Filter Results By:
Products
Applications
Manufacturers
Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
product
Security intelligence & analytics
Detect and prioritize threats that pose the greatest risk. dentify high-risk threats with near real-time correlation and behavioral anomaly detection. Detect vulnerabilities, manage risks and identify high-priority incidents among billions of data points.Gain full visibility into network, application and user activity.
-
product
Security/Detection
If your design challenge is to create the best motion sensor or motion detector - fire sensor or fire detector, smoke sensor or smoke detector - you've come to the right company. Dexter's sensor technologies are at multiple fronts today, reducing the threat of combat on land, sea and air. Yet the industry leading advantages of Dexter sensors - low cost, high sensitivity, low energy consumption and long life - make them the perfect motion sensor for home, office and facility applications. Dexter thin-film and silicon detectors can target precise threats, whether defined by movement, temperature or body mass. Intensive MIL-STD-883H testing performed by Trialon Corporation, an independent testing facility, confirm that Dexter Research's silicon-based temperature sensor detectors meet the same rugged requirements of 1,000G's for mechanical shock and 30G's in random vibration for which our thin-film detectors are famous. Download Dexter's report here (PDF).
-
product
Cyber Threat Assessment Program
Scientific Research Corp. STI Division
SRC provides threat assessment support focused on cyber threats that may impact the ability to wirelessly link with other systems. This activity supports the development of test and evaluation capabilities important to not only identifying current deficiencies but also for developing next generation systems.
-
product
Security Products
Security is no longer an option; it’s a requirement. As your trusted provider of platform security solutions, our comprehensive portfolio addresses a variety of threat models.
-
product
Handheld Analyzer for Narcotics Identification
BWT-840000994
The TacticID®–N Plus is a field-ready handheld instrument specifically designed for non-contact forensic analysis of narcotics, pharmaceutical drugs, cutting agents and precursors by law enforcement personnel.Featuring an intuitive workflow and touchscreen, samples can be nondestructively analyzed through opaque and transparent packaging, with sample threat level displayed prominently for first responders,safety personnel, law enforcement, bomb squads, customs and border patrol, and hazmat team to act quickly with minimal sample contact. The TacticID®–N Plus utilizes laboratory-proven Raman spectroscopy, whichallows users to obtain actionable identification of illicit substances without ever compromising the integrity of the sample or the chain of evidence.
-
product
Power Supplies
MP-550B
With dual PCI-E connectors, the MP Series carries all its essentials to power your system. Enjoy the graphic rendered programs and games without the threat of overheating. Its dark aluminum chassis not only looks good, but dramatically relieves heat built-up. The 120mm fan enhances the already efficient heat dissipation rate and helps balance the cooling system with noise level. The MP Series is great for high end users to everyday casual users. Whatever your system needs, the MP Series can deliver.
-
product
Security Testing Services
Alphabin Technology Consulting
Fortify your digital defenses and enhance the resilience of your systems to safeguard against cyber threats.
-
product
Security and Traffic Monitoring System
Information System Technologies Inc.
ISTI’s versatile sensor nodes can support multiple sensing types including acoustic, seismic, visible/IR, and scanning laser. Several eye-safe scanning lasers form a distributed wireless sensor network and can continuously and accurately track as well as monitor ground vehicles and personnel in a surveillance area. This system provides super-fine angular and range resolution to precisely locate moving targets. Among other key benefits are: day/night operational capability, continuous monitoring and surveillance without blind spots, 360 degrees field-of-view, large coverage area, multiple closely spaced target tracking, threat classification, and automatic alarm generation. The system can be used in applications such as traffic monitoring, intrusion detection, border control, airport runway collision and incursion avoidance, and perimeter security.
-
product
Test And Simulation Devices
BreakingPoint
Control global threat intelligence at Internet-scale to create massive-scale, high fidelity simulation and testing conditions for battle-testing infrastructures, devices, applications, and people.
-
product
Threat Warning
Long-range, multi-threat capabilities provide continuous tracking while search and verification of surface-to-air and air-to-air missile launches for unsurpassed survivability.
-
product
Arbitrary Waveform Generators
Proteus Series
The new Proteus Arbitrary Waveform Generator is ideal for applications in Quantum Computing, Electronic Warfare, Radar, and next generation communications such as 5G, 6G, Ultrawide Bandwidth (UWB), and WiFi (802.11) 6 and 7. Built on the latest RF DAC and RF ADC technology, the series has sample rates up to 9GS/s and multiple Nyquist zone frequency range capability in excess of 10GHz. It’s an innovative task oriented programming environment, and user programmable FPGA. When used in combination with its optional RF Digitizer it gives you the ability to change waveforms in real-time - ideal for improving the coherence time of a Qubit, characterizing an RF amplifier, or responding to an EW threat.
-
product
IntelOwl
Intel Owl is an Open Source Intelligence, or OSINT solution to get threat intelligence data about a specific file, an IP or a domain from a single API at scale. It integrates a number of analyzers available online and is for everyone who needs a single point to query for info about a specific file or observable.
-
product
UXG X-Series Agile Vector Adapter, 50 MHz to 20 GHzNEW!
N5194A
The N5194A is part of the UXG family of signal generation products designed for threat simulation; simulate complex signal environments for radar/EW.
-
product
Cloud Security Solutions
Online threats are constantly changing. Offering protection against the largest and most sophisticated attacks, Akamai helps you safeguard your websites and other Internet-facing applications from the risks of downtime and data theft. Built on the Akamai Intelligent Platform, Akamai Cloud Security Solutions provide the scale to stop the largest Distributed Denial-of-Service (DDoS) and web application attacks without reducing performance, as well as intelligence into the latest threats and the expertise to adapt to shifting tactics and attack vectors.
