Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
product
Multi-Spectral UV/Laser Range Stimulator
Phantom™
The Phantom is a long-range laser and ultraviolet (UV) stimulator capable of testing aircraft electro-optical sensor suites up to 5 km. Phantom can operate as an independent laser and/or UV stimulator or can be integrated with our other electro-optical and radio frequency range systems (see GTESS and PRTS). The Phantom provides both a laser threat and a synchronized temporal missile plume signature to stimulate both the aircraft’s laser and missile warning systems. Training aircrew to counter maneuver a Laser Beam Riders (LBR) threat is considered essential to survival and in-air training. The Phantom can be deployed either on a shoulder or tripod mount.
-
product
Security Vehicles
When you need to set up robust security operations in a temporary or outdoor location, our security vehicles can provide a tried and tested solution. For use at festivals, public ceremonies, sports events and other outdoor functions, our mobile check point and scan truck will help keep your guests or members of the public safe from security threats.
-
product
Gas Detection
Explosive or toxic gases are a constant threat in industry as well as civil and military security. Second Sight is an innovative instrument to protect infrastructures and population throuht early warning.
-
product
Autonomous PNT Performance and Vulnerability Test Suite
PANACEA
PANACEA is an autonomous GNSS performance and threat environment simulator system designed to control simulation hardware and collect data from up to 32 GNSS receivers simultaneously.
-
product
Test And Simulation Devices
BreakingPoint
Control global threat intelligence at Internet-scale to create massive-scale, high fidelity simulation and testing conditions for battle-testing infrastructures, devices, applications, and people.
-
product
Biological Detection
Collaborating with government agencies in the USA and UK in the field of biological threat detection, Kromek is working towards the common goal of improving the early detection of biological threats anytime and anywhere, making the world safer and healthier.
-
product
All Hazards Detection & Identification Tool
MX908
MX908™ leverages high-pressure mass spectrometry (HPMS) to deliver dramatically enhanced sensitivity and broader threat category coverage. MX908 hosts an all hazards threat list which has been upgraded to include a broader spectrum of chemical warfare agents (CWA), explosives and high priority toxic industrial chemical (TIC) targets. From military grade, commercial and improvised explosives to novel threat materials, MX908 supports the needs of the modern mission.
-
product
SaaS Platform.
GreyMatter
Security practitioners are often on the defensive. There aren’t enough hours in the day or people with the broad skill sets needed to keep up with threats evolving at machine speed. That’s why we’re committed to making automation work across the entire security lifecycle. We believe the only way to make security possible is to automate away the repetitive and mundane. That’s why we built ReliaQuest GreyMatter, the first unified threat detection, investigation and response SaaS platform.
-
product
Compact Long range HD Multi-spectral Surveillance System
TacFLIR® 280-HD
TacFLIR 280-HD is a high-performance land-based imaging system designed to identify and track smugglers, terrorists, or any other threat – day and night, and in the toughest terrain. Tailored for mobile deployment with high definition imaging and powerful optics and INS, TacFLIR 280-HD reveals the details necessary for long range vehicle detection, identification, and threat assessment.
-
product
FlowSpec DDoS Mitigation
Large volumetric-based DDoS attacks are increasing in terms of frequency and scale at which they are perpetrated. With hundreds of-gigabits worth of attacks becoming commonplace, organizations not only face service interruptions for customers but the complete implosion of their infrastructure’s operation. In the face of this increasingly challenging threat landscape, BGP FlowSpec DDoS mitigation has emerged as one of the most effective techniques to mitigate DDoS attacks. Combined with an accurate and speedy detection system, it helps manage and synchronize working with firewalls to mitigate these attacks.
-
product
Utility Detection Radar
DS2000
There’s a lot going on underground that you need to know about before you ever start to dig. The Leica DS2000 Utility Detection Radar finds all potential threats, including non-conductive pipes and fibre optics, increasing safety by lowering the risk of accidently hitting underground assets. Increase safety, speed up work and lower asset management costs with the ability to prevent hazardous outages and collect more information. The DS2000 betters your business by making it safer, faster and more efficient.
-
product
Blocklist Based Filtering
Many businesses prefer to use blocklists prepared by external intelligence agencies to save the time of generating this data themselves. Also, to get as much exposure and intelligence of the threat landscape as possible. However, this blocklist information can be sent in various formats, making utilizing them a challenge. Luckily, FastNetMon is a flexible blacklisting feed filtering tool that supports a vast array of formats to receive, consume, and use blocklists from different intelligence feed providers. FastNetMon then enables you to block specific malicious and dangerous hosts using blocklist-based filtering.
-
product
Phobos Threat Warner System
QR020
Gain military advantage with the world's most compact and accessible R-ESM system. Phobos delivers increased real-time intelligence in the most complex operational environments.
-
product
Special Operations Intelligence Collection Systems
Scientific Research Corp. STI Division
SRC designs, develops, produces, and supports the Joint Threat Warning System for Special Operations. This family of systems is used on air, land, and sea to provide threat situational awareness and intelligence collection capabilities for high-value missions.
-
product
1553Guard
MIL-STD-1553 bus architecture is a threat that adversaries can leverage to compromise your equipment and spread malicious software through your Serial Data Bus (SDB) system. You need a solution that can not only identify current and future cyberattacks in real-time but also instantly eliminate those threats before they wreak havoc and interrupt the mission.
