Filtered By
Counter-SurveillanceX
Category [filter]
Product DescriptionX
Type of Document [filter]
Results
28 Total
1.0

ION

Document

- ION, the lnternet Operations Network, is the only vetted and reliable resource that enables online non-attribution at the most critical level. ION provides critical capabilities that enable go...
1.0

RFeye, RFeye Secure, RFeye Node, RFeye Array

Document

CRFS rty systems Introduction Wide area multi-mission monitoring and geolocation systems for spectru m-critical sites. RFeye Arrays provide cost-effective high performance real-time maps, sate...
1.0

TPP, Threat Protection Program

Document

security VUPEN Threat Protection Program VUPEN provides its customers protection guidance and research reports about critical vulnerabilities up to 9 months in advance before any patches are...
1.0

VIP High Power Convoy Jammer 3260S

Document

VIP High Power Convoy Jammer 3260S Introduction CONFIDENTIAL – Subject to–change prior notice!prior notice! CONFIDENTIAL Subjectwithout to change without 1 VIP High Power Convoy Jammer 3260S El...
1.0

Cell-Block

Document

git ~ Cell-BlockTM Prison Jamming System Preventing the use of mobile phones and communications devices in Prisons and Secure Facilities is an important part of security and crime prevention. Digi...
1.0

Portable EOD Briefcase Jammer

Document

Digital II Portable EOD Briefcase Jammer The Digital RF Portable Briefcase Jammer incorporates the latest jamming technology in a compact integrated system. Able to be equipped with a wide range o...
1.0

Mini Shadow LP Room Jammer

Document

Digital • Mini Shadow LP Room Jammer Mini Shadow is a compact jamming system which can be wall mounted in rooms and around a building to provide complete protection. Each Jamming module can be rem...
1.0

nTap

Document

nTAP™ Product Family Provides monitoring and security devices with complete visibility into full-duplex networks Network Instruments’ nTAPs let you monitor and analyze full-duplex links. nTAPs are...
1.0

WBS2500

Document

Technical Description Wideband Jammer WBS2500 CONFIDENTIAL – Subject to change without prior notice! CONFIDENTIAL – Subject to change without prior notice! CONTENTS 1.INTRODUCTION 4 2.HERITAG...
1.0

Sesame 256

Document

SESAME 256 s'impose comme la solution integree en terme de securite, capable de s'adapter aux specifications les plus exigeantes. SESAME 256 stands out as the mtegrated so/ut10n m terms of securi...
1.0

Network Forensics r8

Document

G OVE RNM E NTAL SE CU RITY S OL UT I O N S Product Information Network Forensic CONFIDENTIAL page 2 CONFIDENTIAL page 3 CONFIDENTIAL page 4 CONFIDENTIAL page 5 S OL UT I O N S S ...
1.0

ION Secure Virtual Desktop

Document

ION" Secure Virtual Desktop Computers that access the lnternet for research and investigations are at risk of compromise by online viruses, malware, and other types of malicious code, especially wh...
1.0

ION

Document

I / -F, 'G, p*S &.g,, [G$- MISSION: ASSET COMMUNICATIONS E n a b l i n g S e c u r e l n t e r n e t operations ION" INTERNET OPERATIONS NETWORK 7 Secure & Unbreakable Asset Communications ...
1.0

Raptor RXi

Document

Features • Scans 26GHz in less than 4 seconds at 3kHz resolution (approximately 100,000,000 samples per second) • Full span spectrum analyzer display, 6GHz, 1OGHz and 26GHz models available • Full ...
1.0

Hawk XTS-2500

Document

Features • Excellent detection range, ERP up to 4W coupled with -133dBm sensitivity • Automatic DSP power control to prevent saturation of targets and provide more accurate analysis • 2.4GHz operat...
1.0

Virage

Document

Rds Sea Ports Arpork Private lnfrastructure Health and Safety Retaii f&qmrate Facilities &meter Security Investigations Pmduct Portfolio Command and Control InteliigeW%cene Analysis' System Automa...
1.0

CYBELS

Document

->> CYBELS: A FULLY OPERATIONAL BOLUTION TO CYBER SECURITY CHALLENOES THALES Cyber security issues are coming from digital information, worldwide networks and applications interconnection as wel...
1.0

GeoMaker, CYBELS, ECHO

Document

THALES >. ......+. . C,'., :'L: :?::*":rr';: .;: .. ..: .... \,./ . *.*; . .. .. .. .. . . . . ,.,>. ........... . ..... ',. . ... , . . . . . . . . .... . . . . . .... ,,. ..!U,*& ". ., X : :S ...
1.0

Shadow, Black Shadow, Raid Shadow, ComJam Shadow, White Shadow

Document

OUR BUSINESS Amesys is a French company part of Bull group, leader in high technology critical systems and security since 1979. Its core business is to supply world class expertise in EW and INTEL...
1.0

Net Protect

Document

Digital • Net Protect The Digital RF Network Guard tells the user quickly if anyone is trying to Intercept, Jam information from your mobile phone. Net Protect is a unique network monitoring syste...
1.0

EndaceSensors, EndaceProbes, Endace Security Manager,

Document

Cyber Security Monitoring Packet Capture's lnconvenient Truth ln today's world, every organisation is exposed to the risk of cyber attack and data loss. With the network now being critical to a...
1.0

TSE 7501

Document

GOVER N MEN TAL SE CUR ITY SOL UTIO NS Product Information TSE 7501 NLJD Non-Linear Junction Detector 95 66 28 4 5 43 69 78 6 4 6 03 74 47 1 7 1 7 8 18 0 27 35 5 1 5 3 7 36 57 6 61 2 32 1 2...
1.0

Miniport Receiver, EB200

Document

GOVER N MEN TAL SE CUR ITY SOL UTIO NS Product Information Miniport Receiver EB200 Confidental Page 1 Confidental Page 2 Confidental Page 3 S OL UT I O N S S ECU RITY GOVE RNM E NTA ...
1.0

Vulnerability Research & Intelligence

Document

VU?--• N ® s e cu r t y Vulnerability Research & Intelligence VU?C:Ne security VUPEN Exploits for Law Enforcement Agencies I ' ' Law enforcement agencies need the most advanced IT intrusion ...
1.0

GAJT

Document

In the fog of war, accurate positioning is (ey features key to success. QinetiQ and NovAtel have Seven antenna elements for up produced the first single-unit GPS anti-jam 1to six independent nulls ...
1.0

Chameleon

Document

It RF Chameleon Mobile Phone use while Jamming Use your mobile phone while jamming everyone else. Using the long experience of designing and manufacturing jamming systems for VI P's and Dignitari...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh