Threat
danger sensed.
See Also: Cyber, Detection, Security, Countermeasure, Network Security, Hunting, Intelligence
-
Product
Bio-Threat Detection & Collection
IBAC 2
-
The IBAC 2 is a fully automated bio-detection sensor that can support continual, 24/7, air monitoring or can be set to targeting sampling windows to align to hours of operation. It alarms in less than 60 seconds when a bio-threat is present. IBAC can be configured to support automated aerosol sampling either in conjunction with its’ triggered alarms or at a set frequency sampling time. In wide service throughout the world, IBAC 2 is used to collect and detect aerosolized agents for all four classes of biological threats (spore, viral, cellular, and protein toxins) with low false alarm.
-
Product
Threat Detection/Analysis
-
Schweitzer Engineering Laboratories, Inc.
Several SEL devices have built-in malware detection or can identify nonauthorized network traffic.
-
Product
Phobos Threat Warner System
QR020
-
Gain military advantage with the world's most compact and accessible R-ESM system. Phobos delivers increased real-time intelligence in the most complex operational environments.
-
Product
Ground Threat Emitter Sensor System
GTESS
-
The Ground Threat Emitter Sensor System (GTESS) is a modular test and training system capable of stimulating multi-spectral aircraft electro-optic sensor suites at long range. The GTESS system integrates Textron Systems’ ultraviolet (Mallina™), infrared (Phoenix) and/or laser (Phantom™) ranged stimulators with an automated tracking system to facilitate fast-moving test, training and evaluation exercises. A fully integrated camera system for effective after action review. GTESS can also work in conjunction with Textron’s radio frequency (RF) range stimulator systems (PRTS™ & HPRTS) for complete multi-spectral testing.
-
Product
Managed Threat Detection Service
GuardDuty
-
Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads. It monitors for activity such as unusual API calls or potentially unauthorized deployments that indicate a possible account compromise. GuardDuty also detects potentially compromised instances or reconnaissance by attackers.
-
Product
Cyber Threat Assessment Program
-
Scientific Research Corp. STI Division
SRC provides threat assessment support focused on cyber threats that may impact the ability to wirelessly link with other systems. This activity supports the development of test and evaluation capabilities important to not only identifying current deficiencies but also for developing next generation systems.
-
Product
Threat Warning
-
Long-range, multi-threat capabilities provide continuous tracking while search and verification of surface-to-air and air-to-air missile launches for unsurpassed survivability.
-
Product
Surveillance System for Long-Range Applications
ThermoVision™ (THV) 3000 MultiSensor
-
The ThermoVision™ (THV) 3000 detects and classifies illegal activities and threats in total darkness, smoke, sand haze, and broad daylight conditions. The thermal camera is equipped with a long-wave, cooled Quantum Well Infrared Photodetector (QWIP) and switchable optics offering three different fields of view. It provides excellent situational awareness while also closely monitoring suspect activities in real-time. Ideal applications include perimeter security, border and coastal surveillance, force protection, and mid-range threat detection.
-
Product
Advanced Sensors & Security Systems
-
Applied Research Associates, Inc.
ARA has provided security services since the mid-1980s and today provides tools to maximize physical security that are highly scalable and affordable, offering our government and commercial customers advanced perimeter security, threat pattern analysis, and intrusion detection. We integrate our detection and assessment capabilities to provide a real-time, complete operational picture to keep personnel and assets secure, day and night. Our engineers are experts in design and integration of multiple sensor types and other intrusion detection systems to create customizable, integrated mobile security systems.
-
Product
Adjunct Simulation Engine
-
Curtiss-Wright Defense Solutions
Responding to the increasing need for realistic and effective military training to counter today’s varied threats while keeping to the budget, TCG ASE offers high fidelity, real-time, and configurable simulated tactical data link information for operational and training networks.
-
Product
Security/Detection
-
If your design challenge is to create the best motion sensor or motion detector - fire sensor or fire detector, smoke sensor or smoke detector - you've come to the right company. Dexter's sensor technologies are at multiple fronts today, reducing the threat of combat on land, sea and air. Yet the industry leading advantages of Dexter sensors - low cost, high sensitivity, low energy consumption and long life - make them the perfect motion sensor for home, office and facility applications. Dexter thin-film and silicon detectors can target precise threats, whether defined by movement, temperature or body mass. Intensive MIL-STD-883H testing performed by Trialon Corporation, an independent testing facility, confirm that Dexter Research's silicon-based temperature sensor detectors meet the same rugged requirements of 1,000G's for mechanical shock and 30G's in random vibration for which our thin-film detectors are famous. Download Dexter's report here (PDF).
