click to applyclick to find candidates

Products in the Government Security Directory

# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
  • iBR9000 iButton Data Collector By CyberLock, Inc.

    iBR9000 is the newest addition to our data collection family. With its high-impact fiberglass-reinforced nylon case and stainless steel read head, the iBR9000 is ideal for security guard patrols, fire safety inspections, floor checks in retail stores, and time and attendance applications.... Read More
  • ICPE By Allen Vanguard

    The ICPE is the latest generation of the Cupola Protection Ensemble (CPE) for vehicle gunners. It is a modular protective ensemble designed to protect exposed gunners using crew-served weapons on military vehicles from the effects of roadside improvised explosive devices (IED) and other... Read More
  • ID Authenticator Model 500 By E-Seek

    The Model 500 is capable of dual sided high resolution ID imaging designed for counter top ID verification applications. In addition, high resolution imaging will read the barcode data on drivers’ licenses as well as the magnetic stripe information. The high resolution reading capability is... Read More
  • ID Card Printer Supplies By J. O'Brien Company Inc.

    Color Ribbons Monochrome Ribbons Overlaminates Cleaning Kits Blank ID Cards Dust Covers Carrying Cases Read More
  • ID Card Printers By J. O'Brien Company Inc.

    Desktop Card Printers instantly issue compelling, high-quality access cards, loyalty cards, membership cards and advanced secure IDs that maximize cardholder satisfaction. Single Sided Printers Create security access cards or print ID badges on one side of the PVC card. Dual Sided... Read More
  • ID Flow By Jolly Technologies

    ID Flow is Jolly Technologies’ industry leading ID software solution for the management and production of secure photo ID cards. As the software of choice for Fortune 500 companies, municipalities, K-12 schools and universities, ID Flow is perfect for organizations of all sizes. Built around... Read More
  • ID Systems & Software By J. O'Brien Company Inc.

    Photo ID Systems Assure ID 7 Solo, Express, and Enterprise Software Offering a variety of ID Systems and Software, we have everything your company needs. Read More
  • IDAS By Allen Vanguard

    The Integrated Dismounted Armor System - Military (IDAS) protects the extremities of mounted and dismounted personnel against battlefield threats including fragmentation and bullets. The defining feature of the IDAS is how it can be deployed as a modular and scalable protection system to... Read More
  • IDAS-T By Allen Vanguard

    The Integrated Dismounted Armor System - Tactical (IDAS - T) protects the extremities of Law Enforcement officers against fragmentation and ballistic threats. The IDAS - Tactical is NTOA Member Tested and recommended, with additional testing information available upon request. The IDAS -... Read More
  • identity management By E-CARD ID Products Ltd.

    You need a single solution for the capture, retention and dissemination of information regarding employees access rights. In short, you need an Identity Management solution. Read More
  • Identity Theft Training E-learning Program By Global Training Solutions Inc

    This e-learning course is designed to educate the learner on the risks and threats associated with Identity Theft, Phishing and Social Engineering. This is a 15-minute primer that describes the methods used by an attacker and the prevention techniques that you can use to avoid becoming a victim... Read More
  • Impasse® High Security Fence By Ameristar Perimeter Security USA Inc

    The Impasse high security fence system is a heavy steel palisade fence system designed to provide the end user with a level of security not typically achieved with traditional chain link and ornamental mesh fence systems. The Impasse security fence provides a platform to incorporate multiple... Read More
  • Incident Reporting & Case Management System By D3 Security

    D3's Incident Management System is an enterprise class, easy-to-use, affordable and fully customizable incident reporting & case management system providing consistent, documented Incident reporting, and activity tracking regardless of the origination. It automates the approval process of an... Read More
  • Incident Response and Computer Forensics E-Learning Training Program By Global Training Solutions Inc

    This e-learning course will take the security practitioner and investigator through each of the areas of incident response, computer crime investigation and computer forensics, so that they are better prepared to respond to both internal and external attacks. This includes a detailed description... Read More
  • Industrial telephone entry systems By Destined Commodities Inc

    This is a hands free, multi-number, Apartment Telephone Entry System for resident/visitor control. Visitors contact the desired tenant by entering a simple directory code gained from the built-in LCD display directory. The resident then grants or denies access. The apartment/tenant telephone... Read More
  • Industry Solutions By iOmniscient

    iOmniscient provides comprehensive solutions for over 30 unique industry requirements. Each organization has many stakeholders and multiple departments such as security, safety, operations and marketing. Each industry solution is a comprehensive portfolio of application that can fulfill each... Read More
  • Infinity 2020 By Integrated Security Corporation

    Infinity 2020 is the latest member of the Infinity family of perimeter intrusion detection systems. The IP addressable surface mount electronics are IP addressable. Users communicate with the system using only a Web browser. Our unique Weather Station provides real time weather information to... Read More
  • InformaCast By Singlewire Software

