Security Software safeguards critical infrastructure.

Designed to help organizations maximize security system effectiveness, AVERT v5.2 provides detection modeling, visual representation of vulnerabilities and infiltration opportunities, clear risk mitigation strategy, and action plans to neutralize attacks. Viewsheds and Intensity Maps allow visual analysis of detection and firepower probabilities, while Shot Traces and Detection Traces show...

Read More »

Verizon Wireless and Lextech Labs Offer Mobile Video Surveillance Solution over 3G and 4G

BASKING RIDGE, N.J. and LISLE, Ill. - Verizon Wireless and Lextech Labs today announced a business service agreement that will enable users of Lextech Labs' iRa C3 product to view live and recorded video surveillance feeds on smartphones and tablets running on the Verizon Wireless 3G and 4G Networks. With the ability of extending video surveillance to a mobile device, supervision professionals...

Read More »

Fujitsu Palm Vein Authentication Deployed for Security Access System by Richemont

Tokyo - Fujitsu today announced that Compagnie Financiere Richemont SA has deployed the PalmSecure(TM) palm vein authentication system for security access within its headquarters located in Geneva, Switzerland, as of January 2011. Richemont is known as one of the three largest luxury goods holding companies in the world, and carries such world-renowned brands as Cartier, Van Cleef & Arpels S.A.,...

Read More »

Gaggle Increases School Options for Simple and Secure Account Management

Gaggle Now Supports RADIUS Authentication BLOOMINGTON, Ill. - Gaggle, the leading provider of safe online learning tools, announced today that they now support RADIUS (Remote Authentication Dial In User Service) authentication for educational institutions. RADIUS is a system that can be used to allow user access to multiple services using a single set of account credentials. Students in districts...

Read More »

Cogiscan Introduces Several New TTC products at APEX

Cogiscan will be introducing new hardware and software products supporting machines from leading vendors, including Cyberoptics, DEK, Ekra, Essemtec, Fuji, Juki, Koh Young, MPM, Mydata, Samsung, Siplace, Teradyne, Universal Instruments, Viscom, VI Technology, and others. BROMONT, CANADA, Mar 9, 2011 - Cogiscan, the leading track, trace and control solutions provider for the electronics...

Read More »

Toledo Museum of Art Keeps Security Tight with Morse Watchmans KeyWatcher-® System

Tracking & Automated Reports are Valuable Functions of Museum's Key Control and Management System. Oxford, CT (March 9, 2011) - With a collection of more than 30,000 works of art and 2010 attendance surpassing 430,000 the Toledo Museum of Art is a thriving cultural and educational center for northwest Ohio. To help protect the visitors, staff and treasures, the Museum has deployed a comprehensive...

Read More »

Power-Saving, Digital Indicators deliver diverse feature set.

Based on transducer technology with 10 Â-µin. resolution, Â-µMaxÂ-µmÂ-® II offers selectable resolution in increments from 0.001-0.00001 in. to accommodate diverse applications. Multiple Factors for ratio measurements allows chordal-type measurements, and 2 point difference measurement allows comparison of different readings or calculation of measured values. Other features...

Read More »
Presentation Remote Control responds to hand movements.

Presentation Remote Control responds to hand movements.

Equipped with gyroscopic capabilities, Presentation Pro PR-PRO4 allows user to control mouse with natural hand movements. Unit also utilizes RF technology that works at ranges up to 65 ft through walls and furniture for use in large presentation areas. Designed for use with PowerPointÂ-® and similar presentation software, plug-and-play control includes laser pointer and provides audio control...

Read More »
Encryption System supports external eSATA storage devices.

Encryption System supports external eSATA storage devices.

Built on FIPS certified AES 256-bit crypto engine, External CipherChain encrypts just about any external data storage device with eSATA or SATA connection. Insertion of Cipher Key activates encryption and decryption of data on-the-fly with no performance degradation. Full disk encryption encrypts boot sector, partition table, and all information in drive. Featuring rugged metal housing, External...

Read More »
Vector® Sports Training Ball Offers Visible Point of Contact
Sponsored

Vector® Sports Training Ball Offers Visible Point of Contact

Our goal is to help every athlete derive maximum enjoyment from their sport and become a better player. We offer a line of innovative training tools that combine cutting-edge technology and out of the box thinking to deliver an unbeatable competitive advantage. The Vector® Sports Training Ball is just another example of our commitment to innovation. To learn how the Vector® is helping ballplayers everywhere, see our video.

Read More »

All Topics