Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
product
Thermal Imaging Camera
IRT301
Wuhan JOHO Technology Co., Ltd
IRT301 Thermal Imaging CameraIRT301, a fixed-site thermal security camera lets you aware of intruders and other threats to your facility clearly in total darkness, smoke, mist and other harsh situation. It is compatible with a wide variety of third-party accessories, permit them easy to integrate. It enable to control and operation over digital and analog networks. With 384x288 pixel detector, it delivers high quality thermal image in any harsh environmental conditions, IRT301 is ideal for both indoor and outdoor surveillance, applications covered from industrial monitoring to city or boundary security monitoring. ApplicationBorder security and surveillanceRoad, channel, warehouse monitoringBuilding and industrial safety monitoringKey FeaturesRugged, waterproof and dustproof designHigh resolution, high frame rateAdvanced image processing technologyStandard interfaceVarious lenses and pan-tilt optionsTechnical specificationDetectorDetector MaterialUFPA microbolometer, AsiResolution384x288, 25mSpectral range8m~14mNETD80mK@30LensFocus
-
product
Long-Range Perimeter Surveillance Doppler Radar
Ranger® R3D
The Ranger R3D is a dual mode, ground surveillance radar designed to provide efficient, 24/7 persistent surveillance, both within and beyond the fence. Operating in the Ka-band, the Ranger R3D leverages the resolution and accuracy of advanced FMCW technology and the extended range and terrain adaptability of Doppler in a single, compact, and lightweight package. Ruggedized for permanent, all-weather installations and mobile, stop-and-scan operations, its low minimum detection velocity (MDV) detects slow-moving threats such as walkers and crawlers.
-
product
Handheld Analyzer for Narcotics Identification
BWT-840000994
The TacticID®–N Plus is a field-ready handheld instrument specifically designed for non-contact forensic analysis of narcotics, pharmaceutical drugs, cutting agents and precursors by law enforcement personnel.Featuring an intuitive workflow and touchscreen, samples can be nondestructively analyzed through opaque and transparent packaging, with sample threat level displayed prominently for first responders,safety personnel, law enforcement, bomb squads, customs and border patrol, and hazmat team to act quickly with minimal sample contact. The TacticID®–N Plus utilizes laboratory-proven Raman spectroscopy, whichallows users to obtain actionable identification of illicit substances without ever compromising the integrity of the sample or the chain of evidence.
-
product
Interference Simulation System
GSS7765
Combined with Spirent’s powerful GSS7000 or GSS9000 Series simulators, the GSS7765 interference generator creates the ultimate tool for testing against external jamming and unintentional interference. The GSS7765 enables you to create and generate custom waveforms, helping you to defend your systems against real-world threats.
-
product
Vehicle Based Gunshot Localisation
ACLOGUS
Incoming direct fire poses a threat to the vehicle and, when manned, to its crew. Traditional acoustic systems to detect and localize incoming Small Arms Fire do not work when the vehicle is driving, which is in essence the key to survive on the battlefield in the first place.
-
product
Infrared Camera for CO Detection and Electrical Inspections
FLIR GF346
The FLIR GF346 optical gas imaging camera detects carbon monoxide (CO) and 17 additional gases without the need to interrupt your plant's production process. CO emissions can be a significant threat to primary steel manufacturing operations; even the slightest leak in a vent stack or pipe can have a devastating effect. With the FLIR GF346, inspectors can scan large areas from a safe distance, pinpointing leaks in real-time, reducing repair down-time, and providing repair verification.
-
product
CBRN Detection
At Kromek, we’ve built an internationally renowned reputation within the Radiological and Biological Threat Detection industry. For over 20 years, we’ve designed, developed, manufactured, and distributed products, systems, and solutions to make the world a safer and healthier place.
-
product
PrAMC Based On QorIQ P4040/P4080, 10 GbE, SFP+
AMC710C
The AMC710C is a flexible processor AMC for general purpose processing with the quad-core QorIQ P4040 with Data Path Acceleration Architecture intended for router and UTM (unified threat management) applications.