    Protect what matters most with InformaCast, a mass notification system that sends audio, text and images to mobile and on-premises devices. It increases the speed, reach, and success rate of emergency notification communications to get critical information to the people that need it. Read More
  • Information Security Awareness E-Learning Training Program By Global Training Solutions Inc

    User Awareness Training is critical to the proper dissemination of an Information Security Policy. The most comprehensive Information Security Policy can be defeated by a single end-user mistake. Organizations today have already invested in computer security technologies such as firewalls and... Read More
  • Information Security Management E-Learning Training Program By Global Training Solutions Inc

    This e-learning training course is designed to help mangers understand the risks associated with the organization’s information infrastructure. It also highlights the importance of an Information Security Policy, including the enforcement of the policy. In addition to identifying security... Read More
  • Instabarrier® By Allied Tube & Conduit, A Part of Atkore International

    Instabarrier non-reinforced is characterized as being the most versatile of all barbed tape products. Designed for both temporary and permanent use, it permits rapid recovery and reuse. Tape Material: 301 Stainless Steel | 1.21" wide prior to forming Barb Length/Spacing/Offset: 2.5"... Read More
  • Insurance Underwriting & Support Services By Blackburn Group Inc.

    Blackburn Group, Inc. offers underwriting placement services to various insured in the Property, Casualty, and Workers Compensation risk and claim businesses. Our RiskPro products and services include: Comprehensive exposure identification, placement, and management for all Property,... Read More
  • Integrated Perimeter Security Solutions By Fiber SenSys,Inc (FSI)

    Fiber Sensys, Inc. (FSI) offers several products for the integration and interoperability of perimeter security solutions, including the FSI Software Development Kit and Fiber-Optic Perimeter Security Intrusion Detection System. The Device SDK comes with a middleware application that, in many... Read More
  • Integrated Security Solutions By Easter's Lock & Security Systems Inc.

    Facility Management-Solutions Provider for Government & Businesses Would you like to regulate your employees entry, exit, and admission to various locations or parts of your building? Perhaps it's time to consider an Access Control System to simplify the management of your building or... Read More
  • Intelligent Access Controllers By DSX, Inc.

    We have engineered some of the finest access control systems in the industry. Each of our controllers has been designed for a specific purpose and tested to meet those needs. Choose the controller that fits your needs. All DSX Controllers are designed and built for commercial and industrial use... Read More
  • Intercom & Phone Entry Systems By Easter's Lock & Security Systems Inc.

    The Homeland Security Group can provide and install an intercom or phone entry system to meet your specific requirements and applications. Our systems can provide you with two way communication, control of a door, gate, and more with or without video verification. We offer a variety of cost... Read More
  • Interdependent Vulnerability Analysis By HTM: Business Endurance Solutions

    A service to determine how organizations are vulnerable to disaster; whether they be natural or man-made. The result is an organization with security built in to the business process, so security becomes natural and is not an extra step in the process. The company will be able to withstand and... Read More
  • Internet Safety E-Learning Course (Parents Edition) By Global Training Solutions Inc

    This e-learning course is designed to assist parents in protecting their children from Internet-related threats. This safety course will help the parent to monitor their child’s on-line activities, as well as describing ways to block certain types of content and deploying safe computing practices. Read More
  • Internet Security By Entrust

    Entrust TruePass Entrust GetAccess Entrust Secure Transaction Platform Read More
  • Interview Wizard By

    Create and store your basic prescreening questions. Create as many as you want, put them in any order you want. To get you started, we provide you with some standard, general questions that you can customize and make your own. From either the applicant quick view or the individual applicant... Read More
  • INTREPID™ MicroPoint™ II By Southwest Microwave, Inc.

    New-generation MicroPoint™ fence detection, featuring open-architecture communications protocol for networking with other new-generation INTREPID™ technologies. Read More
  • INTREPID™ MicroTrack™ II By Southwest Microwave, Inc.

    New-generation MicroTrack buried cable detection, featuring open-architecture communications protocol for networking with other new-generation INTREPID™ technologies. Read More
  • INTREPID™ MicroWave 330 By Southwest Microwave, Inc.

    Microwave Sensor for the detection of intruders. K-Band detection to 244m (800ft). Open-architecture communications facilitate networking with other new-generation INTREPID™ technologies. Read More
  • Intrusion Detection Systems By Easter's Lock & Security Systems Inc.

    At the Homeland Security Group we offer design, installation, maintenance, and monitoring of your intrusion detection system. We professionally design each system with solutions to protect your facility. We do not or will not sell a pre-packaged alarm system. Neither will we try to insult your... Read More
  • Intrusion Detection Systems (IDS) By CINCH systems, Inc.

