Filter Results By:
Products
Applications
Manufacturers
Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
product
1U 19” Network Appliance With AMD® Ryzen 7000 Family Processor
CSA-5100A
CSA-5100A is a powerful 1U rackmount network appliance, designed for mid-range network security applications like Firewall-as-a-Service (FWaaS) and Next-Generation Firewalls (NGFW), SD-WAN, End-to-end encryption, WAN optimization, cloud acceleration, NGFW, advanced threat prevention, mobile security, secure web gateway.
-
product
Checkpoint Security System
ConneCT
The ConneCTTM Checkpoint Security System is an advanced aviation security explosive detection system (EDS) engineered to deliver superior threat detection, dramatically improved passenger throughput, and low total cost of ownership.
-
product
Long-Range Perimeter Surveillance Doppler Radar
Ranger® R3D
The Ranger R3D is a dual mode, ground surveillance radar designed to provide efficient, 24/7 persistent surveillance, both within and beyond the fence. Operating in the Ka-band, the Ranger R3D leverages the resolution and accuracy of advanced FMCW technology and the extended range and terrain adaptability of Doppler in a single, compact, and lightweight package. Ruggedized for permanent, all-weather installations and mobile, stop-and-scan operations, its low minimum detection velocity (MDV) detects slow-moving threats such as walkers and crawlers.
-
product
Digital Map Systems
Elbit Systems of America’s Global Digital Map Unit is built on a proven design that accommodates multiple data formats and provides unmatched situational awareness to aircrews. The GDMU displays detailed map, flight plan, and threat information to aircrews. Each system performs interactive functions with the mission computers and generates digital video map data for head down displays.
-
product
Testing and Assessment Services for Unmanned Aerial Vehicles
Unmanned aerial vehicles (UAVs), more commonly known as drones, have many applications. UAVs can be used in agriculture for crop spraying, movie making and aerial photography, disaster relief, and can even imitate flying animals for conservation or research purposes. Our services can help you make sure your UAVs meet international norms and standards. We test materials and resilience, confirming that your drones do not pose a threat to human health or the environment. Our services can help you make sure your UAVs meet international norms and standards. We test materials and resilience, confirming that your drones do not pose a threat to human health or the environment. Our team of experts is dedicated to UAVs and their applications – and a global network of offices. We can give you the advice and expertise you need to speed your drones to market. Our team of experts is dedicated to UAVs and their applications – and a global network of offices. We can give you the advice and expertise you need to speed your drones to market.
-
product
Threat Detection/Analysis
Schweitzer Engineering Laboratories, Inc.
Several SEL devices have built-in malware detection or can identify nonauthorized network traffic.
-
product
Mobile Systems
Advanced vehicle-based platforms for real-time detection and identification of CBRN threats in complex and variable urban environments.
-
product
Cyber Security Assessment
In the Internet of Things, everyone and everything is at risk of becoming a victim of cyber attacks.Protection against cyberspace threats is particularly relevant and important for connected devices.Messages about defective devices and successful attacks, which can also be carried out with very simple means, are increasing.Third party verification can be helpful in building trust by confirming and demonstrating an adequate level of protection.
-
product
Counter-Drone Solutions
ARDRONIS
The proliferation of malicious and non-cooperative drones is an ever-increasing threat to aviation and sensitive site security. Whether it be disruption of critical national infrastructure at home or risk of life to forward-deployed personnel abroad, civil and government organizations and agencies; all of them require affordable and reliable counter-drone solutions. Protective measures can only be taken after a threat is detected. To effectively counter the threat, early warning is necessary – every second counts.
-
product
Azure Data Lake Storage
Eliminate data silos with a single storage platform. Optimize costs with tiered storage and policy management. Authenticate data using Azure Active Directory (Azure AD) and role-based access control (RBAC). And help protect data with security features like encryption at rest and advanced threat protection.
-
product
Global Lightning Network
Our Global Lightning Network® (GLN®) is tried and true, delivering hyperlocal real-time lightning data for threat assessment and integration.
-
product
Application Monitoring Tool
Strong application monitoring tool enables IT teams, to get thorough insights into application health and response-time data. Go proactive with Motadata, which is one of the best application performance monitoring tools (APM) to identify potential threats that might bring operations down and fix the issue before it becomes a problem. Real-time metrics dashboard helps you stay on top of your application performance. Resolve application performance management issues before they impact your users or customers.
-
product
Security/Detection
If your design challenge is to create the best motion sensor or motion detector - fire sensor or fire detector, smoke sensor or smoke detector - you've come to the right company. Dexter's sensor technologies are at multiple fronts today, reducing the threat of combat on land, sea and air. Yet the industry leading advantages of Dexter sensors - low cost, high sensitivity, low energy consumption and long life - make them the perfect motion sensor for home, office and facility applications. Dexter thin-film and silicon detectors can target precise threats, whether defined by movement, temperature or body mass. Intensive MIL-STD-883H testing performed by Trialon Corporation, an independent testing facility, confirm that Dexter Research's silicon-based temperature sensor detectors meet the same rugged requirements of 1,000G's for mechanical shock and 30G's in random vibration for which our thin-film detectors are famous. Download Dexter's report here (PDF).
-
product
Biological Detection
Collaborating with government agencies in the USA and UK in the field of biological threat detection, Kromek is working towards the common goal of improving the early detection of biological threats anytime and anywhere, making the world safer and healthier.
-
product
Infrared Camera Window with PIRma-Lock
FLIR IR Windows Series
FLIR's IR Windows add a barrier between you and energized equipment, protecting you from arc flash accidents. IR windows are easy to install, easy to use, and will help you work with greater confidence. You’ll perform inspections more efficiently and reduce the threat of arc flash injury, all while staying in compliance with NFPA 70E requirements. Choose the anodized aluminum frame, or opt for durable stainless steel to prevent mixed metal issues.
