has Equipment
120mm mortar (1)
20mm autocannon (KM168) (1)
20mm autocannon (KM39A3) (1)
30mm autocannon (1)
40mm autocannon (40L/70K) (1)
40mm autocannon (K40) (1)
5inch Naval Gun (1)
AH-64 APACHE (1)
AIM-260 (1)
AI Center (1)
AhnLab AIPS (1)
AhnLab EDR (2)
AhnLab EPP (2)
AhnLab MDS (1)
AhnLab TMS (1)
AhnLab TrusGuard (1)
AhnLab TrusGuard DPX (1)
Auto GCA Collision Avoidance System (1)
Autonomous drones specialized for industrial sites (1)
Blue Sparrow (1)
Blue Whale 1 (1)
Bofors 40 Mk4 Naval Gun (1)
BvS10 Beowulf (1)
CLIPEUS - Integrated Anti-Drone System (2)
Cheongung II Medium-Range Surface-to-Air Guided Weapon (1)
Cyber Security (1)
Cyber threat intelligence (1)
DECISION INTELLIGENCE PLATFORM (3)
Dell EMC PowerEdge Server Lineup (1)
Explosive Disposal Vehicle (1)
H-47 CHINOOK (1)
HANBIT-Micro (1)
HANBIT-Nano (1)
HELLFIRE (1)
HPE ProLiant Gen10 (1)
Helicopter Drone RUEPEL E (2)
Hybrid Anti-Drone System (1)
Indago 4 (2)
K1 Tank (1)
K4 Rapid-Fire Grenade Launcher (1)
K806 Wheeled Armored Vehicle (1)
K808 Wheeled Armored Vehicle (1)
K9 Self-profelled Howitzer (1)
KUH-1 Korean Utility Helicopter - Surion (1)
Light Attack Aircraft with AESA Radar (1)
M-SAM II (2)
M1A2 Abrams Main Battle Tank (2)
MSHORAD-Short Range Air Defense (3)
Motion Detection Alarm (1)
Next-Generation Small Satellite 2 (1)
Open Source Intelligence (1)
RBS 70 NG surface-to-air-missile (1)
Radar Security Detector DND 60 (1)
S3 4X4 Lightweight Armored Vehicle (1)
S5 4X4 Wheeled Armored Vehicle (1)
SCANBEE search mission drone (2)
Satellite Intelligence (2)
Space Launch Vehicle (1)
Spyout-II (1)
THAAD (1)
Tactical Intelligence (1)
The Huneed WCS (1)
Underground Tunnel Detection Vehicle (1)
V-BAT (1)
V3 Internet Security 9.0 (1)
WARMATE loitering munitions (2)
Weapon Locating Radar-Ⅱ (1)
Wheeled Armored Vehicle (1)
blockchain analytics (1)
dronebot combat system (2)
network intelligence (1)
observation round (1)
has Parts
40mm L70 Compact Naval Gun (1)
Biho Surveillance Radar Antenna (1)
Cheonma Surveillance Radar Antenna (1)
Controller & Power Device for 5-inch Naval Gun (1)
Cyber Threat Intelligence (1)
EST15K (1)
Gi2 (1)
HMPT500-3EK (1)
HMPT500-4EK (1)
Hive (1)
LLM Center (1)
Mini (1)
Mobile Satellite Interception (1)
Profiler (1)
Scoutair (1)
Tcc (1)
Web Intelligence Center (1)
X1100-5A3 (1)
intelligence SOC (1)
has related Company
BAE Systems (1)
Barotech Synergy (1)
Cognyte (1)
DS Navcours (1)
Dnet (1)
DusiTech Co (1)
Fion Systems (2)
Firstec (1)
General Dynamics Land Systems (3)
Hanlym Puri-Tech (1)
Hanwha Aerospace (1)
Hyundai Rotem (1)
Innospace (1)
IntelliVIX (1)
KIPCO Aerospace & Defense (1)
KIS Korea Information Systems (3)
Korea Aerospace Industries (2)
LIG Nex1 (1)
Leonardo (1)
Navcours (1)
Nearthlab (2)
Perigee Aerospace (1)
PoongSan (1)
Preneu (2)
Quantum Aero (1)
RF Systems (2)
SNT Motiv (1)
SaaB (3)
WB Group (2)

Weapon System

(34)
Rotary-wing aircraft

A rotary-wing aircraft is a type of aircraft that uses rotary wings, commonly known as rotors, to generate lift and propulsion. Unlike fixed-wing aircraft, which rely on the forward motion of the aircraft to create lift with stationary wings, rotary-wing aircraft achieve lift and thrust through the rotation of one or more rotor systems. Rotary-wing aircraft used for a variety of missions including transport, reconnaissance, and attack.

guided weapon

A guided weapon refers to a weapon that uses sensors and guidance systems to accurately strike a target. These weapons are designed to track the target during flight and navigate toward it with precision.