-
product
Wireless Network Penetration Testing
LGMS wireless network penetration testing uses automated and manual penetration techniques to locate and map authorized and unauthorized wireless access points, review corporate access point configuration and then discover weaknesses that could allow an attacker to penetrate those networks. Potential internal and external threats are documented, and a recommended action plan is developed to address any security risks.
-
product
IntelOwl
Intel Owl is an Open Source Intelligence, or OSINT solution to get threat intelligence data about a specific file, an IP or a domain from a single API at scale. It integrates a number of analyzers available online and is for everyone who needs a single point to query for info about a specific file or observable.
-
product
Advanced DDoS
The barrier to entry has been obliterated by new tools that enable anyone with an Internet connection and a grievance to launch a DDoS attack. This is a true game changer in terms of the threat landscape and what businesses should consider themselves a potential target of attack. It used to be certain verticals would be likely targets for a DDoS attack; finance, gaming and e-commerce at the top of the list. Today, any business, for any reason, any real or perceived offense or affiliation, can become a target of a DDoS attack.
-
product
Adjunct Simulation Engine
Curtiss-Wright Defense Solutions
Responding to the increasing need for realistic and effective military training to counter today’s varied threats while keeping to the budget, TCG ASE offers high fidelity, real-time, and configurable simulated tactical data link information for operational and training networks.
-
product
Multispectral Fixed Camera for Perimeter Protection
FH-Series ID
The FLIR FH-Series ID are ruggedized, multispectral fixed cameras that integrate industry-leading thermal imaging with 4K visible imaging to provide reliable intruder-detection capabilities for perimeter security. Built-in convolutional neural network (CNN) analytics accurately detect and classify human and vehicle threats moving at high or low speeds, minimizing false alarms and daily operations costs. Custom scheduling enables security operators to set intrusion analytics to run on visible streams during the day and on thermal streams throughout the night, establishing optimized coverage for any lighting condition.
-
product
Azure Data Lake Storage
Eliminate data silos with a single storage platform. Optimize costs with tiered storage and policy management. Authenticate data using Azure Active Directory (Azure AD) and role-based access control (RBAC). And help protect data with security features like encryption at rest and advanced threat protection.
-
product
Jamming
ARA antennas have been successfully deployed by the US military to combat IED's throughout the world. These antennas cover frequency ranges from 20 MHz to over 6 GHz while providing excellent gain and RF threat spatial coverage.
-
product
Torpedo defence
Ultra is a world-leader in torpedo defence for both submarines and surface ships, with systems currently operational with multiple NATO nations. Using a combination of passive and active sonars systems, Ultra’s technology provides platforms with the ability to detect and classify all known torpedoes. On detection of a threat torpedo the system automatically recommends the optimum evasion course, whilst simultaneously using countermeasures to confuse and defeat the weapon.
-
product
Power Supplies
RM-750B
With dual PCI-E connectors, the RM Series carries all its essentials to power your system. Enjoy the graphic rendered programs and games without the threat of overheating. Its dark aluminum chassis not only looks good, but dramatically relieves heat built-up. The 120mm cooling fan enhances the already efficient heat dissipation rate and helps balance the cooling system with noise level. The RM Series is great for high end users to everyday casual users. Whatever your system needs, the RM Series can deliver.
-
product
Mobile Network Monitoring
NetMobility®
The next generation of mobile network monitoring is here. With NIKSUN NetMobility® you gain unparalleled insights into subscriber behavior, carrier services, network health, cyber threats, and application performance to meet a wide range of service provider needs - Performance, Security, Operations, Management, and Planning.
-
product
Security intelligence & analytics
Detect and prioritize threats that pose the greatest risk. dentify high-risk threats with near real-time correlation and behavioral anomaly detection. Detect vulnerabilities, manage risks and identify high-priority incidents among billions of data points.Gain full visibility into network, application and user activity.
-
product
Simulators/Threat Emitters
Antennas for RADAR test, simulation and training are designed for integration into complete threat RADAR simulators for use on combat training and test ranges or in simulators for training and evaluation of RADAR operators, aircrews, air-traffic-control or weather radar applications. All antennas for RADAR simulators have high RF power handling capabilities and generally use pressurized transmission lines. Dual-band, single aperture antennas and a cluster of separate antennas mounted to a single pedestal are ideally suited for RADAR simulators in mobile, fixed, shipboard and airborne environments.
