Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

C-Radiant serves as an add-on module that enhances Aechelon Technology's pC-Nova image generator with sophisticated physics-based spectral rendering, autogain features, and various noise and sensor special effects, all achieved through advanced shader technology, eliminating the necessity for hardware post-processing solutions. In conjunction with Aechelon Technology's C-Genesis database architecture and toolset, C-Radiant enables the utilization of a unified runtime and database for both current and upcoming sensors. The database's material descriptions extend beyond a single band to encompass the entire spectrum, facilitating the creation of correlated multi-sensor outputs, such as Night Vision Goggles (NVG), Forward Looking InfraRed (FLIR), and Radar systems. This innovative approach guarantees flawless mutual correlation at a per-pixel level across all sensors and the Out-The-Window view, operating seamlessly at a refresh rate of 60Hz. As a result, users can expect enhanced visual fidelity and realism in their imaging applications.

Description

ZeroHack TRACE is an advanced cyber threat intelligence framework that utilizes decoy technology along with a variety of sensors to create and evaluate threat data effectively. It provides dynamic, customizable intelligent shifting sensors that can be easily reconfigured and possess self-healing capabilities. Equipped with a specialized deep packet inspection (DPI) engine, TRACE captures real-time data for in-depth user analysis. The processed data from honeynets significantly improves visualization and correlation, thereby empowering analysts to strengthen network security comprehensively. The Dynamic Intelligent Shifting Sensors (DISS) within ZeroHack TRACE enhance security further by periodically altering sensor locations to evade detection by malicious actors. Additionally, ZeroHack TRACE incorporates honeynets tailored to specific IT environments, ensuring optimal functionality. The sensors are designed to self-repair from attacks and automatically update, which drastically reduces the maintenance burden on customers. Each sensor is equipped with a deep packet inspection engine that facilitates real-time data capture, allowing for meticulous network monitoring and rapid threat identification. This innovative framework not only bolsters security measures but also adapts to the ever-evolving landscape of cyber threats.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

No details available.

Integrations

No details available.

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Aechelon Technology

Founded

1998

Country

United States

Website

www.aechelon.com/test/cradiant.php

Vendor Details

Company Name

WhizHack

Country

India

Website

whizhack.com/cyber-security-products/zero-hack/trace

Product Features

Simulation

1D Simulation
3D Modeling
3D Simulation
Agent-Based Modeling
Continuous Modeling
Design Analysis
Direct Manipulation
Discrete Event Modeling
Dynamic Modeling
Graphical Modeling
Industry Specific Database
Monte Carlo Simulation
Motion Modeling
Presentation Tools
Stochastic Modeling
Turbulence Modeling

Alternatives

MAK ONE Reviews

MAK ONE

MAK Technologies

Alternatives

Defused Reviews

Defused

Aves Netsec
MuSES Reviews

MuSES

ThermoAnalytics
ThreatCloud Reviews

ThreatCloud

Check Point Software Technologies
Reveelium Reviews

Reveelium

ITrust.fr
WaveFarer Reviews

WaveFarer

Remcom
ZeroHack SIEM Reviews

ZeroHack SIEM

WhizHack
SandBlast Network Reviews

SandBlast Network

Check Point Software Technologies