Software helps implement corporate-wide convergence.
Promoting efficiency, strategy, time and identity management, as well as communications, scalable Enterprise Level Convergence Software provides layered security throughout corporate security departments to ensure tangible and intangible critical assets are continuously protected. End-to-end access security software aligns information security, physical security, compliance, and privacy groups...Read More »
Access Control Software meets governmental requirements.
Model XR500E Card Plus PIN v115 meets DCID 6/9 and other National Security program requirements for dual ID authentication for card access. Two code entries are required to operate XR500E Card Plus PIN system: first code is entered from Wiegand interface card using readers, such as built-in reader on DMP keypad. Second code could be keyed in at keypad or input through second card. User codes are...Read More »
Panasonic Invites ASIS 2006 Attendees to 'see IT all!'
Extensive New Product Introductions Enhance Leading IP and Analog Video Surveillance Solutions. San Diego, CA (September 25, 2006) - Panasonic Security Systems, a division of Panasonic System Solutions Company (PSSA), continues to expand the breadth of their video surveillance solutions with several new product introductions at ASIS 2006. In the IP arena, Panasonic is showcasing a new network...Read More »
Software protects Web and enterprise applications.
Combining web single sign-on with seamless remote access, Novell-® Access Manager v3 provides enterprise security and access control. It integrates standards-based identity federation and translates between identity federation standards to enable sharing identity information across organizational and technical boundaries. Clientless Secure Sockets Layer Virtual Private Network provides access...Read More »
Labor Crisis In Manufacturing
To learn more about collaborative technology solutions for your business and how Universal Robots can help, download this white paper now.Read More »
Iris Readers provide non-invasive biometric identification.
Combining core video and imaging technology with image capture engine, Model BM-ET200 Iris Reader provides recognition results in 0.3 sec. Dual mirror design allows individuals to align eyes for accurate reading, and captures detailed image of both irises. Enrollment and authentication algorithm creates template of iris pattern for storage onto access card or token. Device can be part of...Read More »
Panels provide fire, intrusion, and access control.
Suited for retail and residential applications, XR100 Series features 142 zones, 8 individual reporting areas, and up to 8 supervised door access points and/or keypads. Installers and service technicians can fully program system and run diagnostics from any DMP LCD keypad. Panel accepts software updates from remote location using Remote Link(TM) software. Network version XR100N is suitable for...Read More »
Promedico (the Netherlands) Secures Medical Data with VASCO's Digipass 300 and VACMAN Controller
Promedico ASP Application Makes Patient Files Available via the Internet; VASCO Strong Authentication Secures the Confidentiality of the Medical Files OAKBROOK TERRACE, Ill., and BRUSSELS, Belgium, Sept. 27 / -- VASCO Data Security International, Inc. ( http://www.vasco.com/ ) (NASDAQ:VDSI), the global number one vendor of strong user authentication and e-signature products, today announced that...Read More »
Access Control Solution uses biometric, RFID technologies.
Combining UHF RFID (radio frequency identification) technology inside employee ID card with biometric facial recognition, TETRAGATE provides secure access control solution for tracking human as well as physical assets on same network. It recognizes people approaching from 60 ft away and can read up to 60,000 faces/sec without people knowing their images are being scanned. All assets, human or...Read More »
Lock Cylinder keeps record of events for audit purposes.
CyberLock-® intelligent lock cylinders are stainless steel interchangeable cores that convert standard lock or padlock into access control system. Designed to exact dimensional standards of existing mechanical cylinders, products do not require any hardwiring or structural changes for installation. Included microprocessor and memory allow each CyberKey to be programmed with its own access...Read More »
Compass Technologies Unveils New 2.1 Software for 6e Access Control System
Compass Technologies, Exton PA, has just released version 2.1 software for its 6e access control system. This new 2.1 version software has a comprehensive list of new customer driven features. Compass 6e software now allows selective and time controlled transmission of alarm information via email and text messages to cell phones (see illustration). The Compass 6e version 2.1 software also offers...Read More »
SpillVak Absorbs Up to 6X More Fluid Than Rock- and Clay-based Absorbents
Are you struggling to find an absorbent that doesn't result in at least some leaching? SpillVak outperforms all rock and clay-based materials. Check out our video to learn more.Read More »