-
product
All Hazards Detection & Identification Tool
MX908
MX908™ leverages high-pressure mass spectrometry (HPMS) to deliver dramatically enhanced sensitivity and broader threat category coverage. MX908 hosts an all hazards threat list which has been upgraded to include a broader spectrum of chemical warfare agents (CWA), explosives and high priority toxic industrial chemical (TIC) targets. From military grade, commercial and improvised explosives to novel threat materials, MX908 supports the needs of the modern mission.
-
product
Web Application Firewall
WAF
Your website security solution needs to keep up with the changing cyber threat. Protect your website with Cloudbric’s cloud WAF to block unknown and modified attacks.
-
product
UXG X-Series Agile Signal Generator, 10 MHz to 40 GHz
N5193A
Get closer to reality: simulate increasingly complex signal environments for radar, EW & antenna-test Test sooner & increase confidence in EW systems by generating signal simulations when you need them: the UXG is a scalable threat simulator Use pulse descriptor words (PDWs) to generate long pulse trains & individually control pulse characteristics Accurately simulate multi-threat environments: 180-ns PDW update rate, chirps 10 to 25% of carrier frequency, pulses as narrow as 10 ns
-
product
Network Security Testing
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
product
Series Electrostatic Voltmeter
Model 542A
The Trek Model 542A Electrostatic Voltmeter provides accurate noncontacting measurements of electrostatic surface voltage associated with EOS/ESD sensitive processes. The microprocessor based Model 542A Static Meter is ideally suited to monitor critical operations associated with semiconductor, LCD, electronic assembly, and other processes where static charge accumulation poses a threat to production yields or product quality.
-
product
Autonomous PNT Performance and Vulnerability Test Suite
PANACEA
PANACEA is an autonomous GNSS performance and threat environment simulator system designed to control simulation hardware and collect data from up to 32 GNSS receivers simultaneously.
-
product
Biological Wide-area AeRosol Detector
BioWARD
Standalone sensor in weatherproof enclosure detects thermal objects with consistent appearance/behavior to a bioaerosol plume and determines a threat probability
-
product
FlowSpec DDoS Mitigation
Large volumetric-based DDoS attacks are increasing in terms of frequency and scale at which they are perpetrated. With hundreds of-gigabits worth of attacks becoming commonplace, organizations not only face service interruptions for customers but the complete implosion of their infrastructure’s operation. In the face of this increasingly challenging threat landscape, BGP FlowSpec DDoS mitigation has emerged as one of the most effective techniques to mitigate DDoS attacks. Combined with an accurate and speedy detection system, it helps manage and synchronize working with firewalls to mitigate these attacks.
-
product
Cyber Assurance
As the Internet of Things (IoT) continues to expand, connecting more and more of our world through communication devices, a growing trend has emerged: cyber security threats.
-
product
Log Management and SIEM Platform
NIKSUN® LogWave™
The next generation of threats requires the next generation cyber-defense platform. NIKSUN’s LogWave™ Log Management and SIEM platform makes data ingest, reporting, and alerting easier than ever. With unlimited scalability, flexible reporting, and intelligent alerting, see why NIKSUN LogWave™ is right for your organization.
-
product
Infrared Camera Window with PIRma-Lock
FLIR IR Windows Series
FLIR's IR Windows add a barrier between you and energized equipment, protecting you from arc flash accidents. IR windows are easy to install, easy to use, and will help you work with greater confidence. You’ll perform inspections more efficiently and reduce the threat of arc flash injury, all while staying in compliance with NFPA 70E requirements. Choose the anodized aluminum frame, or opt for durable stainless steel to prevent mixed metal issues.
-
product
Handheld Narcotics Analyzer
TruNarc™
The global drug problem is increasing, with trafficking of meth, heroin, and emerging threats like fentanyl, and carfentanil, impacting communities worldwide. Law enforcement officials need to quickly identify suspected narcotics in the field to help keep drugs, and drug dealers, off the streets. Now with the expanded v1.7 library, the Thermo Scientific™ TruNarc™ Handheld Narcotics Analyzer enables officers, customs, border control, and other personnel to scan more than 415 suspected illicit substances in a single, definitive test.
-
product
1553Guard
MIL-STD-1553 bus architecture is a threat that adversaries can leverage to compromise your equipment and spread malicious software through your Serial Data Bus (SDB) system. You need a solution that can not only identify current and future cyberattacks in real-time but also instantly eliminate those threats before they wreak havoc and interrupt the mission.
-
product
UXG X-Series Agile Signal Generator, Modified Version
N5191A
et closer to reality: simulate increasingly complex signal environments for radar, EW & antenna-test Test sooner & increase confidence in EW systems by generating signal simulations when you need them: the UXG is a scalable threat simulator Use pulse descriptor words (PDWs) to generate long pulse trains & individually control pulse characteristics Quickly characterize antennas over a wide frequency range with fast frequency tuning Performance without requiring an export license
-
product
Application Monitoring Tool
Strong application monitoring tool enables IT teams, to get thorough insights into application health and response-time data. Go proactive with Motadata, which is one of the best application performance monitoring tools (APM) to identify potential threats that might bring operations down and fix the issue before it becomes a problem. Real-time metrics dashboard helps you stay on top of your application performance. Resolve application performance management issues before they impact your users or customers.
-
product
Radar Threat and Target Simulation Unit
MS 1605
PTG is used to field/LAB evaluation / testing of RADAR. PC is used to control the profile of the target generation. PTG will work in both stand alone and remote mode. The PTG has keypad and LCD for stand-alone operation. The PC can interface the PTG through the USB link. The operator can communicate through the GUI to the PTG. MIL1553B Communication used for Interfacing with RADAR.