-
Product
Cargo and Vehicle Inspection
-
In a world where threats continue to evolve and concealment techniques become more sophisticated, our customers are facing more complex, difficult missions than ever.
-
Product
Security and Traffic Monitoring System
-
Information System Technologies Inc.
ISTI’s versatile sensor nodes can support multiple sensing types including acoustic, seismic, visible/IR, and scanning laser. Several eye-safe scanning lasers form a distributed wireless sensor network and can continuously and accurately track as well as monitor ground vehicles and personnel in a surveillance area. This system provides super-fine angular and range resolution to precisely locate moving targets. Among other key benefits are: day/night operational capability, continuous monitoring and surveillance without blind spots, 360 degrees field-of-view, large coverage area, multiple closely spaced target tracking, threat classification, and automatic alarm generation. The system can be used in applications such as traffic monitoring, intrusion detection, border control, airport runway collision and incursion avoidance, and perimeter security.
-
Product
Security Vehicles
-
When you need to set up robust security operations in a temporary or outdoor location, our security vehicles can provide a tried and tested solution. For use at festivals, public ceremonies, sports events and other outdoor functions, our mobile check point and scan truck will help keep your guests or members of the public safe from security threats.
-
Product
Situational Awareness
-
SA is utilized to secure borders from illegal trafficking, to monitor supply line routes against the placement of roadside bombs, to provide our warfighters the tools they need to alert them to potential threats, and to identify and defeat the enemy, day or night.
-
Product
Power Supplies
RM-750B
-
With dual PCI-E connectors, the RM Series carries all its essentials to power your system. Enjoy the graphic rendered programs and games without the threat of overheating. Its dark aluminum chassis not only looks good, but dramatically relieves heat built-up. The 120mm cooling fan enhances the already efficient heat dissipation rate and helps balance the cooling system with noise level. The RM Series is great for high end users to everyday casual users. Whatever your system needs, the RM Series can deliver.
-
Product
Advanced DDoS
-
The barrier to entry has been obliterated by new tools that enable anyone with an Internet connection and a grievance to launch a DDoS attack. This is a true game changer in terms of the threat landscape and what businesses should consider themselves a potential target of attack. It used to be certain verticals would be likely targets for a DDoS attack; finance, gaming and e-commerce at the top of the list. Today, any business, for any reason, any real or perceived offense or affiliation, can become a target of a DDoS attack.
-
Product
Cloud Security Solutions
-
Online threats are constantly changing. Offering protection against the largest and most sophisticated attacks, Akamai helps you safeguard your websites and other Internet-facing applications from the risks of downtime and data theft. Built on the Akamai Intelligent Platform, Akamai Cloud Security Solutions provide the scale to stop the largest Distributed Denial-of-Service (DDoS) and web application attacks without reducing performance, as well as intelligence into the latest threats and the expertise to adapt to shifting tactics and attack vectors.
-
Product
Sensors
-
We design, develop and produce state-of-the-art SIGINT sensors that seek, exploit, identify, and locate sources of RF energy, underwater sound, light, heat and other complex phenomena. These sensors recognize threats, gather intelligence, and allow our customers to make informed, strategic response decisions.
-
Product
Utility Detection Radar
DS2000
-
There’s a lot going on underground that you need to know about before you ever start to dig. The Leica DS2000 Utility Detection Radar finds all potential threats, including non-conductive pipes and fibre optics, increasing safety by lowering the risk of accidently hitting underground assets. Increase safety, speed up work and lower asset management costs with the ability to prevent hazardous outages and collect more information. The DS2000 betters your business by making it safer, faster and more efficient.
