Filter Results By:
Products
Applications
Manufacturers
Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
product
FlowSpec DDoS Mitigation
Large volumetric-based DDoS attacks are increasing in terms of frequency and scale at which they are perpetrated. With hundreds of-gigabits worth of attacks becoming commonplace, organizations not only face service interruptions for customers but the complete implosion of their infrastructure’s operation. In the face of this increasingly challenging threat landscape, BGP FlowSpec DDoS mitigation has emerged as one of the most effective techniques to mitigate DDoS attacks. Combined with an accurate and speedy detection system, it helps manage and synchronize working with firewalls to mitigate these attacks.
-
product
UXG X-Series Agile Signal Generator, 10 MHz to 40 GHz
N5193A
Get closer to reality: simulate increasingly complex signal environments for radar, EW & antenna-test Test sooner & increase confidence in EW systems by generating signal simulations when you need them: the UXG is a scalable threat simulator Use pulse descriptor words (PDWs) to generate long pulse trains & individually control pulse characteristics Accurately simulate multi-threat environments: 180-ns PDW update rate, chirps 10 to 25% of carrier frequency, pulses as narrow as 10 ns
-
product
Security Vehicles
When you need to set up robust security operations in a temporary or outdoor location, our security vehicles can provide a tried and tested solution. For use at festivals, public ceremonies, sports events and other outdoor functions, our mobile check point and scan truck will help keep your guests or members of the public safe from security threats.
-
product
Checkpoint Security System
ConneCT
The ConneCTTM Checkpoint Security System is an advanced aviation security explosive detection system (EDS) engineered to deliver superior threat detection, dramatically improved passenger throughput, and low total cost of ownership.
-
product
SaaS Platform.
GreyMatter
Security practitioners are often on the defensive. There aren’t enough hours in the day or people with the broad skill sets needed to keep up with threats evolving at machine speed. That’s why we’re committed to making automation work across the entire security lifecycle. We believe the only way to make security possible is to automate away the repetitive and mundane. That’s why we built ReliaQuest GreyMatter, the first unified threat detection, investigation and response SaaS platform.
-
product
Global Threat Intelligence
Arbor has a long history in botnet research and DDoS mitigation. However, as DDoS has moved from just a diversion to be a feature of malware and botnets used in cybercrime and APT attacks, Arbor has expanded its research team and research capabilities to tackle additional threat types.
-
product
Network Traffic Visibility
Organisations and businesses are relying more on the network than ever before. In many instances, the network has become the business, such as is the case for managed service providers (MSPs), residential ISPs, mobile carriers, data centers, etc. Unfortunately, at the same time, networks have never been under this level of threat from malicious sources who want to disrupt or even damage infrastructure with various motivations.
-
product
Counter-Drone Solutions
ARDRONIS
The proliferation of malicious and non-cooperative drones is an ever-increasing threat to aviation and sensitive site security. Whether it be disruption of critical national infrastructure at home or risk of life to forward-deployed personnel abroad, civil and government organizations and agencies; all of them require affordable and reliable counter-drone solutions. Protective measures can only be taken after a threat is detected. To effectively counter the threat, early warning is necessary – every second counts.
-
product
Infrared Camera Window with PIRma-Lock
FLIR IR Windows Series
FLIR's IR Windows add a barrier between you and energized equipment, protecting you from arc flash accidents. IR windows are easy to install, easy to use, and will help you work with greater confidence. You’ll perform inspections more efficiently and reduce the threat of arc flash injury, all while staying in compliance with NFPA 70E requirements. Choose the anodized aluminum frame, or opt for durable stainless steel to prevent mixed metal issues.
-
product
TDL Training Tools and Services
Curtiss-Wright Defense Solutions
To prepare for the threats of the battlefield, warfighters must be familiar with what they will encounter. With extensive experience in tactical data link training and technology, Curtiss-Wright has the tools and expertise to provide your organization with solutions that facilitate tactical data link communication on the battlefield.