-
product
High-Speed Maneuvering Surface Target (HSMST)
Kratos Defense & Security Solutions, Inc.
The Kratos C2 is currently in use and supporting mission operations for the U.S. Navy and Army utilizing the High-Speed Maneuvering Surface Target (HSMST), developed in response to a requirement for a 40+ knot target to represent littoral threats encountered by the fleet and which would retain 35 kt capability in advanced sea states. Kratos has successfully supported weapons testing missions that required waves of multiple independently controlled HSMST’s (more than 10 vessels) coming from multiple axes.
-
product
Radar Threat and Target Simulation Unit
MS 1605
PTG is used to field/LAB evaluation / testing of RADAR. PC is used to control the profile of the target generation. PTG will work in both stand alone and remote mode. The PTG has keypad and LCD for stand-alone operation. The PC can interface the PTG through the USB link. The operator can communicate through the GUI to the PTG. MIL1553B Communication used for Interfacing with RADAR.
-
product
Digital Map Systems
Elbit Systems of America’s Global Digital Map Unit is built on a proven design that accommodates multiple data formats and provides unmatched situational awareness to aircrews. The GDMU displays detailed map, flight plan, and threat information to aircrews. Each system performs interactive functions with the mission computers and generates digital video map data for head down displays.
-
product
Mobile Systems
Advanced vehicle-based platforms for real-time detection and identification of CBRN threats in complex and variable urban environments.
-
product
Cyber Security Assessment
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
product
Hold Baggage Screening
With millions of bags and parcels flowing through airport security, border crossings and warehouse every single day, Explosive Detection Systems (EDS) have to comply with global threat detection standards without impacting throughput.
-
product
Missile Warning System Testers
CI Systems provides a wide range of Missile Warning System (MWS) testers that can accurately simulate approaching threat signatures in the IR / Dual IR / UV /SWIR wavebands. These test systems can also test the MWS evaluation and acquisition of targets, tracking, and the performance of countermeasures. Also available is an infrared target simulator that projects an IR scene (background, target, and flare).
-
product
Fixed Surveillance System for Perimeter Security
Argus
Argus is a fixed, rugged, preconfigured wide area surveillance system. Combining a best-in-class radar and thermal camera with Command and Control software, Argus is designed to detect and track multiple threats both near and far in the most demanding weather conditions 24 /7. When compared to other perimeter security solutions, Argus has the lowest initial cost per kilometer of secured space as well as the lowest lifetime cost.
-
product
Agile Signal Generators (UXG)
XSeries
Get a powerful building block, whether you need a dependable LO or a scalable threat simulator More accurately simulate multi-emitter scenarios for radar, EW and antenna test with the fastest switching, phase coherency, and extensive pulse-modulation Test sooner and increase confidence in EW system performance by generating complex signal simulations when you need them Increase the reliability of your test system: the UXG is a slide-in replacement for legacy fast-switching sources
-
product
Cybersecurity and Compliance Solution
Application Audit
Application Audit, Compuware's mainframe cybersecurity and compliance solution, enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Using Application Audit, security staff can: Deter insider threats by capturing and analyzing start-to-finish user session activity. Integrate user behavior intelligence with popular SIEM engines to analyze the overall application environment. Support criminal/legal investigations with complete and credible forensics. Fulfill compliance mandates regarding protection of sensitive data. The Value of Application Audit. Provides deep insight into user behavior including data viewed, by whom and which applications were used to access it. Enables immediate analysis through the automatic delivery of data to SIEM platforms such as Splunk and QRadar, either directly or in combination with CorreLog zDefenderTM for z/OS or Syncsort Ironstream. Delivers granular intelligence and reporting capabilities needed to comply with regulations such as HIPAA and GDPR as well as security policies. Eliminates dependency on specialized mainframe knowledge. Separates the system administrator's duties from mainframe-inexperienced auditor's responsibilities with a web UI, so that no single person is in a position to engage in malicious activities without detection.
-
product
Security Testing Services
Alphabin Technology Consulting
Fortify your digital defenses and enhance the resilience of your systems to safeguard against cyber threats.
-
product
Handheld Narcotics Analyzer
TruNarc™
The global drug problem is increasing, with trafficking of meth, heroin, and emerging threats like fentanyl, and carfentanil, impacting communities worldwide. Law enforcement officials need to quickly identify suspected narcotics in the field to help keep drugs, and drug dealers, off the streets. Now with the expanded v1.7 library, the Thermo Scientific™ TruNarc™ Handheld Narcotics Analyzer enables officers, customs, border control, and other personnel to scan more than 415 suspected illicit substances in a single, definitive test.
-
product
Power Supplies
RM - SERIES
With dual PCI-E connectors, the RM Series carries all its essentials to power your system. Enjoy the graphic rendered programs and games without the threat of overheating. Its dark aluminum chassis not only looks good, but dramatically relieves heat built-up. The 120mm cooling fan enhances the already efficient heat dissipation rate and helps balance the cooling system with noise level. The RM Series is great for high end users to everyday casual users. Whatever your system needs, the RM Series can deliver.
-
product
Web DDOS Protection
DDoS attacks continue to increase and still cause great damage today. In addition to the frequency, the complexity and duration of an attack cause major problems for the defense. Therefore, the deployed solution should intervene precisely and quickly to best protect you from threats and high costs due to downtime.





