Satellite Communication

Satellite Communication refers to the use of artificial satellites to transmit and receive signals for data, voice, and video communication over long distances. It enables global connectivity, especially in remote or inaccessible areas, by relaying signals between ground stations and users.

Unmanned aerial vehicles

An Unmanned Aerial Vehicle (UAV) is an aircraft that operates without an onboard pilot, either by remote control or through autonomous systems. UAVs are used in various fields such as military, disaster relief, logistics, and environmental monitoring, offering high maneuverability and the ability to avoid risks.

Combat and support Vehicles

Combat Vehicles: Vehicles designed for direct engagement in battle, equipped with weaponry and armor, such as tanks and infantry fighting vehicles. Support Vehicles: Vehicles used to provide logistical, medical, or operational support to combat forces, such as transport trucks, ambulances, and supply carriers.

Eavesdropping Detection System

An Eavesdropping Detection System is a security solution designed to detect unauthorized listening devices or interception of communications. It monitors various frequencies and signals, such as radio waves, Wi-Fi, Bluetooth, and other wireless communication channels, to identify potential eavesdropping equipment or hacking attempts. The system helps safeguard sensitive information and protect privacy in environments like government buildings, corporate offices, and personal spaces.

Radar and Sensors

Radar and sensors are devices that use radio waves, sound waves, or other signals to detect the location, speed, and size of objects, as well as to gather environmental information. They play a crucial role in fields like military, aviation, and meteorology by enabling real-time monitoring and data provision.

Special Vehicle

A Special Vehicle refers to a vehicle designed and manufactured for a specific purpose beyond general transportation. These vehicles are often equipped with specialized equipment, modifications, and technology to perform unique tasks in various industries, including military, emergency response, construction, and exploration.

AI

Artificial Intelligence (AI) in the military refers to the use of advanced algorithms, machine learning, and autonomous systems to enhance defense operations, decision-making, and combat effectiveness. Military AI applications include autonomous drones, robotic combat systems, intelligence analysis, cybersecurity, electronic warfare, and battlefield decision support. AI improves target recognition, threat detection, logistics management, and mission planning by processing vast amounts of data in real time. It also powers autonomous and semi-autonomous weapons systems, such as loitering munitions, unmanned ground vehicles (UGVs), and AI-driven surveillance systems, increasing operational efficiency and reducing human risk in high-threat environments.

Integrated Anti-Drone System

An Anti-Drone System is an integrated technology designed to detect, identify, track, and neutralize unmanned aerial vehicles (UAVs) or drones that pose potential threats to safety, security, or privacy. These systems are essential for safeguarding critical infrastructure, military installations, public events, and other sensitive areas from unauthorized or malicious drone activities.

Air Defense System

An air defense system is a military structure designed to detect, track, intercept, and neutralize incoming airborne threats, such as enemy aircraft, missiles, or drones. These systems use a combination of radar, sensors, anti-aircraft missiles, and fighter jets to protect a designated airspace or territory.

Robots and Unmanned Systems

정찰, 감시, 전투 작전에 사용되는 무인 항공기. Unmanned aerial vehicles used for reconnaissance, surveillance, and combat operations.

Endpoint Security Solution

An Endpoint Security Solution is a comprehensive security system designed to protect individual devices (endpoints) such as desktops, laptops, and servers from a variety of cyber threats. It provides real-time monitoring, detection, response, and reporting to secure endpoints within an organization’s network.

Missile Systems

Missile Systems: Integrated systems designed to launch and guide missiles toward a designated target. These systems typically include launch platforms, guidance systems, and supporting equipment for target acquisition and tracking, and are used for offensive or defensive military operations.

Information Systems

An Information System (IS) is a structured system that collects, processes, stores, and distributes information to support decision-making, coordination, control, analysis, and visualization within an organization. It integrates people, processes, hardware, software, and data to achieve business or operational goals. 💡 Common Types of Information Systems ✔️Management Information Systems (MIS) ✔️Enterprise Resource Planning (ERP) ✔️Customer Relationship Management (CRM) ✔️Decision Support Systems (DSS) ✔️Transaction Processing Systems (TPS)

Network Security Equipment

Network Security Equipment refers to specialized hardware devices designed to protect computer networks from unauthorized access, cyberattacks, data breaches, and other security threats. These devices act as the first line of defense in securing digital infrastructure by monitoring, filtering, and controlling incoming and outgoing network traffic based on pre-established security rules. 💡 Common Types of Network Security Equipment ✔️Firewall: Blocks unauthorized access while permitting legitimate communication. Intrusion Detection/Prevention Systems (IDS/IPS): Monitors network traffic for suspicious activity and takes action against potential threats. ✔️Unified Threat Management (UTM): An all-in-one device combining firewall, antivirus, content filtering, and intrusion prevention. ✔️VPN Gateway: Secures remote access by encrypting connections over public networks. ✔️Web/Application Gateways: Filters traffic at the application level to prevent attacks like SQL injection or XSS. ✔️Network Access Control (NAC): Controls which devices are allowed to connect to the network based on security policies.

