system capable of stimulating multi-spectral aircraft electro-optic sensor suites at long range. The GTESS system integrates Textron Systems’ ultraviolet (Mallina™), infrared (Phoenix) and/or laser (Phantom™) ranged stimulators with an automated tracking system to facilitate fast-moving test, training and evaluation exercises. A fully integrated camera system for effective after action review. GTESS can also work in conjunction with Textron’s radio frequency (RF) range stimulator systems (PRTS™ & HPRTS) for complete multi-spectral testing.
-
product
Radar Threat and Target Simulation Unit
MS 1605
PTG is used to field/LAB evaluation / testing of RADAR. PC is used to control the profile of the target generation. PTG will work in both stand alone and remote mode. The PTG has keypad and LCD for stand-alone operation. The PC can interface the PTG through the USB link. The operator can communicate through the GUI to the PTG. MIL1553B Communication used for Interfacing with RADAR.
-
product
Sensor Enabled Neural Threat Recognition And Identification
SENTRI
The system is a breakthrough technology that recognizes gunshots and explosions and sends range and bearing details to cameras which can then locate the source of the event.
-
product
1553Guard
MIL-STD-1553 bus architecture is a threat that adversaries can leverage to compromise your equipment and spread malicious software through your Serial Data Bus (SDB) system. You need a solution that can not only identify current and future cyberattacks in real-time but also instantly eliminate those threats before they wreak havoc and interrupt the mission.
-
product
1U 19” Network Appliance With AMD® Ryzen 7000 Family Processor
CSA-5100A
CSA-5100A is a powerful 1U rackmount network appliance, designed for mid-range network security applications like Firewall-as-a-Service (FWaaS) and Next-Generation Firewalls (NGFW), SD-WAN, End-to-end encryption, WAN optimization, cloud acceleration, NGFW, advanced threat prevention, mobile security, secure web gateway.
-
product
Adjunct Simulation Engine
Curtiss-Wright Defense Solutions
Responding to the increasing need for realistic and effective military training to counter today’s varied threats while keeping to the budget, TCG ASE offers high fidelity, real-time, and configurable simulated tactical data link information for operational and training networks.
-
product
Advanced DDoS
The barrier to entry has been obliterated by new tools that enable anyone with an Internet connection and a grievance to launch a DDoS attack. This is a true game changer in terms of the threat landscape and what businesses should consider themselves a potential target of attack. It used to be certain verticals would be likely targets for a DDoS attack; finance, gaming and e-commerce at the top of the list. Today, any business, for any reason, any real or perceived offense or affiliation, can become a target of a DDoS attack.
-
product
Advanced Penetration Testing
Compliance does not ensure protection from all threats – it is just a minimum requirements baseline. Mandatory regulations were designed to protect customer data. As technology advances and your organization continues to grow, a compliance mindset puts your organization at risk. To protect your customer data, sensitive corporate data, operations and reputation, more is required.
-
product
Aerospace & Defense
Electronic warfare (EW) systems require advanced high-fidelity threat simulators to prepare for combat with potential adversaries. Hiller Measurements’ depth of knowledge in RF source and measurement technologies enables us to help our clients develop the best EW simulation systems that will meet the everchanging landscape of EW threat simulation.
-
product
Agile Signal Generators (UXG)
XSeries
Get a powerful building block, whether you need a dependable LO or a scalable threat simulator More accurately simulate multi-emitter scenarios for radar, EW and antenna test with the fastest switching, phase coherency, and extensive pulse-modulation Test sooner and increase confidence in EW system performance by generating complex signal simulations when you need them Increase the reliability of your test system: the UXG is a slide-in replacement for legacy fast-switching sources
-
product
Airspace Security Platform
DroneTracker
The airspace security platform that detects, classifies, and mitigates all drone threats. DroneTracker aggregates sensor information about potential threats, recognizing and classifying drones of all kinds. Its web-based interface shows live threats, real-time drone flight paths, and records forensic details including video evidence. The RF Sensor detects drones and remote controls by their radio frequency (RF) signatures.
