iBR9000 is the newest addition to our data collection family. With its high-impact fiberglass-reinforced nylon case and stainless steel read head, the iBR9000 is ideal for security guard patrols, fire safety inspections, floor checks in retail stores, and time and attendance applications.... Read More
The ICPE is the latest generation of the Cupola Protection Ensemble (CPE) for vehicle gunners. It is a modular protective ensemble designed to protect exposed gunners using crew-served weapons on military vehicles from the effects of roadside improvised explosive devices (IED) and other... Read More
The Model 500 is capable of dual sided high resolution ID imaging designed for counter top ID verification applications. In addition, high resolution imaging will read the barcode data on drivers’ licenses as well as the magnetic stripe information. The high resolution reading capability is... Read More
Desktop Card Printers instantly issue compelling, high-quality access cards, loyalty cards, membership cards and advanced secure IDs that maximize cardholder satisfaction.
Single Sided Printers
Create security access cards or print ID badges on one side of the PVC card.
Dual Sided... Read More
ID Flow is Jolly Technologies’ industry leading ID software solution for the management and production of secure photo ID cards. As the software of choice for Fortune 500 companies, municipalities, K-12 schools and universities, ID Flow is perfect for organizations of all sizes.
Built around... Read More
The Integrated Dismounted Armor System - Military (IDAS) protects the extremities of mounted and dismounted personnel against battlefield threats including fragmentation and bullets. The defining feature of the IDAS is how it can be deployed as a modular and scalable protection system to... Read More
The Integrated Dismounted Armor System - Tactical (IDAS - T) protects the extremities of Law Enforcement officers against fragmentation and ballistic threats. The IDAS - Tactical is NTOA Member Tested and recommended, with additional testing information available upon request.
The IDAS -... Read More
This e-learning course is designed to educate the learner on the risks and threats associated with Identity Theft, Phishing and Social Engineering. This is a 15-minute primer that describes the methods used by an attacker and the prevention techniques that you can use to avoid becoming a victim... Read More
The Impasse high security fence system is a heavy steel palisade fence system designed to provide the end user with a level of security not typically achieved with traditional chain link and ornamental mesh fence systems. The Impasse security fence provides a platform to incorporate multiple... Read More
D3's Incident Management System is an enterprise class, easy-to-use, affordable and fully customizable incident reporting & case management system providing consistent, documented Incident reporting, and activity tracking regardless of the origination. It automates the approval process of an... Read More
This e-learning course will take the security practitioner and investigator through each of the areas of incident response, computer crime investigation and computer forensics, so that they are better prepared to respond to both internal and external attacks. This includes a detailed description... Read More
This is a hands free, multi-number, Apartment Telephone Entry System for resident/visitor control. Visitors contact the desired tenant by entering a simple directory code gained from the built-in LCD display directory. The resident then grants or denies access. The apartment/tenant telephone... Read More
iOmniscient provides comprehensive solutions for over 30 unique industry requirements. Each organization has many stakeholders and multiple departments such as security, safety, operations and marketing. Each industry solution is a comprehensive portfolio of application that can fulfill each... Read More
Infinity 2020 is the latest member of the Infinity family of perimeter intrusion detection systems. The IP addressable surface mount electronics are IP addressable. Users communicate with the system using only a Web browser. Our unique Weather Station provides real time weather information to... Read More
Protect what matters most with InformaCast, a mass notification system that sends audio, text and images to mobile and on-premises devices. It increases the speed, reach, and success rate of emergency notification communications to get critical information to the people that need it. Read More
User Awareness Training is critical to the proper dissemination of an Information Security Policy. The most comprehensive Information Security Policy can be defeated by a single end-user mistake. Organizations today have already invested in computer security technologies such as firewalls and... Read More
This e-learning training course is designed to help mangers understand the risks associated with the organization’s information infrastructure. It also highlights the importance of an Information Security Policy, including the enforcement of the policy. In addition to identifying security... Read More
Instabarrier non-reinforced is characterized as being the most versatile of all barbed tape products. Designed for both temporary and permanent use, it permits rapid recovery and reuse.
Tape Material: 301 Stainless Steel | 1.21" wide prior to forming
2.5"... Read More
Blackburn Group, Inc. offers underwriting placement services to various insured in the Property, Casualty, and Workers Compensation risk and claim businesses.
Our RiskPro products and services include:
Comprehensive exposure identification, placement, and management for all Property,... Read More
Fiber Sensys, Inc. (FSI) offers several products for the integration and interoperability of perimeter security solutions, including the FSI Software Development Kit and Fiber-Optic Perimeter Security Intrusion Detection System. The Device SDK comes with a middleware application that, in many... Read More
Facility Management-Solutions Provider for Government & Businesses
Would you like to regulate your employees entry, exit, and admission to various locations or parts of your building?