Small arms

Small arms are portable, individual or crew-served firearms designed for personal use in military, law enforcement, or civilian applications. They typically include handguns (pistols, revolvers), rifles, carbines, submachine guns, shotguns, and light machine guns. ✅ Key Characteristics of Small Arms: Man-portable: Can be carried and operated by an individual or a small team. Caliber: Usually below 20mm (e.g., 5.56mm, 7.62mm, 9mm, .50 caliber). Uses: Infantry combat, self-defense, law enforcement, and sport shooting. Small arms are distinct from heavy weapons, which require vehicles, crews, or mounting systems for operation, such as heavy machine guns, mortars, and artillery.

space-based system

A space-based system refers to a system that utilizes satellites or devices operating in space to monitor, communicate, explore, and collect data about the Earth and the surrounding environment. These systems are employed to enhance the efficiency of Earth observation, environmental monitoring, defense, and communication networks.

Fived wing

A fixed-wing aircraft is an aircraft with wings that do not move in relation to the main body of the aircraft. The aircraft generates lift through its wings as it moves forward, typically using an engine for propulsion. Common examples include airplanes and gliders, and they are widely used for commercial, military, and recreational purposes.

C4ISR

C4ISR stands for Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance. It represents an integrated system designed to enhance a military's operational awareness and decision-making. This system collects, processes, and shares critical data to coordinate and monitor battlefield operations effectively.

Multi-Function Radar

A multi-function radar (MFR) is an advanced radar system capable of performing multiple tasks simultaneously, such as detecting, tracking, and guiding weapons toward various targets, including aircraft, missiles, and other threats. MFR systems are designed for flexibility and efficiency, often combining surveillance, targeting, and engagement functions in one unit.

Server Platform

A server platform is the foundational hardware and software environment designed to host, manage, and deliver computing resources and services. It includes the physical server hardware (such as CPUs, memory, storage, and networking components) as well as the firmware, operating systems, and management tools that enable efficient, secure, and scalable operation. Server platforms are built to support critical workloads in enterprise IT environments, including applications, databases, virtualization, cloud services, and high-performance computing. They are optimized for performance, reliability, security, and manageability, forming the backbone of modern data centers and cloud infrastructures.

signal analysis

정보 및 작전 목적으로 전자 신호를 가로채고 분석하는 과정. The process of intercepting and analyzing electronic signals for intelligence and operational purposes.

Weapon Control System

A Weapon Control System (WCS) is an advanced integrated system designed to manage and control various weapon platforms, enabling precise target acquisition, tracking, and engagement in diverse operational environments. WCS is utilized across land, naval, and air forces, enhancing the effectiveness and accuracy of modern combat systems.

System

모든 유형의 무기 및 그 운영 체계를 포함하는 포괄적인 용어 A comprehensive term that includes all categories of weapons and their operational frameworks.

Field artillery

Field artillery refers to artillery weapons that are mobile and designed for battlefield operations. These systems include guns, howitzers, and self-propelled artillery that deliver long-range fire support and can be deployed relatively quickly on the front lines.

Naval Gun

A Naval Gun is a large-caliber artillery weapon mounted on warships, designed for engaging surface, air, and shore-based targets. These guns play a crucial role in naval warfare, coastal bombardment, and air defense, offering high-velocity firepower with precision targeting.

Cybersecurity Platform

A Cybersecurity Platform serves as a unified defense system that helps organizations detect, respond to, and prevent a wide range of cyber threats, while also supporting regulatory compliance and business continuity in an increasingly digital world. 💡 Key Features of a Cybersecurity Platform ✔️Threat Detection and Prevention: Uses AI, machine learning, or signature-based tools to identify and block malicious activity. ✔️Endpoint Security: Protects user devices (PCs, mobiles, servers) connected to the network. ✔️Network Security: Monitors and filters traffic to prevent intrusions, DDoS attacks, or data leaks. ✔️Cloud Security: Safeguards cloud-based resources and workloads. ✔️Security Information and Event Management (SIEM): Aggregates and analyzes logs for real-time threat monitoring and incident response. ✔️Identity and Access Management (IAM): Ensures that only authorized users can access specific systems or data.

Ammunition and Shells

Projectiles and explosive devices used by various firearms and artillery.