-
product
MWIR Systems
L3 Cincinnati Electronics’ high-performance cooled mid-wave (3.5 – 5.0 µm) IR imagers are based on our patented InSb focal plane array architecture. Ideal for all combat conditions, L3 Cincinnati Electronics technology improves situational awareness in combat intelligence, sighting & tracking systems, threat deterrence and perimeter & border security with all-weather observation, day or night. These IR sensors can be utilized in urban, rural and remote situations where there are extreme climatic and terrain conditions. Well-suited for fixed or portable payloads, these imaging systems offer a substantially lower total life-cycle cost in comparison to other commercial IR imaging sensors.
-
product
UXG X-Series Agile Vector Adapter, 50 MHz to 20 GHzNEW!
N5194A
The N5194A is part of the UXG family of signal generation products designed for threat simulation; simulate complex signal environments for radar/EW.
-
product
Log Management and SIEM Platform
NIKSUN® LogWave™
The next generation of threats requires the next generation cyber-defense platform. NIKSUN’s LogWave™ Log Management and SIEM platform makes data ingest, reporting, and alerting easier than ever. With unlimited scalability, flexible reporting, and intelligent alerting, see why NIKSUN LogWave™ is right for your organization.
-
product
Autonomous PNT Performance and Vulnerability Test Suite
PANACEA
PANACEA is an autonomous GNSS performance and threat environment simulator system designed to control simulation hardware and collect data from up to 32 GNSS receivers simultaneously.
-
product
All Hazards Detection & Identification Tool
MX908
MX908™ leverages high-pressure mass spectrometry (HPMS) to deliver dramatically enhanced sensitivity and broader threat category coverage. MX908 hosts an all hazards threat list which has been upgraded to include a broader spectrum of chemical warfare agents (CWA), explosives and high priority toxic industrial chemical (TIC) targets. From military grade, commercial and improvised explosives to novel threat materials, MX908 supports the needs of the modern mission.
-
product
UXG X-Series Vector Adapter, Modified Version, 50 MHz To 20 GHz
N5192A
The N5192A is part of the UXG family of signal generation products designed for threat simulation; simulate complex signal environments for radar/EW.
-
product
Perimeter Security And Coastal Surveillance Systems
These systems comprise of Radars and Cameras and can give early warming to the commanders about any intrusion/breach of perimeter of any restricted area. These can be integrated with jammers to tackle drone threats too.
-
product
Cybersecurity and Compliance Solution
Application Audit
Application Audit, Compuware's mainframe cybersecurity and compliance solution, enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Using Application Audit, security staff can: Deter insider threats by capturing and analyzing start-to-finish user session activity. Integrate user behavior intelligence with popular SIEM engines to analyze the overall application environment. Support criminal/legal investigations with complete and credible forensics. Fulfill compliance mandates regarding protection of sensitive data. The Value of Application Audit. Provides deep insight into user behavior including data viewed, by whom and which applications were used to access it. Enables immediate analysis through the automatic delivery of data to SIEM platforms such as Splunk and QRadar, either directly or in combination with CorreLog zDefenderTM for z/OS or Syncsort Ironstream. Delivers granular intelligence and reporting capabilities needed to comply with regulations such as HIPAA and GDPR as well as security policies. Eliminates dependency on specialized mainframe knowledge. Separates the system administrator's duties from mainframe-inexperienced auditor's responsibilities with a web UI, so that no single person is in a position to engage in malicious activities without detection.
-
product
Shoghi's Newsletter
Shoghi is in continuous forage for international business partners who can help us represent ourselves in their respective countries, and supporting us to expand and market our Integrated ISR Solutions ,Electronic Warfare Systems, Avionics & MRO , UAV & Military Drones Satellite Imaging solutions, Communication Security , Cyberwarfare Services & Training, OEM software services(ISR, EW) for their Government and Defense, thus, protecting their Country's integrity and threats(both internal & external)oduct description goes here.
