This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This full HD Wi-Fi camera includes full 1080P video, quality at 30 frames per second, and 128-degree ultra-wide angle field of view, dual band Wi-Fi and advanced motion detection with real-time notification.
The latest version of this physical identity and access manager (PIAM) centrally manages physical identities and access across diverse physical security systems while maintaining compliance.
This line of IP-based “panic” solutions can be used to instantly and discreetly summon police or security via a wide variety of methods – IP phones, auto-calls to mobile devices and handheld radios, desktop pop-ups, base stations and software.
This incident management software platform’s four editions are differentiated by the types of events an enterprise security executive needs to manage, including dispatching; activity tracking; incident reporting; and investigation and case management.
This “Simple Paging” solution reproduces live announcements from a desk or on the move, giving security professionals an intelligible and flexible emergency response tool.
Built for environments up to 5,000+ total endpoints, this suite of services ensures that all leading anti-virus agents are up to date and running, leading patch management solutions are operational, and informs security or IT personnel when untrusted, blacklisted software is running on the company’s network.
The tool does not require identifying information, and it does not collect data without opt-in permission.
June 1, 2014
Tool users, including information-security, risk, financial and other senior executives, can input a range of expenses and estimated costs for either a specific scenario or actual breach, and the app, sponsored by Booz Allen Hamilton, would generate a comprehensive report explaining the total cost and enabling a cost-benefit analysis of security strategies.
To eliminate contraband cellphone use within a facility, such as a prison, this solution enables security personnel to tell within seconds if someone within the facility has a phone turned on.