Search Results

 

 

Emergency Power Switches<div class="body"> <div class="thumbnail"> <img title="" alt="" src="http&#58;//www.securitymanagement.com/sites/securitymanagement.com/files/Russelectric%20copy.gif" width="144" height="180" /> </div> <p>RTS Series Transfer Switches from <span style="COLOR&#58;rgb(255,0,0);"><strong>Russel­ectric </strong></span>of Hingham, Massachusetts, simplify selective coordination of overcurrent/short circuit devices in emergency and backup power systems for healthcare and other mission-critical facilities. Capable of closing in on and withstanding 30 cycles of fault current, the switches al­low downstream devices to clear a fault before upstream devices in order to simplify the task of selective coordination mandated by the National Electrical Code for emergency and legally required standby systems. The switches are available in single- and dual-motor versions in ratings from 100 to 4,000 amps for either open- or closed-transition switching. The UL-listed switches are also available in load-break bypass and no load-break bypass versions. </p> </div>
Business Intelligence<div class="body"> <p> <span style="COLOR&#58;rgb(255,0,0);"> <strong>PPM 2000</strong> </span> of Edmonton, Alberta, Canada, has expanded its Perspective solution to include Focal Point, an integrated business intelligence and performance measurement tool powered by QlikView. The solution provides a single enterprise platform for incident, investigation, and case management. Focal Point presents data in a series of preconfigured charts and graphs. Integration with Qlik­View and its award-winning visualization and point-and-click technology means that all comprehensive formulas and queries are built into the application, so management can instantly view a dashboard of key metrics or drill down through a series of dynamic charts and graphs for trend identification, risk reporting, and performance management. The solution offers an interactive dashboard of incident and loss data and a powerful analytical tool for un­covering areas of concern and sudden trends. </p> </div>
Disk Destroyer<div class="body"> <div class="thumbnail"> <img title="" alt="" src="http&#58;//www.securitymanagement.com/sites/securitymanagement.com/files/SEM%20copy.gif" width="144" height="180" /> </div> <p>The Model 0201OMD Optical Media Destroyer from <span style="COLOR&#58;rgb(255,0,0);"><strong>Security Engineered Machinery</strong></span> of Westboro, Massachusetts, shreds CDs, DVDs, credit cards, ID badges, access cards, and similar items, reducing them to tiny particles that satisfy requirements of NSA/CSS 04-02. The Optical Media Destroyer destroys up to 2,500 disks per hour. Ergo­nomic photoelectric controls provide for hands-free start and stop. The cutters are activated by the introduction of materials and are automatically shut off when material is destroyed. If the door of the machine is open or the bag inside is full, the cutting head will not operate and an indicator light will signal the problem. The large 30-gallon waste collection bin is constructed of anti-static material to prevent particles from clinging to it when emptying. The Model 0201 offers an energy-saving feature that powers down the unit after prolonged inactivity. Electronic capacity control provides a visual indication of infeed capacity being used to help prevent jams. A built-in automatic oiling system provides continuous oil flow to the cutting heads, for improved performance and blade life.&#160; </p> </div>
Mobile Key Updates<div class="body"> <div class="thumbnail"> <img title="" alt="" src="http&#58;//www.securitymanagement.com/sites/securitymanagement.com/files/Videx%20-%20Bluetooth%20Cyberkey%20copy.gif" width="144" height="90" /> </div> <p> <span style="COLOR&#58;rgb(255,0,0);"> <strong>Videx </strong> </span>of Corvallis, Oregon, has combined its CyberKey technology with Bluetooth technology into the CyberKey Blue, a re­chargeable key that can be accessed by a BlackBerry for scheduling and downloading information in the field. It is especially useful for companies with mobile or remote employees. For example, a technician servicing ATMs can carry a single key, obtaining authorization for each location upon arriving there. Like other Cyber­Keys, it cannot be duplicated and it re­cords openings and unauthorized attempts to enter any CyberLock. CyberLock electronic cylinders can replace virtually any mechanical key cylinder. </p> </div>
Travel Intelligence<div class="body"> <p>New York City-based <span style="COLOR&#58;rgb(255,0,0);"><strong>Risk Control Stra­tegies</strong></span> has created a proprietary intelligence practice to safeguard clients who travel internationally. The International Travel Intelligence Network provides intelligence needed to safeguard human life while traveling. The company uses proprietary resources from around the world to provide critical intelligence regarding the destination to include areas of travel, alerts and warnings, and overall crime and environmental issues. Also included is information on safety, health, lodging, transportation, and communication concerns related to terrorism and religious, political, and social tensions. The network will identify restricted travel areas so travelers can avoid them and adjust itineraries for maximum safety. </p> </div>