-
product
All Hazards Detection & Identification Tool
MX908
MX908™ leverages high-pressure mass spectrometry (HPMS) to deliver dramatically enhanced sensitivity and broader threat category coverage. MX908 hosts an all hazards threat list which has been upgraded to include a broader spectrum of chemical warfare agents (CWA), explosives and high priority toxic industrial chemical (TIC) targets. From military grade, commercial and improvised explosives to novel threat materials, MX908 supports the needs of the modern mission.
-
product
Application Monitoring Tool
Strong application monitoring tool enables IT teams, to get thorough insights into application health and response-time data. Go proactive with Motadata, which is one of the best application performance monitoring tools (APM) to identify potential threats that might bring operations down and fix the issue before it becomes a problem. Real-time metrics dashboard helps you stay on top of your application performance. Resolve application performance management issues before they impact your users or customers.
-
product
Arbitrary Waveform Generators
Proteus Series
The new Proteus Arbitrary Waveform Generator is ideal for applications in Quantum Computing, Electronic Warfare, Radar, and next generation communications such as 5G, 6G, Ultrawide Bandwidth (UWB), and WiFi (802.11) 6 and 7. Built on the latest RF DAC and RF ADC technology, the series has sample rates up to 9GS/s and multiple Nyquist zone frequency range capability in excess of 10GHz. It’s an innovative task oriented programming environment, and user programmable FPGA. When used in combination w...show more -
product
Archival Storage Rooms
Darwin Chambers Company’s NFPA, GSA, and NARA Directive 1571-compliant Archival Storage Chambers are engineered to provide maximum value, efficiency and conformance with all applicable standards and codes. Archival chambers provide environmental controls for storing records and materials (including paper documents and items with high fibrous content, various films, microfiche, and photographic materials) that require permanent protection for storage and preservation. Our high-performance systems...show more -
product
Autonomous PNT Performance and Vulnerability Test Suite
PANACEA
PANACEA is an autonomous GNSS performance and threat environment simulator system designed to control simulation hardware and collect data from up to 32 GNSS receivers simultaneously.
-
product
Aviation Security
Aviation is highly regulated, from ICAO Annex 17 to National Security Programs. Due to its high profile and the subsequent multitude of threats, regulation safeguards travel security. Our expertise will support your business, by supplying market leading X-Ray and Metal detection products along with maintenance, that meet the regulator requirements and best fit your business.
-
product
Azure Data Lake Storage
Eliminate data silos with a single storage platform. Optimize costs with tiered storage and policy management. Authenticate data using Azure Active Directory (Azure AD) and role-based access control (RBAC). And help protect data with security features like encryption at rest and advanced threat protection.
-
product
Biological Detection
Collaborating with government agencies in the USA and UK in the field of biological threat detection, Kromek is working towards the common goal of improving the early detection of biological threats anytime and anywhere, making the world safer and healthier.
-
product
Biological Wide-area AeRosol Detector
BioWARD
Standalone sensor in weatherproof enclosure detects thermal objects with consistent appearance/behavior to a bioaerosol plume and determines a threat probability
-
product
Bio-Threat Detection & Collection
IBAC 2
The IBAC 2 is a fully automated bio-detection sensor that can support continual, 24/7, air monitoring or can be set to targeting sampling windows to align to hours of operation. It alarms in less than 60 seconds when a bio-threat is present. IBAC can be configured to support automated aerosol sampling either in conjunction with its’ triggered alarms or at a set frequency sampling time. In wide service throughout the world, IBAC 2 is used to collect and detect aerosolized agents for all four classes of biological threats (spore, viral, cellular, and protein toxins) with low false alarm.
-
product
Blocklist Based Filtering
Many businesses prefer to use blocklists prepared by external intelligence agencies to save the time of generating this data themselves. Also, to get as much exposure and intelligence of the threat landscape as possible. However, this blocklist information can be sent in various formats, making utilizing them a challenge. Luckily, FastNetMon is a flexible blacklisting feed filtering tool that supports a vast array of formats to receive, consume, and use blocklists from different intelligence feed providers. FastNetMon then enables you to block specific malicious and dangerous hosts using blocklist-based filtering.