Filter Results By:
Products
Applications
Manufacturers
Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
product
Power Supplies
MP-550B
With dual PCI-E connectors, the MP Series carries all its essentials to power your system. Enjoy the graphic rendered programs and games without the threat of overheating. Its dark aluminum chassis not only looks good, but dramatically relieves heat built-up. The 120mm fan enhances the already efficient heat dissipation rate and helps balance the cooling system with noise level. The MP Series is great for high end users to everyday casual users. Whatever your system needs, the MP Series can deliver.
-
product
Vehicle Based Gunshot Localisation
ACLOGUS
Incoming direct fire poses a threat to the vehicle and, when manned, to its crew. Traditional acoustic systems to detect and localize incoming Small Arms Fire do not work when the vehicle is driving, which is in essence the key to survive on the battlefield in the first place.
-
product
Multi-Spectral UV/Laser Range Stimulator
Phantom™
The Phantom is a long-range laser and ultraviolet (UV) stimulator capable of testing aircraft electro-optical sensor suites up to 5 km. Phantom can operate as an independent laser and/or UV stimulator or can be integrated with our other electro-optical and radio frequency range systems (see GTESS and PRTS). The Phantom provides both a laser threat and a synchronized temporal missile plume signature to stimulate both the aircraft’s laser and missile warning systems. Training aircrew to counter maneuver a Laser Beam Riders (LBR) threat is considered essential to survival and in-air training. The Phantom can be deployed either on a shoulder or tripod mount.
-
product
Focus Risk View
Fasoo RiskView is a tool for security administrators that monitor activity related to unstructured data and user activities with confidential data. It gathers information from Fasoo Usage Tracer (the log analysis utility for Fasoo Enterprise DRM) and Fasoo eData Manager. It has APIs that can be configured to import log data from other security technology components, including firewalls, DLP, databases, and even physical security systems (e.g., entry/exit data from keycard or biometric systems) and employee attendance records. Fasoo RiskView includes a decision making framework that security administrators as well as business managers can use to review suspicious activities and after relevant investigations, in order to decide whether or not to take action to address these concerns with potential insider threats.
-
product
Surveillance System for Long-Range Applications
ThermoVision™ (THV) 3000 MultiSensor
The ThermoVision™ (THV) 3000 detects and classifies illegal activities and threats in total darkness, smoke, sand haze, and broad daylight conditions. The thermal camera is equipped with a long-wave, cooled Quantum Well Infrared Photodetector (QWIP) and switchable optics offering three different fields of view. It provides excellent situational awareness while also closely monitoring suspect activities in real-time. Ideal applications include perimeter security, border and coastal surveillance, force protection, and mid-range threat detection.
-
product
Cybersecurity and Compliance Solution
Application Audit
Application Audit, Compuware's mainframe cybersecurity and compliance solution, enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Using Application Audit, security staff can: Deter insider threats by capturing and analyzing start-to-finish user session activity. Integrate user behavior intelligence with popular SIEM engines to analyze the overall application environment. Support criminal/legal investigations with complete and credible forensics. Fulfill compliance mandates regarding protection of sensitive data. The Value of Application Audit. Provides deep insight into user behavior including data viewed, by whom and which applications were used to access it. Enables immediate analysis through the automatic delivery of data to SIEM platforms such as Splunk and QRadar, either directly or in combination with CorreLog zDefenderTM for z/OS or Syncsort Ironstream. Delivers granular intelligence and reporting capabilities needed to comply with regulations such as HIPAA and GDPR as well as security policies. Eliminates dependency on specialized mainframe knowledge. Separates the system administrator's duties from mainframe-inexperienced auditor's responsibilities with a web UI, so that no single person is in a position to engage in malicious activities without detection.
-
product
MWIR Systems
L3 Cincinnati Electronics’ high-performance cooled mid-wave (3.5 – 5.0 µm) IR imagers are based on our patented InSb focal plane array architecture. Ideal for all combat conditions, L3 Cincinnati Electronics technology improves situational awareness in combat intelligence, sighting & tracking systems, threat deterrence and perimeter & border security with all-weather observation, day or night. These IR sensors can be utilized in urban, rural and remote situations where there are extreme climatic and terrain conditions. Well-suited for fixed or portable payloads, these imaging systems offer a substantially lower total life-cycle cost in comparison to other commercial IR imaging sensors.