Perhaps it's time to consider an Access Control System to simplify the management of your building or... Read More
We have engineered some of the finest access control systems in the industry. Each of our controllers has been designed for a specific purpose and tested to meet those needs. Choose the controller that fits your needs. All DSX Controllers are designed and built for commercial and industrial use... Read More
The Homeland Security Group can provide and install an intercom or phone entry system to meet your specific requirements and applications. Our systems can provide you with two way communication, control of a door, gate, and more with or without video verification. We offer a variety of cost... Read More
A service to determine how organizations are vulnerable to disaster; whether they be natural or man-made. The result is an organization with security built in to the business process, so security becomes natural and is not an extra step in the process. The company will be able to withstand and... Read More
This e-learning course is designed to assist parents in protecting their children from Internet-related threats. This safety course will help the parent to monitor their child’s on-line activities, as well as describing ways to block certain types of content and deploying safe computing practices. Read More
Create and store your basic prescreening questions. Create as many as you want, put them in any order you want. To get you started, we provide you with some standard, general questions that you can customize and make your own.
From either the applicant quick view or the individual applicant... Read More
At the Homeland Security Group we offer design, installation, maintenance, and monitoring of your intrusion detection system. We professionally design each system with solutions to protect your facility. We do not or will not sell a pre-packaged alarm system. Neither will we try to insult your... Read More
Smith & Wesson Security Solutions™ carries a comprehensive product line that includes a complete range of Intrusion Detection Systems (IDS). The detection systems are used to prevent, detect and delay intrusion of unauthorized personnel and vehicles into a facility, while enhancing the... Read More
The Protector IDS features patented fully encrypted “End-To-End” communication for high-security applications in new and existing installations. Communication between all devices and the control panel is fully encrypted to ensure that your security system is secure. Protector’s CeLAN expansion... Read More
OMNISEC International Investigations, Inc. (OSIII), a wholly owned subsidiary of OMNIPLEX, is one of the largest background investigative service contractors in the United States. We provide a wide variety of turn-key investigative support services that include intelligence, investigative,... Read More
The perfect solution for entrances where vandal resistance is a high priority or where high profile aesthetics must be preserved. Easily installed in new and existing wood or aluminum entrances. Compatible with all 125 kHz HID and AWID clamshell and Thin Prox cards, as well as Prox Tags. Simple... Read More
The Pilot series of disk drives are compatible with home media servers, desktops, storage arrays or external storage devices and hardware and work with Windows, Linux and Mac systems. 3.5" fire resistant Pilot drives support the SATA I interface. These fire safe disks have a 5400 rpm rotational... Read More
The rugged desktop ioSafe Solo external hard drive brings disaster protection to a price range that everyone can afford. With capacities from 500GB, 1 TB, 1.5TB and 2TB external hard drive versions, the ioSafe Solo can safely protect precious family photo albums, music libraries and days of... Read More
The ruggedized ioSafe Solo Solid State Drives is an external hard drive that provides the most data protection for the dollar. ioSafe ArmorPlate adds shock and crush protection up to 5000 lbs. of force and 1000 g's of shock and 20 ft. impact drop security. With capacities from 64GB, 128GB and... Read More
The rugged desktop ioSafe SoloPRO external hard drive with multiple connetivity options gives you teh ultimate in flexibility and compatibility in almost any business environment. Whether you are backing up multiple computers with multiple operating systems or your company servers, the SoloPRO... Read More
Channel Vision’s 2 Megapixel Outdoor Bullet IP Camera offers superior image quality with a 2 megapixel CMOS sensor and has the ability to capture images up to UXVGA (1600 x 1200 pixels). With H.264 compression, less bandwidth and storage space are used, while delivering full resolution at max... Read More
Channel Vision’s IP Camera HD 2 Megapixel H.264 IP Camera offers superior image quality with a 2 megapixel CMOS sensor and has the ability to capture images up to UXVGA (1600 x 1200 pixels). With H.264 compression, less bandwidth and storage space are used, while delivering full resolution at... Read More
Cansec's CanLan II TCP/IP Controller is a cost-effective solution that makes it easy to network-enable Cansec's CP40, H1000, SmartLock door controllers and Zodiac Max reader over an existing Ethernet network. The CanLan II solution allows the existing network cable structure to be utilized in... Read More
VIVOTEK expands our megapixel/HD SUPREME series offerings with the IP8362 Network Bullet Camera. Incorporating a 2-Megapixel progressive scan CMOS image sensor, the Vivotek IP8362 offers full 1080p HD resolution at up to 30fps. High resolution and progressive scan technology allow users to... Read More
The IT Forensics Case Management Software is a highly specialized web-based solution that manages computer, mobile and network investigations from inception through resolution. The foundation of the system are its four central components—Web Intake, Case Management, Evidence Tracking and... Read More
Rittal's IT/data center infrastructure products include network server enclosures (wallmount or freestanding), server racks, UPSs, cooling systems, power distribution units, KVM consoles, cable management solutions, and system monitoring and security units. Its range of IT solutions can be... Read More