Search Results

 

 

Convergence Support<div class="body"> <p> <font color="#ff0000"> <strong>MAC Systems</strong> </font> of Canton, Massachusetts, has introduced its Customized Systems Support program, which will provide consultative advice to clients, in addition to administration, maintenance, and support of computer-based security systems and networks. The personalized portfolio of services is designed to ensure that a client’s integrated security system is operating at its best. It addresses a full range of security hardware and software needs, including access control maintenance and optimization, remote system administration, and custom personnel and journal reports. The program is personalized around each client’s business goals, security systems, and other needs. <span style="FONT-SIZE&#58;12pt;FONT-FAMILY&#58;&quot;Times New Roman&quot;;"></span></p> </div>
Blast MItigation<div class="body"> <p>Baltimore-based <font color="#ff0000"><strong>CINTEC America</strong></font> has introduced the Blastec Mini Isolator Bin, a blast mitigation tool that is ideal for use at airports, banks, post offices, and office buildings. The self-inflating product is designed to isolate suspicious packages and luggage, and can be easily and readily deployed to provide temporary blast mitigation and fragment retention. It can be custom-designed for a spectrum of blast applications. Made from an internally reinforced waterproof fabric, it can be deployed manually or robotically using appropriate bomb-disposal equipment. To deploy, the bin is first filled with air for stability, and then water through a standard fire hose, the water displacing the air through a pressure relief valve. The lightweight, compact unit can be adjusted in size to meet customer requirements. <span style="FONT-SIZE&#58;12pt;FONT-FAMILY&#58;&quot;Times New Roman&quot;;"></span></p> </div>
Data Destruction<div class="body"> <div class="thumbnail"> <img title="" alt="" src="http&#58;//www.securitymanagement.com/sites/securitymanagement.com/files/SEM%2005415%20Model%2022%20Hard%20Drive%20Disintegrator%20copy.gif" width="144" height="180" /> </div> <p>The Model 22 HDD Hard Drive Destruction System from <font color="#ff0000"><strong>Security Engineered Machinery</strong></font> of Westboro, Massachusetts, prevents data theft by shredding used computer hard drives into unreconstructible fragments. The unit can destroy twenty 31/2-inch hard disks each hour. It can also destroy other items, including hand-held electronic devices, computer backup tapes, and circuit boards. Custom units are available for destroying books, bound documents, plastic bottles, and defective or obsolete products. The built-in conveyor automatically adjusts the feeding speed to prevent jamming. A rotary knife mill in the destruction chamber cuts the waste until the particles are small enough to pass through a steel sizing screen, and the user can determine the particle size by choosing the mesh of the screen. Components are stainless steel so drive magnets will not adhere. <span style="FONT-SIZE&#58;12pt;FONT-FAMILY&#58;&quot;Times New Roman&quot;;"></span></p> </div>
Data Reader<div class="body"> <div class="thumbnail"> <img title="" alt="" src="http&#58;//www.securitymanagement.com/sites/securitymanagement.com/files/Videx%20iBR9000_Photo%20copy.gif" width="144" height="120" /> </div> <p> <strong> <font color="#ff0000">Videx, Inc.</font> </strong>, of Corvallis, Oregon, has introduced the iBR9000 iButton reader. Small and lightweight, the miniature device reads the company’s iButtons. This collector measures 2 3/4 inches in length, weighs less than two ounces, and easily fits on a key ring. Built for demanding applications such as security guard tours, jail cell checks, and inmate tracking in correctional institutions, the fiberglass-reinforced nylon case and stainless steel read head withstand the impact of six-foot drops. The device provides an audible tone and its LED light flashes when it reads an iButton successfully. The memory allows users to store at least 9,000 reads before downloading data is needed. Powered by a standard three-volt lithium battery, the unit operates for a year or 75,000 reads between battery changes. <span style="FONT-SIZE&#58;12pt;FONT-FAMILY&#58;&quot;Times New Roman&quot;;"></span></p> </div>
