Home Technology and Products Archive by category Intrusion Detection (Page 3)

Intrusion Detection

ELAN: A Pioneer in Security Solutions

Founded in 1986 and located in the heart of Italy, ELAN has established itself as a leading player in the security market. Renowned for its high-quality, “Made in Italy” products, the company ensures constant stock availability for prompt delivery, setting itself apart in both Italian and international markets. With a portfolio of over 400 products […]

ASSA ABLOY Acquires Roger in Poland

ASSA ABLOY has acquired Roger Sp. z o.o. sp.k., a Polish manufacturer of on-premise electronic access control systems and related hardware. “I look forward to welcoming Roger into the ASSA ABLOY Group. This acquisition delivers on our strategy to add complementary products and solutions to our core business,” says Nico Delvaux, President and CEO of […]

CyberKnight appoints Samir Omar as GM Sales for KSA

CyberKnight, a leading cybersecurity value-added distributor (VAD) in the META region, is pleased to announce the strategic appointment of Samir Omar as GM Sales for Saudi Arabia. This key hire reflects CyberKnight’s commitment to expanding its presence in the Kingdom, building on its established leadership in the cybersecurity market, and addressing the increasing demand

Axis Launches First FIPS 140-3-compliant Device

With the introduction of the AXIS Q1809-LE Bullet Camera, Axis starts delivering on its promise to provide FIPS 140-3 Level 3-compliant products under the Federal Information Processing Standards. The FIPS 140-3 standard specifies security requirements for cryptographic modules that process and ensure the confidentiality and integrity of data. The move improves the

Why Deploy Radar for Wide-area Surveillance Monitoring

An industry leader in the application of radar technology for security surveillance, 360 Vision Technology, the UK manufacturer of rugged HD, hybrid, radar and thermal imaging cameras, is at the forefront of cost-effective radar technology suitable for a broad spectrum of high-security monitoring applications.  “Traditionally, the use of radar systems has been considered