-
product
Digital Map Systems
Elbit Systems of America’s Global Digital Map Unit is built on a proven design that accommodates multiple data formats and provides unmatched situational awareness to aircrews. The GDMU displays detailed map, flight plan, and threat information to aircrews. Each system performs interactive functions with the mission computers and generates digital video map data for head down displays.
-
product
Power Supplies
MP-550B
With dual PCI-E connectors, the MP Series carries all its essentials to power your system. Enjoy the graphic rendered programs and games without the threat of overheating. Its dark aluminum chassis not only looks good, but dramatically relieves heat built-up. The 120mm fan enhances the already efficient heat dissipation rate and helps balance the cooling system with noise level. The MP Series is great for high end users to everyday casual users. Whatever your system needs, the MP Series can deliver.
-
product
Position Sensors for Hazardous Environments
Intrinsically Safe systems provide a safe operating environment for personnel and equipment. Intrinsic Safety (IS) is based on the principle of restricting the electrical energy transmitted into a hazardous area, thereby ensuring that anysparks or heated surfaces that may occur as a result of electrical failures areinsufficient to cause ignition. The threat of an explosion is eliminated.
-
product
Handheld Analyzer for Narcotics Identification
BWT-840000994
The TacticID®–N Plus is a field-ready handheld instrument specifically designed for non-contact forensic analysis of narcotics, pharmaceutical drugs, cutting agents and precursors by law enforcement personnel.Featuring an intuitive workflow and touchscreen, samples can be nondestructively analyzed through opaque and transparent packaging, with sample threat level displayed prominently for first responders,safety personnel, law enforcement, bomb squads, customs and border patrol, and hazmat team to act quickly with minimal sample contact. The TacticID®–N Plus utilizes laboratory-proven Raman spectroscopy, whichallows users to obtain actionable identification of illicit substances without ever compromising the integrity of the sample or the chain of evidence.
-
product
GNSS Simulation Engine
Skydel
Test a wide range of applications with advanced GNSS Simulators and helpful tools that generate basic scenarios all the way to complex threat environments, leveraging the power and scalability of the Skydel Simulation Engine. Skydel powers each of Safran Federal Systems' advanced software-defined simulators including BroadSim, BroadSim Anechoic and BroadSim Wavefront.
-
product
Red Team Engagement
Red Team Assessment (Red Teaming) is an activity where a group of white hat hackers (or penetration tester) perform a series of activities to assess the company’s security readiness towards real-world cyber threats. Red teaming aims to ‘attack’ an organization’s digital and physical infrastructure to evaluate the organization’s security defense and posture, at the same time targeting to obtain any sensitive and beneficial information. Red Teaming usually emulates several malicious actors to penetrate the organization’s digital and physical infrastructure security.
-
product
Deep Packet Inspection
FlowPro
FlowPro is inserted into areas of the network when visibility is needed. It uses a deep packet inspection (DPI) to compile a flow cache, and exports traffic and threat details reflecting 100% of all communications that pass by. FlowPro is a great complement to the Scrutinizer Incident Response System and ensures the security team has insight where they need it.
-
product
Network Security Testing
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
product
High Definition Mid-Range Surveillance System
Ranger® HDC MR
The Ranger HDC MR sets a new standard for surveillance with its ability to detect illegal activities even in degraded weather conditions, utilizing embedded analytics and image processing to reduce the cognitive workload, enabling operators to distinguish quickly between true threats and false alarms. The HDC MR is not only a superior system in bad weather, it also provides increased uptime and reduces cyber risks -- a reliable tool that adds days of efficient surveillance and reduces risk compared to previous generations of systems.
-
product
Security intelligence & analytics
Detect and prioritize threats that pose the greatest risk. dentify high-risk threats with near real-time correlation and behavioral anomaly detection. Detect vulnerabilities, manage risks and identify high-priority incidents among billions of data points.Gain full visibility into network, application and user activity.