-
product
Simulators/Threat Emitters
Antennas for RADAR test, simulation and training are designed for integration into complete threat RADAR simulators for use on combat training and test ranges or in simulators for training and evaluation of RADAR operators, aircrews, air-traffic-control or weather radar applications. All antennas for RADAR simulators have high RF power handling capabilities and generally use pressurized transmission lines. Dual-band, single aperture antennas and a cluster of separate antennas mounted to a single pedestal are ideally suited for RADAR simulators in mobile, fixed, shipboard and airborne environments.
-
product
Airspace Security Platform
DroneTracker
The airspace security platform that detects, classifies, and mitigates all drone threats. DroneTracker aggregates sensor information about potential threats, recognizing and classifying drones of all kinds. Its web-based interface shows live threats, real-time drone flight paths, and records forensic details including video evidence. The RF Sensor detects drones and remote controls by their radio frequency (RF) signatures.
-
product
Cargo and Vehicle Inspection
In a world where threats continue to evolve and concealment techniques become more sophisticated, our customers are facing more complex, difficult missions than ever.
-
product
Spectrum Monitoring & Signal Intelligence
Modern spectrum monitoring and signal intelligence systems can capture, process, and record wide signal bandwidths at a broad range of frequencies. Engineers need flexible software to adapt these systems to new signal types and threats.
-
product
Phobos Threat Warner System
QR020
Gain military advantage with the world's most compact and accessible R-ESM system. Phobos delivers increased real-time intelligence in the most complex operational environments.
-
product
Systems
We design and build discrete systems and complete solutions for communications, ISR and protection of forces. Our products include reconnaissance, communication and navigation systems; geo-location systems; EW systems; threat warning systems and adversary emulation systems.
-
product
Environmental Shock Simulation Machine For Drop Testing
# Simulates environmental handling threats small handheld products must survive.# Gauges your product?s ability to survive handling environments.# Controls key test variables: product orientation at impact; nature of the impact surface.# Maintains orientation to just prior to impact then releases for unrestrained impact.# llows user changeable impact surfaces to better simulate the handing environment.# Includes 4 ch short transient shock instrumentation system.
-
product
Interference Detection And Mitigation
Now more than ever, it’s critical to protect military systems from the threat of GNSSGlobal navigation satellite system (GNSS): A general term describing any satellite constellation that provides positioning, navigation, and timing (PNT) services on a global or regional basis. See also GPSGlobal Positioning System is a navigation satellite system. See also signal jamming and spoofing by using anti-jamming GPS and spoofing detection solutions.
-
product
Test And Simulation Devices
BreakingPoint
Control global threat intelligence at Internet-scale to create massive-scale, high fidelity simulation and testing conditions for battle-testing infrastructures, devices, applications, and people.
-
product
Cyber Assurance
As the Internet of Things (IoT) continues to expand, connecting more and more of our world through communication devices, a growing trend has emerged: cyber security threats.
-
product
UXG X-Series Agile Signal Generator, 10 MHz to 40 GHz
N5193A
Get closer to reality: simulate increasingly complex signal environments for radar, EW & antenna-test Test sooner & increase confidence in EW systems by generating signal simulations when you need them: the UXG is a scalable threat simulator Use pulse descriptor words (PDWs) to generate long pulse trains & individually control pulse characteristics Accurately simulate multi-threat environments: 180-ns PDW update rate, chirps 10 to 25% of carrier frequency, pulses as narrow as 10 ns
-
product
Radar Threat and Target Simulation Unit
MS 1605
PTG is used to field/LAB evaluation / testing of RADAR. PC is used to control the profile of the target generation. PTG will work in both stand alone and remote mode. The PTG has keypad and LCD for stand-alone operation. The PC can interface the PTG through the USB link. The operator can communicate through the GUI to the PTG. MIL1553B Communication used for Interfacing with RADAR.
-
product
Visual Fault Locators
Visual fault locators are used to identify problems with your fiber. GAOTek visual fault locators typically are applied for fiber tracing, fiber routine, and continuity checking. Imagine being able to easily identify when and where a fiber is breaking, bending, or when there’s a threat to the fiber layer.