    The Protector IDS features patented fully encrypted “End-To-End” communication for high-security applications in new and existing installations. Communication between all devices and the control panel is fully encrypted to ensure that your security system is secure. Protector’s CeLAN expansion... Read More
  • Intrusion Detection Systems (IDS) By FutureNet Security Solutions

    Smith & Wesson Security Solutions™ carries a comprehensive product line that includes a complete range of Intrusion Detection Systems (IDS). The detection systems are used to prevent, detect and delay intrusion of unauthorized personnel and vehicles into a facility, while enhancing the... Read More
  • Investigative Services By OMNIPLEX World Services Corporation

    OMNISEC International Investigations, Inc. (OSIII), a wholly owned subsidiary of OMNIPLEX, is one of the largest background investigative service contractors in the United States. We provide a wide variety of turn-key investigative support services that include intelligence, investigative,... Read More
  • Invisible Proximity Reader By Cansec Systems Ltd.

    The perfect solution for entrances where vandal resistance is a high priority or where high profile aesthetics must be preserved. Easily installed in new and existing wood or aluminum entrances. Compatible with all 125 kHz HID and AWID clamshell and Thin Prox cards, as well as Prox Tags. Simple... Read More
  • ioSafe 3.5 Pilot Hard Disk Drive By K.L. Security Enterprises, Inc - HDD FireSafe

    The Pilot series of disk drives are compatible with home media servers, desktops, storage arrays or external storage devices and hardware and work with Windows, Linux and Mac systems. 3.5" fire resistant Pilot drives support the SATA I interface. These fire safe disks have a 5400 rpm rotational... Read More
  • ioSafe Solo By K.L. Security Enterprises, Inc - HDD FireSafe

    The rugged desktop ioSafe Solo external hard drive brings disaster protection to a price range that everyone can afford. With capacities from 500GB, 1 TB, 1.5TB and 2TB external hard drive versions, the ioSafe Solo can safely protect precious family photo albums, music libraries and days of... Read More
  • ioSafe Solo SSD By K.L. Security Enterprises, Inc - HDD FireSafe

    The ruggedized ioSafe Solo Solid State Drives is an external hard drive that provides the most data protection for the dollar. ioSafe ArmorPlate adds shock and crush protection up to 5000 lbs. of force and 1000 g's of shock and 20 ft. impact drop security. With capacities from 64GB, 128GB and... Read More
  • ioSafe SoloPRO By K.L. Security Enterprises, Inc - HDD FireSafe

    The rugged desktop ioSafe SoloPRO external hard drive with multiple connetivity options gives you teh ultimate in flexibility and compatibility in almost any business environment. Whether you are backing up multiple computers with multiple operating systems or your company servers, the SoloPRO... Read More
  • IP Camera, 2 Megapixel HDTV Bullet (6522) By Channel Vision

    Channel Vision’s 2 Megapixel Outdoor Bullet IP Camera offers superior image quality with a 2 megapixel CMOS sensor and has the ability to capture images up to UXVGA (1600 x 1200 pixels). With H.264 compression, less bandwidth and storage space are used, while delivering full resolution at max... Read More
  • IP Camera, 2 Megapixel HDTV Dome Camera (6521) By Channel Vision

    Channel Vision’s IP Camera HD 2 Megapixel H.264 IP Camera offers superior image quality with a 2 megapixel CMOS sensor and has the ability to capture images up to UXVGA (1600 x 1200 pixels). With H.264 compression, less bandwidth and storage space are used, while delivering full resolution at... Read More
  • IP Communications Device By Cansec Systems Ltd.

    Cansec's CanLan II TCP/IP Controller is a cost-effective solution that makes it easy to network-enable Cansec's CP40, H1000, SmartLock door controllers and Zodiac Max reader over an existing Ethernet network. The CanLan II solution allows the existing network cable structure to be utilized in... Read More
  • IP8362 By VIVOTEK

    VIVOTEK expands our megapixel/HD SUPREME series offerings with the IP8362 Network Bullet Camera. Incorporating a 2-Megapixel progressive scan CMOS image sensor, the Vivotek IP8362 offers full 1080p HD resolution at up to 30fps. High resolution and progressive scan technology allow users to... Read More
  • ISRAELI GAS MASK FILTER -Shelf life 20 years By EXPPE LLC

    Israeli Gas Mask Filter Innovative CBRN Filter with 20 years of self-life. the longest shelf life in the market The filter is manufactured per requirements defined by Israeli authorities' specifications. Used by the Israeli Armi IDF Read More
  • IT Forensics & Case Management By D3 Security

    The IT Forensics Case Management Software is a highly specialized web-based solution that manages computer, mobile and network investigations from inception through resolution. The foundation of the system are its four central components—Web Intake, Case Management, Evidence Tracking and... Read More
  • IT Infrastructure Solutions By Rittal Corporation

    Rittal's IT/data center infrastructure products include network server enclosures (wallmount or freestanding), server racks, UPSs, cooling systems, power distribution units, KVM consoles, cable management solutions, and system monitoring and security units. Its range of IT solutions can be... Read More