Products in the Government Security Directory

# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

By CyberLock, Inc.

iBR9000 is the newest addition to our data collection family. With its high-impact fiberglass-reinforced nylon case and stainless steel read head, the iBR9000 is ideal for security guard patrols, fire safety inspections, floor checks in retail stores, and time and attendance applications.... Read more »

By Allen Vanguard

The ICPE is the latest generation of the Cupola Protection Ensemble (CPE) for vehicle gunners. It is a modular protective ensemble designed to protect exposed gunners using crew-served weapons on military vehicles from the effects of roadside improvised explosive devices (IED) and other... Read more »

By E-Seek

The Model 500 is capable of dual sided high resolution ID imaging designed for counter top ID verification applications. In addition, high resolution imaging will read the barcode data on drivers’ licenses as well as the magnetic stripe information. The high resolution reading capability is... Read more »

By J. O'Brien Company Inc.

Color Ribbons Monochrome Ribbons Overlaminates Cleaning Kits Blank ID Cards Dust Covers Carrying Cases Read more »

By J. O'Brien Company Inc.

Desktop Card Printers instantly issue compelling, high-quality access cards, loyalty cards, membership cards and advanced secure IDs that maximize cardholder satisfaction. Single Sided Printers Create security access cards or print ID badges on one side of the PVC card. Dual Sided... Read more »

By Jolly Technologies

ID Flow is Jolly Technologies’ industry leading ID software solution for the management and production of secure photo ID cards. As the software of choice for Fortune 500 companies, municipalities, K-12 schools and universities, ID Flow is perfect for organizations of all sizes. Built around... Read more »

By J. O'Brien Company Inc.

Photo ID Systems Assure ID 7 Solo, Express, and Enterprise Software Offering a variety of ID Systems and Software, we have everything your company needs. Read more »

By Allen Vanguard

The Integrated Dismounted Armor System - Military (IDAS) protects the extremities of mounted and dismounted personnel against battlefield threats including fragmentation and bullets. The defining feature of the IDAS is how it can be deployed as a modular and scalable protection system to... Read more »

By Allen Vanguard

The Integrated Dismounted Armor System - Tactical (IDAS - T) protects the extremities of Law Enforcement officers against fragmentation and ballistic threats. The IDAS - Tactical is NTOA Member Tested and recommended, with additional testing information available upon request. The IDAS -... Read more »

By E-CARD ID Products Ltd.

You need a single solution for the capture, retention and dissemination of information regarding employees access rights. In short, you need an Identity Management solution. Read more »

By Global Training Solutions Inc

This e-learning course is designed to educate the learner on the risks and threats associated with Identity Theft, Phishing and Social Engineering. This is a 15-minute primer that describes the methods used by an attacker and the prevention techniques that you can use to avoid becoming a victim... Read more »

By Ameristar Perimeter Security USA Inc

The Impasse high security fence system is a heavy steel palisade fence system designed to provide the end user with a level of security not typically achieved with traditional chain link and ornamental mesh fence systems. The Impasse security fence provides a platform to incorporate multiple... Read more »

By D3 Security

D3's Incident Management System is an enterprise class, easy-to-use, affordable and fully customizable incident reporting & case management system providing consistent, documented Incident reporting, and activity tracking regardless of the origination. It automates the approval process of an... Read more »

By Global Training Solutions Inc

This e-learning course will take the security practitioner and investigator through each of the areas of incident response, computer crime investigation and computer forensics, so that they are better prepared to respond to both internal and external attacks. This includes a detailed description... Read more »

By Destined Commodities Inc

This is a hands free, multi-number, Apartment Telephone Entry System for resident/visitor control. Visitors contact the desired tenant by entering a simple directory code gained from the built-in LCD display directory. The resident then grants or denies access. The apartment/tenant telephone... Read more »

By iOmniscient

iOmniscient provides comprehensive solutions for over 30 unique industry requirements. Each organization has many stakeholders and multiple departments such as security, safety, operations and marketing. Each industry solution is a comprehensive portfolio of application that can fulfill each... Read more »

By Singlewire Software

Protect what matters most with InformaCast, a mass notification system that sends audio, text and images to mobile and on-premises devices. It increases the speed, reach, and success rate of emergency notification communications to get critical information to the people that need it. Read more »

By Global Training Solutions Inc

User Awareness Training is critical to the proper dissemination of an Information Security Policy. The most comprehensive Information Security Policy can be defeated by a single end-user mistake. Organizations today have already invested in computer security technologies such as firewalls and... Read more »

By Global Training Solutions Inc

This e-learning training course is designed to help mangers understand the risks associated with the organization’s information infrastructure. It also highlights the importance of an Information Security Policy, including the enforcement of the policy. In addition to identifying security... Read more »

By Allied Tube & Conduit, A Part of Atkore International

Instabarrier non-reinforced is characterized as being the most versatile of all barbed tape products. Designed for both temporary and permanent use, it permits rapid recovery and reuse. Tape Material: 301 Stainless Steel | 1.21" wide prior to forming Barb Length/Spacing/Offset: 2.5"... Read more »

By Blackburn Group Inc.