Door Operator<div class="thumbnail"><img title="" alt="" src="/migration/PublishingImages/0612%20Mktplace_Arrow%20Lock%20copy.gif" width="144" height="100" /></div><p>The new 7700 Series Door Operator from <span style="COLOR&#58;rgb(255,0,0);"><strong>Arrow Lock</strong></span> of Salem, Virginia, is ideal for retrofit applications and converts interior doors that are not fire-rated to automated door openings. The unit is compliant with ADA requirements for handicap accessibility. A touch-free wall switch activates the door, offering hands-free convenience for entering and exiting. The low-energy device requires hard-wired installation with standard electric power. Models are also available with a plug-in power cord or radio frequency operation. </p>
Explosives Detection<div class="body"> <div class="thumbnail"> <img title="" alt="" src="http&#58;//www.securitymanagement.com/sites/securitymanagement.com/files/ICx%20Technologies%20Fido_S003%20copy.gif" width="144" height="306" /> </div> <p> <font color="#ff0000"> <strong>ICx Technologies </strong> </font>of Billerica, Massachusetts, has developed a new explosives detector under the Homeland Security Advanced Projects Research Agency Rapid Technology Application Program. The highly sensitive and lightweight Fido Scout can detect explosives under water. It is an enhanced version of the existing Fido-XT handheld explosives detector. New features include a four-button interface for quick operation and a rugged exterior for use in maritime environments, including submersion. The unit detects explosives using proprietary amplifying fluorescence polymers to detect trace levels of explosive materials at a level comparable to that achieved by highly trained canines. <span style="FONT-SIZE&#58;12pt;FONT-FAMILY&#58;&quot;Times New Roman&quot;;"></span></p> </div>
Financial Investigation<div class="body"> <p> <font color="#ff0000"> <strong>Fortent </strong> </font>of New York City has introduced an advanced case management tool to support its financial crime software suite. The new system allows banks, securities firms, and insurance companies to standardize and streamline the investigation process. Its built-in business logic is based on a set of industry best practice rules specific to the type of case, including fraud, employee theft, and money laundering. For each type of case, the system contains templates that identify and integrate the data elements and evidence. The solution allows multiple points of entry for cases, whether the source is a transaction monitoring system or an eyewitness account. It creates an electronic folder that can be tailored for an organization and that reduces human error. It can automatically populate Suspicious Activity Report forms for multiple regulatory bodies, including FinCEN in the United States, SOCA in the United Kingdom, and JAFIC in Japan. <span style="FONT-SIZE&#58;12pt;FONT-FAMILY&#58;&quot;Times New Roman&quot;;"></span></p> </div>
Health Data Security<div class="body"> <p> <font color="#ff0000"> <strong>Perimeter eSecurity </strong> </font>of Milford, Connecticut, has launched its protected health information offering, ePHISecurity. Entities covered under HIPAA now have access to an end-to-end security infrastructure with more than 50 preintegrated security services that are delivered over the company’s network infrastructure. It provides vulnerability defense, intrusion detection, e-mail defense, and secure e-mail, among other services. It includes a real-time, integrated client portal that enables organizations to manage, monitor, and audit their networks, security services, alerts, and trouble tickets around the clock. The company undergoes continuous third-party assessments, including SAS 70 Type II, Cybertrust True-Secure, and other certifications. <span style="FONT-SIZE&#58;12pt;FONT-FAMILY&#58;&quot;Times New Roman&quot;;"></span></p> </div>
Supply Chain Security<div class="body"> <p> <font color="#ff0000"> <strong>First Advantage</strong> </font> of Scottsdale, Arizona, provides supply chain security services to help customers make the best business decisions to mitigate losses and risks. Proven solutions apply sophisticated statistical and financial analysis to quantify cargo exposure during shipping. Experts develop countermeasures and cargo routing recommendations. The Quantitative Risk Solutions service helps corporations reduce loss uncertainty by providing loss forecasts, cost-benefit analysis, and detailed financial analysis on countermeasure programs. The company also offers facility risk assessment, with an evaluation of exposures facing a company, and assessment of risk in emerging markets. <span style="FONT-SIZE&#58;12pt;FONT-FAMILY&#58;&quot;Times New Roman&quot;;"></span></p> </div>