-
product
Cyber Threat Assessment Program
Scientific Research Corp. STI Division
SRC provides threat assessment support focused on cyber threats that may impact the ability to wirelessly link with other systems. This activity supports the development of test and evaluation capabilities important to not only identifying current deficiencies but also for developing next generation systems.
-
product
Testing and Assessment Services for Unmanned Aerial Vehicles
Unmanned aerial vehicles (UAVs), more commonly known as drones, have many applications. UAVs can be used in agriculture for crop spraying, movie making and aerial photography, disaster relief, and can even imitate flying animals for conservation or research purposes. Our services can help you make sure your UAVs meet international norms and standards. We test materials and resilience, confirming that your drones do not pose a threat to human health or the environment. Our services can help you make sure your UAVs meet international norms and standards. We test materials and resilience, confirming that your drones do not pose a threat to human health or the environment. Our team of experts is dedicated to UAVs and their applications – and a global network of offices. We can give you the advice and expertise you need to speed your drones to market. Our team of experts is dedicated to UAVs and their applications – and a global network of offices. We can give you the advice and expertise you need to speed your drones to market.
-
product
Managed Threat Detection Service
GuardDuty
Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads. It monitors for activity such as unusual API calls or potentially unauthorized deployments that indicate a possible account compromise. GuardDuty also detects potentially compromised instances or reconnaissance by attackers.
-
product
Infrared Camera Window with PIRma-Lock
FLIR IR Windows Series
FLIR's IR Windows add a barrier between you and energized equipment, protecting you from arc flash accidents. IR windows are easy to install, easy to use, and will help you work with greater confidence. You’ll perform inspections more efficiently and reduce the threat of arc flash injury, all while staying in compliance with NFPA 70E requirements. Choose the anodized aluminum frame, or opt for durable stainless steel to prevent mixed metal issues.
-
product
Network Traffic Visibility
Organisations and businesses are relying more on the network than ever before. In many instances, the network has become the business, such as is the case for managed service providers (MSPs), residential ISPs, mobile carriers, data centers, etc. Unfortunately, at the same time, networks have never been under this level of threat from malicious sources who want to disrupt or even damage infrastructure with various motivations.
-
product
Threat Warning
Long-range, multi-threat capabilities provide continuous tracking while search and verification of surface-to-air and air-to-air missile launches for unsurpassed survivability.
-
product
UXG X-Series Agile Signal Generator, Modified Version
N5191A
et closer to reality: simulate increasingly complex signal environments for radar, EW & antenna-test Test sooner & increase confidence in EW systems by generating signal simulations when you need them: the UXG is a scalable threat simulator Use pulse descriptor words (PDWs) to generate long pulse trains & individually control pulse characteristics Quickly characterize antennas over a wide frequency range with fast frequency tuning Performance without requiring an export license
-
product
Situational Awareness
SA is utilized to secure borders from illegal trafficking, to monitor supply line routes against the placement of roadside bombs, to provide our warfighters the tools they need to alert them to potential threats, and to identify and defeat the enemy, day or night.
-
product
Shoghi's Newsletter
Shoghi is in continuous forage for international business partners who can help us represent ourselves in their respective countries, and supporting us to expand and market our Integrated ISR Solutions ,Electronic Warfare Systems, Avionics & MRO , UAV & Military Drones Satellite Imaging solutions, Communication Security , Cyberwarfare Services & Training, OEM software services(ISR, EW) for their Government and Defense, thus, protecting their Country's integrity and threats(both internal & external)oduct description goes here.
-
product
Bio-Threat Detection & Collection
IBAC 2
The IBAC 2 is a fully automated bio-detection sensor that can support continual, 24/7, air monitoring or can be set to targeting sampling windows to align to hours of operation. It alarms in less than 60 seconds when a bio-threat is present. IBAC can be configured to support automated aerosol sampling either in conjunction with its’ triggered alarms or at a set frequency sampling time. In wide service throughout the world, IBAC 2 is used to collect and detect aerosolized agents for all four classes of biological threats (spore, viral, cellular, and protein toxins) with low false alarm.