Blackburn Group, Inc. offers underwriting placement services to various insured in the Property, Casualty, and Workers Compensation risk and claim businesses. Our RiskPro products and services include: Comprehensive exposure identification, placement, and management for all Property,... Read more »

By Fiber SenSys,Inc (FSI)

Fiber Sensys, Inc. (FSI) offers several products for the integration and interoperability of perimeter security solutions, including the FSI Software Development Kit and Fiber-Optic Perimeter Security Intrusion Detection System. The Device SDK comes with a middleware application that, in many... Read more »

By Easter's Lock & Security Systems Inc.

Facility Management-Solutions Provider for Government & Businesses Would you like to regulate your employees entry, exit, and admission to various locations or parts of your building? Perhaps it's time to consider an Access Control System to simplify the management of your building or... Read more »

By DSX, Inc.

We have engineered some of the finest access control systems in the industry. Each of our controllers has been designed for a specific purpose and tested to meet those needs. Choose the controller that fits your needs. All DSX Controllers are designed and built for commercial and industrial use... Read more »

By Easter's Lock & Security Systems Inc.

The Homeland Security Group can provide and install an intercom or phone entry system to meet your specific requirements and applications. Our systems can provide you with two way communication, control of a door, gate, and more with or without video verification. We offer a variety of cost... Read more »

By Global Training Solutions Inc

This e-learning course is designed to assist parents in protecting their children from Internet-related threats. This safety course will help the parent to monitor their child’s on-line activities, as well as describing ways to block certain types of content and deploying safe computing practices. Read more »

By Entrust

Entrust TruePass Entrust GetAccess Entrust Secure Transaction Platform Read more »


Create and store your basic prescreening questions. Create as many as you want, put them in any order you want. To get you started, we provide you with some standard, general questions that you can customize and make your own. From either the applicant quick view or the individual applicant... Read more »

By Easter's Lock & Security Systems Inc.

At the Homeland Security Group we offer design, installation, maintenance, and monitoring of your intrusion detection system. We professionally design each system with solutions to protect your facility. We do not or will not sell a pre-packaged alarm system. Neither will we try to insult your... Read more »

By FutureNet Security Solutions

Smith & Wesson Security Solutions™ carries a comprehensive product line that includes a complete range of Intrusion Detection Systems (IDS). The detection systems are used to prevent, detect and delay intrusion of unauthorized personnel and vehicles into a facility, while enhancing the... Read more »

By CINCH systems, Inc.

The Protector IDS features patented fully encrypted “End-To-End” communication for high-security applications in new and existing installations. Communication between all devices and the control panel is fully encrypted to ensure that your security system is secure. Protector’s CeLAN expansion... Read more »

By OMNIPLEX World Services Corporation

OMNISEC International Investigations, Inc. (OSIII), a wholly owned subsidiary of OMNIPLEX, is one of the largest background investigative service contractors in the United States. We provide a wide variety of turn-key investigative support services that include intelligence, investigative,... Read more »

By Cansec Systems Ltd.

The perfect solution for entrances where vandal resistance is a high priority or where high profile aesthetics must be preserved. Easily installed in new and existing wood or aluminum entrances. Compatible with all 125 kHz HID and AWID clamshell and Thin Prox cards, as well as Prox Tags. Simple... Read more »

By Cansec Systems Ltd.

Cansec's CanLan II TCP/IP Controller is a cost-effective solution that makes it easy to network-enable Cansec's CP40, H1000, SmartLock door controllers and Zodiac Max reader over an existing Ethernet network. The CanLan II solution allows the existing network cable structure to be utilized in... Read more »


VIVOTEK expands our megapixel/HD SUPREME series offerings with the IP8362 Network Bullet Camera. Incorporating a 2-Megapixel progressive scan CMOS image sensor, the Vivotek IP8362 offers full 1080p HD resolution at up to 30fps. High resolution and progressive scan technology allow users to... Read more »


Israeli Gas Mask Filter Innovative CBRN Filter with 20 years of self-life. the longest shelf life in the market The filter is manufactured per requirements defined by Israeli authorities' specifications. Used by the Israeli Armi IDF Read more »

By D3 Security

The IT Forensics Case Management Software is a highly specialized web-based solution that manages computer, mobile and network investigations from inception through resolution. The foundation of the system are its four central components—Web Intake, Case Management, Evidence Tracking and... Read more »

By Rittal Corporation

Rittal's IT/data center infrastructure products include network server enclosures (wallmount or freestanding), server racks, UPSs, cooling systems, power distribution units, KVM consoles, cable management solutions, and system monitoring and security units. Its range of IT solutions can be... Read more »