Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
product
Laser Warnings Systems
Elbit Systems of America’s laser warning systems use both coherent and non-coherent laser sources. We understand the full scope of issues associated with each laser threat and have the systems engineering expertise necessary to accurately and reliably detect, locate and categorize these threats. Each LWS is equipped with a direction indicator and provides complete threat coverage in a high dynamic range with audio and visual warnings.
-
product
Infrared Camera for CO Detection and Electrical Inspections
FLIR GF346
The FLIR GF346 optical gas imaging camera detects carbon monoxide (CO) and 17 additional gases without the need to interrupt your plant's production process. CO emissions can be a significant threat to primary steel manufacturing operations; even the slightest leak in a vent stack or pipe can have a devastating effect. With the FLIR GF346, inspectors can scan large areas from a safe distance, pinpointing leaks in real-time, reducing repair down-time, and providing repair verification.
-
product
Remote Weapon Systems Sight
ThermoSight® V4000E
The ThermoSight® V4000E is a cooled midwave infrared (MWIR) sight for long-range remote weapon systems designed to maximize performance and stand off range. It has a wide field of view of 10 degrees to scan the scene for threats and targets a narrow 2 degrees field of view for target assessment and accurate timing. The ThermoSight® V4000E has superior automatic detail enhancement (ADE), a proven low-life cycle cost, and a fast and reliable calibration mode (NUC) for easy operation.
-
product
TDL Training Tools and Services
Curtiss-Wright Defense Solutions
To prepare for the threats of the battlefield, warfighters must be familiar with what they will encounter. With extensive experience in tactical data link training and technology, Curtiss-Wright has the tools and expertise to provide your organization with solutions that facilitate tactical data link communication on the battlefield.
-
product
Threat Detection/Analysis
Schweitzer Engineering Laboratories, Inc.
Several SEL devices have built-in malware detection or can identify nonauthorized network traffic.
-
product
Interference Modeling And Simulation
The CAST Navigation Jammers are designed to facilitate and support the testing, verification, and integration of single element Fixed Reception Pattern Antenna (FRPA) systems as well as multiple-element anti-jam antenna sub-systems such as Controlled Reception Pattern Antennas (CRPAs). These systems are an ideal solution for military and commercial laboratories where interference signal capability is required. CAST Jammer sub-systems provide precisely controlled signals for use in most types of GNSS testing applications, emulating interference conditions and threats that can occur in both urban and hostile environments.
-
product
Web Application Firewall
WAF
Your website security solution needs to keep up with the changing cyber threat. Protect your website with Cloudbric’s cloud WAF to block unknown and modified attacks.
-
product
Perimeter Security And Coastal Surveillance Systems
These systems comprise of Radars and Cameras and can give early warming to the commanders about any intrusion/breach of perimeter of any restricted area. These can be integrated with jammers to tackle drone threats too.
-
product
Long-Range Perimeter Surveillance Doppler Radar
Ranger® R3D
The Ranger R3D is a dual mode, ground surveillance radar designed to provide efficient, 24/7 persistent surveillance, both within and beyond the fence. Operating in the Ka-band, the Ranger R3D leverages the resolution and accuracy of advanced FMCW technology and the extended range and terrain adaptability of Doppler in a single, compact, and lightweight package. Ruggedized for permanent, all-weather installations and mobile, stop-and-scan operations, its low minimum detection velocity (MDV) detects slow-moving threats such as walkers and crawlers.
-
product
Spectrum Monitoring & Signal Intelligence
Modern spectrum monitoring and signal intelligence systems can capture, process, and record wide signal bandwidths at a broad range of frequencies. Engineers need flexible software to adapt these systems to new signal types and threats.
-
product
Biological Detection
Collaborating with government agencies in the USA and UK in the field of biological threat detection, Kromek is working towards the common goal of improving the early detection of biological threats anytime and anywhere, making the world safer and healthier.
-
product
Open-Path Chemical Detection System
LaserWarn™
Block Engineering's LaserWarn is an open path gas detection system based on patented quantum cascade laser technology. LaserWarn detects chemical threats, leaks, and fugitive emissions over a coverage area of thousands of square feet, and can be used in both indoor and outdoor applications.
-
product
Wireless Network Penetration Testing
LGMS wireless network penetration testing uses automated and manual penetration techniques to locate and map authorized and unauthorized wireless access points, review corporate access point configuration and then discover weaknesses that could allow an attacker to penetrate those networks. Potential internal and external threats are documented, and a recommended action plan is developed to address any security risks.
-
product
Mobile Network Monitoring
NetMobility®
The next generation of mobile network monitoring is here. With NIKSUN NetMobility® you gain unparalleled insights into subscriber behavior, carrier services, network health, cyber threats, and application performance to meet a wide range of service provider needs - Performance, Security, Operations, Management, and Planning.
