Showing results: 16 - 30 of 136 items found.
-
DroneTracker -
Dedrone Inc.
The airspace security platform that detects, classifies, and mitigates all drone threats. DroneTracker aggregates sensor information about potential threats, recognizing and classifying drones of all kinds. Its web-based interface shows live threats, real-time drone flight paths, and records forensic details including video evidence. The RF Sensor detects drones and remote controls by their radio frequency (RF) signatures.
-
ARDRONIS -
Rohde & Schwarz GmbH & Co. KG
The proliferation of malicious and non-cooperative drones is an ever-increasing threat to aviation and sensitive site security. Whether it be disruption of critical national infrastructure at home or risk of life to forward-deployed personnel abroad, civil and government organizations and agencies; all of them require affordable and reliable counter-drone solutions. Protective measures can only be taken after a threat is detected. To effectively counter the threat, early warning is necessary – every second counts.
-
-
MX908 -
908 Devices Inc.
MX908™ leverages high-pressure mass spectrometry (HPMS) to deliver dramatically enhanced sensitivity and broader threat category coverage. MX908 hosts an all hazards threat list which has been upgraded to include a broader spectrum of chemical warfare agents (CWA), explosives and high priority toxic industrial chemical (TIC) targets. From military grade, commercial and improvised explosives to novel threat materials, MX908 supports the needs of the modern mission.
-
IBM Security
Detect and prioritize threats that pose the greatest risk. dentify high-risk threats with near real-time correlation and behavioral anomaly detection. Detect vulnerabilities, manage risks and identify high-priority incidents among billions of data points.Gain full visibility into network, application and user activity.
-
Physical Sciences Inc.
Advanced vehicle-based platforms for real-time detection and identification of CBRN threats in complex and variable urban environments.
-
Hiller Measurements
Electronic warfare (EW) systems require advanced high-fidelity threat simulators to prepare for combat with potential adversaries. Hiller Measurements’ depth of knowledge in RF source and measurement technologies enables us to help our clients develop the best EW simulation systems that will meet the everchanging landscape of EW threat simulation.
-
Abaco Systems Inc
MIL-STD-1553 bus architecture is a threat that adversaries can leverage to compromise your equipment and spread malicious software through your Serial Data Bus (SDB) system. You need a solution that can not only identify current and future cyberattacks in real-time but also instantly eliminate those threats before they wreak havoc and interrupt the mission.
-
TacFLIR® 280-HD -
Teledyne FLIR
TacFLIR 280-HD is a high-performance land-based imaging system designed to identify and track smugglers, terrorists, or any other threat – day and night, and in the toughest terrain. Tailored for mobile deployment with high definition imaging and powerful optics and INS, TacFLIR 280-HD reveals the details necessary for long range vehicle detection, identification, and threat assessment.
-
BioWARD -
Physical Sciences Inc.
Standalone sensor in weatherproof enclosure detects thermal objects with consistent appearance/behavior to a bioaerosol plume and determines a threat probability
-
N5194A -
Keysight Technologies
The N5194A is part of the UXG family of signal generation products designed for threat simulation; simulate complex signal environments for radar/EW.
-
N5192A -
Keysight Technologies
The N5192A is part of the UXG family of signal generation products designed for threat simulation; simulate complex signal environments for radar/EW.
-
TOA Systems Inc.
Our Global Lightning Network® (GLN®) is tried and true, delivering hyperlocal real-time lightning data for threat assessment and integration.
-
BreakingPoint -
NextGig Systems
Control global threat intelligence at Internet-scale to create massive-scale, high fidelity simulation and testing conditions for battle-testing infrastructures, devices, applications, and people.
-
Precise Testing Solution
Cloud Security Assessment is the most critical phase before the product is finally deployed and Product is finally ready to handle real-world cyber security threats.