-
Product
UXG X-Series Agile Signal Generator, Modified Version
N5191A
Signal Generator
et closer to reality: simulate increasingly complex signal environments for radar, EW & antenna-test Test sooner & increase confidence in EW systems by generating signal simulations when you need them: the UXG is a scalable threat simulator Use pulse descriptor words (PDWs) to generate long pulse trains & individually control pulse characteristics Quickly characterize antennas over a wide frequency range with fast frequency tuning Performance without requiring an export license
-
Product
Archival Storage Rooms
-
Darwin Chambers Company’s NFPA, GSA, and NARA Directive 1571-compliant Archival Storage Chambers are engineered to provide maximum value, efficiency and conformance with all applicable standards and codes. Archival chambers provide environmental controls for storing records and materials (including paper documents and items with high fibrous content, various films, microfiche, and photographic materials) that require permanent protection for storage and preservation. Our high-performance systems are offered with nearly unlimited operational fail safes, includ- ing full system and control redundancy. In addition to keyed entry, numerous security options are also available, due to the often irreplaceable nature of the materials to be stored and preserved in this type of chamber. Our chambers are engineered to accommodate the loads and unique requirements of the specific materials to be stored, with industry-leading control and uniformity of both temperature and humidity variables. Design considerations include both functional and operational efficiencies and reliability, the safety and comfort of operating personnel, and the ongoing protection of the archived materials from fire, water, light degradation, pests, mold and natural contaminants, pollutants and other man- made threats.
-
Product
Aviation Security
-
Aviation is highly regulated, from ICAO Annex 17 to National Security Programs. Due to its high profile and the subsequent multitude of threats, regulation safeguards travel security. Our expertise will support your business, by supplying market leading X-Ray and Metal detection products along with maintenance, that meet the regulator requirements and best fit your business.
-
Product
Interference Modeling And Simulation
-
The CAST Navigation Jammers are designed to facilitate and support the testing, verification, and integration of single element Fixed Reception Pattern Antenna (FRPA) systems as well as multiple-element anti-jam antenna sub-systems such as Controlled Reception Pattern Antennas (CRPAs). These systems are an ideal solution for military and commercial laboratories where interference signal capability is required. CAST Jammer sub-systems provide precisely controlled signals for use in most types of GNSS testing applications, emulating interference conditions and threats that can occur in both urban and hostile environments.
-
Product
Continuous Real-Time Data Feeds
Application and Threat Intelligence (Subscription)
-
Keysight Network Applications and Security
Test and simulation conditions must reflect the latest security threats and applications so that you can ensure your equipment and systems will perform reliably and protect networks from the most advanced and malicious traffic. With Ixia's BreakingPoint Application and Threat Intelligence (ATI) program, we do the research for you by identifying and generating security attacks and application protocols that keep you current.
-
Product
UXG X-Series Agile Signal Generator, 10 MHz to 40 GHz
N5193A
Signal Generator
Get closer to reality: simulate increasingly complex signal environments for radar, EW & antenna-test Test sooner & increase confidence in EW systems by generating signal simulations when you need them: the UXG is a scalable threat simulator Use pulse descriptor words (PDWs) to generate long pulse trains & individually control pulse characteristics Accurately simulate multi-threat environments: 180-ns PDW update rate, chirps 10 to 25% of carrier frequency, pulses as narrow as 10 ns
-
Product
Power Supplies
RM-1000B
-
With dual PCI-E connectors, the RM Series carries all its essentials to power your system. Enjoy the graphic rendered programs and games without the threat of overheating. Its dark aluminum chassis not only looks good, but dramatically relieves heat built-up. The 120mm cooling fan enhances the already efficient heat dissipation rate and helps balance the cooling system with noise level. The RM Series is great for high end users to everyday casual users. Whatever your system needs, the RM Series can deliver.
-
Product
Long-Range Perimeter Surveillance Doppler Radar
Ranger® R3D
-
The Ranger R3D is a dual mode, ground surveillance radar designed to provide efficient, 24/7 persistent surveillance, both within and beyond the fence. Operating in the Ka-band, the Ranger R3D leverages the resolution and accuracy of advanced FMCW technology and the extended range and terrain adaptability of Doppler in a single, compact, and lightweight package. Ruggedized for permanent, all-weather installations and mobile, stop-and-scan operations, its low minimum detection velocity (MDV) detects slow-moving threats such as walkers and crawlers.
-
Product
Bomb Jammer
-
Security Intelligence Technologies, Inc.
The Bomb Jammer is a defense technology used to counter RCIED theats. It comes in several configurations. The Covert Bomb Jamming System is our trunk mountable IED Jammer. Its low profile profile antenna setup make it an ideal vehicle jammer to defeat IED threats.
-
Product
Perimeter Security And Coastal Surveillance Systems
-
These systems comprise of Radars and Cameras and can give early warming to the commanders about any intrusion/breach of perimeter of any restricted area. These can be integrated with jammers to tackle drone threats too.





