-
product
Advanced DDoS
The barrier to entry has been obliterated by new tools that enable anyone with an Internet connection and a grievance to launch a DDoS attack. This is a true game changer in terms of the threat landscape and what businesses should consider themselves a potential target of attack. It used to be certain verticals would be likely targets for a DDoS attack; finance, gaming and e-commerce at the top of the list. Today, any business, for any reason, any real or perceived offense or affiliation, can become a target of a DDoS attack.
-
product
Deep Packet Inspection
FlowPro
FlowPro is inserted into areas of the network when visibility is needed. It uses a deep packet inspection (DPI) to compile a flow cache, and exports traffic and threat details reflecting 100% of all communications that pass by. FlowPro is a great complement to the Scrutinizer Incident Response System and ensures the security team has insight where they need it.
-
product
Azure Data Lake Storage
Eliminate data silos with a single storage platform. Optimize costs with tiered storage and policy management. Authenticate data using Azure Active Directory (Azure AD) and role-based access control (RBAC). And help protect data with security features like encryption at rest and advanced threat protection.
-
product
Visual Fault Locators
Visual fault locators are used to identify problems with your fiber. GAOTek visual fault locators typically are applied for fiber tracing, fiber routine, and continuity checking. Imagine being able to easily identify when and where a fiber is breaking, bending, or when there’s a threat to the fiber layer.
-
product
Power Supplies
RM-750B
With dual PCI-E connectors, the RM Series carries all its essentials to power your system. Enjoy the graphic rendered programs and games without the threat of overheating. Its dark aluminum chassis not only looks good, but dramatically relieves heat built-up. The 120mm cooling fan enhances the already efficient heat dissipation rate and helps balance the cooling system with noise level. The RM Series is great for high end users to everyday casual users. Whatever your system needs, the RM Series can deliver.
-
product
Sensors
We design, develop and produce state-of-the-art SIGINT sensors that seek, exploit, identify, and locate sources of RF energy, underwater sound, light, heat and other complex phenomena. These sensors recognize threats, gather intelligence, and allow our customers to make informed, strategic response decisions.
-
product
Cargo and Vehicle Inspection
In a world where threats continue to evolve and concealment techniques become more sophisticated, our customers are facing more complex, difficult missions than ever.
-
product
Digital Map Systems
Elbit Systems of America’s Global Digital Map Unit is built on a proven design that accommodates multiple data formats and provides unmatched situational awareness to aircrews. The GDMU displays detailed map, flight plan, and threat information to aircrews. Each system performs interactive functions with the mission computers and generates digital video map data for head down displays.
-
product
Network Security Testing
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
product
Special Operations Intelligence Collection Systems
Scientific Research Corp. STI Division
SRC designs, develops, produces, and supports the Joint Threat Warning System for Special Operations. This family of systems is used on air, land, and sea to provide threat situational awareness and intelligence collection capabilities for high-value missions.
-
product
Autonomous PNT Performance and Vulnerability Test Suite
PANACEA
PANACEA is an autonomous GNSS performance and threat environment simulator system designed to control simulation hardware and collect data from up to 32 GNSS receivers simultaneously.
-
product
1U 19” Network Appliance With AMD® Ryzen 7000 Family Processor
CSA-5100A
CSA-5100A is a powerful 1U rackmount network appliance, designed for mid-range network security applications like Firewall-as-a-Service (FWaaS) and Next-Generation Firewalls (NGFW), SD-WAN, End-to-end encryption, WAN optimization, cloud acceleration, NGFW, advanced threat prevention, mobile security, secure web gateway.
-
product
Security/Detection
If your design challenge is to create the best motion sensor or motion detector - fire sensor or fire detector, smoke sensor or smoke detector - you've come to the right company. Dexter's sensor technologies are at multiple fronts today, reducing the threat of combat on land, sea and air. Yet the industry leading advantages of Dexter sensors - low cost, high sensitivity, low energy consumption and long life - make them the perfect motion sensor for home, office and facility applications. Dexter thin-film and silicon detectors can target precise threats, whether defined by movement, temperature or body mass. Intensive MIL-STD-883H testing performed by Trialon Corporation, an independent testing facility, confirm that Dexter Research's silicon-based temperature sensor detectors meet the same rugged requirements of 1,000G's for mechanical shock and 30G's in random vibration for which our thin-film detectors are famous. Download Dexter's report here (PDF).
-
product
Application Monitoring Tool
Strong application monitoring tool enables IT teams, to get thorough insights into application health and response-time data. Go proactive with Motadata, which is one of the best application performance monitoring tools (APM) to identify potential threats that might bring operations down and fix the issue before it becomes a problem. Real-time metrics dashboard helps you stay on top of your application performance. Resolve application performance management issues before they impact your users or customers.
-
product
Security Vehicles
When you need to set up robust security operations in a temporary or outdoor location, our security vehicles can provide a tried and tested solution. For use at festivals, public ceremonies, sports events and other outdoor functions, our mobile check point and scan truck will help keep your guests or members of the public safe from security threats.





