-
product
Bomb Jammer
Security Intelligence Technologies, Inc.
The Bomb Jammer is a defense technology used to counter RCIED theats. It comes in several configurations. The Covert Bomb Jamming System is our trunk mountable IED Jammer. Its low profile profile antenna setup make it an ideal vehicle jammer to defeat IED threats.
-
product
Portable Mass Spectrometer
Continuity
Continuity™ - the most sensitive portable mass spectrometer designed to provide quality and reliable mass spectrometer analysis outside of the laboratory. Continuity™ was created to provide even higher sensitivity, greater specificity with built-in MS/MS, and larger mass range coverage than its ground-breaking counterpart Portability™. Like its counterpart, Continuity™ requires no sample preparation and is compatible with almost any ambient ionization source including ESI, APCI, TD-ESI, TD-APCI, and DBDI. It allows for a broad range of applications from clinical to drug to chemical and biological threats analysis. The user-friendly interface, rapid deployment, and real-time results make Continuity™ a great solution for fast, dependable, and highly sensitive field analysis for any user in any location. This potable mass spectrometer is the excellent solution for various challenging applications, including vapors/liquids/solids, CWAs/TICs, biological/biomedical, forensic, agriculture, food safety, security, and explosives.
-
product
Network Traffic Visibility
Organisations and businesses are relying more on the network than ever before. In many instances, the network has become the business, such as is the case for managed service providers (MSPs), residential ISPs, mobile carriers, data centers, etc. Unfortunately, at the same time, networks have never been under this level of threat from malicious sources who want to disrupt or even damage infrastructure with various motivations.
-
product
Application Monitoring Tool
Strong application monitoring tool enables IT teams, to get thorough insights into application health and response-time data. Go proactive with Motadata, which is one of the best application performance monitoring tools (APM) to identify potential threats that might bring operations down and fix the issue before it becomes a problem. Real-time metrics dashboard helps you stay on top of your application performance. Resolve application performance management issues before they impact your users or customers.
-
product
Continuous Real-Time Data Feeds
Application and Threat Intelligence (Subscription)
Keysight Network Applications and Security
Test and simulation conditions must reflect the latest security threats and applications so that you can ensure your equipment and systems will perform reliably and protect networks from the most advanced and malicious traffic. With Ixia's BreakingPoint Application and Threat Intelligence (ATI) program, we do the research for you by identifying and generating security attacks and application protocols that keep you current.
-
product
Detector Ecosystem
PERL™
Revolutionizing R/ N threat detection and identification through advanced algorithms and hardware designs optimized for maximizing signal extraction in low signal-to-clutter conditions
-
product
Environmental Shock Simulation Machine For Drop Testing
# Simulates environmental handling threats small handheld products must survive.# Gauges your product?s ability to survive handling environments.# Controls key test variables: product orientation at impact; nature of the impact surface.# Maintains orientation to just prior to impact then releases for unrestrained impact.# llows user changeable impact surfaces to better simulate the handing environment.# Includes 4 ch short transient shock instrumentation system.
-
product
Web Application Firewall
WAF
Your website security solution needs to keep up with the changing cyber threat. Protect your website with Cloudbric’s cloud WAF to block unknown and modified attacks.
-
product
UXG X-Series Agile Vector Adapter, 50 MHz to 20 GHzNEW!
N5194A
The N5194A is part of the UXG family of signal generation products designed for threat simulation; simulate complex signal environments for radar/EW.
-
product
Malware Analysis Tool
ThreatAnalyzer®
See how you can defend your network from targeted attacks, advanced malware and Zero-days with ThreatAnalyzer®, the industry''s premier malware analysis sandbox. Our dynamic malware analysis sandbox (formerly known as CWSandbox) is used to dig deep into malware to reveal its impact on your organization so you can respond quickly – knowing what''s happening on your network and what systems or data are at the greatest risk.





