-
product
Cyber Assurance
As the Internet of Things (IoT) continues to expand, connecting more and more of our world through communication devices, a growing trend has emerged: cyber security threats.
-
product
Archival Storage Rooms
Darwin Chambers Company’s NFPA, GSA, and NARA Directive 1571-compliant Archival Storage Chambers are engineered to provide maximum value, efficiency and conformance with all applicable standards and codes. Archival chambers provide environmental controls for storing records and materials (including paper documents and items with high fibrous content, various films, microfiche, and photographic materials) that require permanent protection for storage and preservation. Our high-performance systems are offered with nearly unlimited operational fail safes, includ- ing full system and control redundancy. In addition to keyed entry, numerous security options are also available, due to the often irreplaceable nature of the materials to be stored and preserved in this type of chamber. Our chambers are engineered to accommodate the loads and unique requirements of the specific materials to be stored, with industry-leading control and uniformity of both temperature and humidity variables. Design considerations include both functional and operational efficiencies and reliability, the safety and comfort of operating personnel, and the ongoing protection of the archived materials from fire, water, light degradation, pests, mold and natural contaminants, pollutants and other man- made threats.
-
product
NAVAL LASER-WARNING SYSTEM
NLWS
Laser activity in your vicinity might mean the presence of a threat. Saab's Naval Laser-Warning System (NLWS) is capable of detecting and analysing lasers in blue-water and littoral combat environments. This system provides vitally important situational awareness to the command team about the presence of laser activity.
-
product
Situational Awareness
SA is utilized to secure borders from illegal trafficking, to monitor supply line routes against the placement of roadside bombs, to provide our warfighters the tools they need to alert them to potential threats, and to identify and defeat the enemy, day or night.
-
product
Managed Threat Detection Service
GuardDuty
Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads. It monitors for activity such as unusual API calls or potentially unauthorized deployments that indicate a possible account compromise. GuardDuty also detects potentially compromised instances or reconnaissance by attackers.
-
product
Web DDOS Protection
DDoS attacks continue to increase and still cause great damage today. In addition to the frequency, the complexity and duration of an attack cause major problems for the defense. Therefore, the deployed solution should intervene precisely and quickly to best protect you from threats and high costs due to downtime.
-
product
Situational Understanding Mission Intelligent Technology
SUMIT360™
The SUMIT360™ provides military armored vehicle operators with an innovative, 360 degree view of the environment around the vehicle utilizing advanced sensor technology to improve threat and obstacle detection that could pose a threat to ground forces, and their mission. Equipped with powerful multi-spectral sensors in each module, the system uses on-board processing to form seamless, stitched images to provide a full field of view in any terrain, and virtually any conditions, day or night. With additional target detection and identification capability, the system can also be paired with advanced analytics and Artificial Intelligence (AI) to provide vehicle crew, and transported troops a threat detection and classification to provide critical decision support before opening the hatch. The system also provides the ability to support remote or optionally manned configurations.
-
product
Fiber Monitoring System for Optical Networks
The Remote Fiber Monitoring System offered by M2 Optics is a key asset for any network operator seeking to ensure the performance and integrity of the optical fiber infrastructure. In addition to significantly reducing service times to meet customer service and SLA requirements, the system provides an extra level of intrusion detection against the serious threat of malicious data theft affecting today's networks.
-
product
1553Guard
MIL-STD-1553 bus architecture is a threat that adversaries can leverage to compromise your equipment and spread malicious software through your Serial Data Bus (SDB) system. You need a solution that can not only identify current and future cyberattacks in real-time but also instantly eliminate those threats before they wreak havoc and interrupt the mission.
-
product
Laser Warnings Systems
Elbit Systems of America’s laser warning systems use both coherent and non-coherent laser sources. We understand the full scope of issues associated with each laser threat and have the systems engineering expertise necessary to accurately and reliably detect, locate and categorize these threats. Each LWS is equipped with a direction indicator and provides complete threat coverage in a high dynamic range with audio and visual warnings.
-
product
Security intelligence & analytics
Detect and prioritize threats that pose the greatest risk. dentify high-risk threats with near real-time correlation and behavioral anomaly detection. Detect vulnerabilities, manage risks and identify high-priority incidents among billions of data points.Gain full visibility into network, application and user activity.
-
product
Surveillance System for Long-Range Applications
ThermoVision™ (THV) 3000 MultiSensor
The ThermoVision™ (THV) 3000 detects and classifies illegal activities and threats in total darkness, smoke, sand haze, and broad daylight conditions. The thermal camera is equipped with a long-wave, cooled Quantum Well Infrared Photodetector (QWIP) and switchable optics offering three different fields of view. It provides excellent situational awareness while also closely monitoring suspect activities in real-time. Ideal applications include perimeter security, border and coastal surveillance, force protection, and mid-range threat detection.
-
product
Systems
We design and build discrete systems and complete solutions for communications, ISR and protection of forces. Our products include reconnaissance, communication and navigation systems; geo-location systems; EW systems; threat warning systems and adversary emulation systems.
-
product
Security Testing Service
No one on the Internet is immune from security threats. The consequences of a security breach are great:revenue impact, damage to credibility, legal liability, and loss of customer trust. Security testing helps to make data and information on digital networks secure by identifying potential vulnerabilities and flaws in security mechanisms of the network, while ensuring compliance with latest recommended security standards. Security testing assures managements that their systems are secure from attack, vulnerabilities and provides end users with reassurance their data is protected and secured at all times.- Security testing can be carried out in conjunction with or independent of other testing processes- Security testing looks at stopping active intrusion attempts from external sources than fixing only inherent application flaws