Page 66 - Security Today, February 2017
P. 66

PRODUCT
Safe Monitoring Device
Installed through WiFi
SAFELERT is the newest innovation in smart de- vices to help monitor your safe and works on any safe brand. This compact, battery-powered moni- toring device is easily installed inside your safe using your Wi-Fi system. When your safe’s condi- tions change (movement, rise in temperature, hu- midity level, door opening, etc.), SAFELERT detects and sends alerts (via texts or emails) directly to you. Best of all, there are no monitoring fees for life! Set up is easy. Install the batteries into the SAFELERT device and activate the SAFELERT sys- tem with a few simple steps on any web browser. Once signal is confirmed, set it inside any safe and you have instant peace of mind. It’s really that easy. Liberty Safe.
Go to sp.hotims.com and enter 331 for product information.
All-in-One Package
Designed to simplify integration
Connected Technologies has released the Connect ONE Commercial All in One Package. Designed to simplify systems integration, the solution is com- pletely turnkey out of the box with access control, intrusion, HVAC and lighting control, temperature monitoring and video verification. The robust, cloud-hosted offering includes eight doors (ex- pandable) of access control using ScanPass Mobile Credentials, 10,000 users, eight zones (expand- able), more than 200 time schedules and rules- based engines that make it easy to configure and customize. Connected Technologies.
Go to sp.hotims.com and enter 332 for product information.
6-Bay NVR
Designed for mid-sized surveillance
Promise Technology’s Vess A2330 is a 2U 6-bay
NVR that offers low latency recording for entry- level deployments of up to 35 cameras per system. The Vess A3340 is a powerful 2U 8-bay NVR de- signed for mid-sized surveillance deployments of up to 80 IP cameras. Promise’s line of Vess NVR appliances are purpose built for video surveillance environments and feature a range of proprietary technologies that enable the systems to handle a much higher number of IP cameras than competing solutions. Promise Technology.
Go to sp.hotims.com and enter 333 for product information.
Infrared Imaging System
For tactical airborne applications
L-3 Communications announced their smallest and lightest electro-optical/infrared (EO/IR) airborne im- aging system, the MX-8. The MX-8 is designed for small tactical UAVs, light manned Intelligence, Sur- veillance and Reconnaissance aircraft, and tactical aerostats requiring high-performing imaging solu- tions. The MX-8 is a key addition to WESCAM’s MX- Series product line, as it addresses the growing demand for a lightweight, high-fidelity imaging system. The emphasis on developing advanced technologies that address smaller form factor re- quirements is reflected in the versatility and preci- sion of this product. L-3 Communication.
Go to sp.hotims.com and enter 334 for product information.
Powerline Adapter
Uses physical lines to connect directly
Yale Locks & Hardware’s nexTouch Keypad Access Lock is the next generation of keypad access con- trol. This ANSI/BHMA Grade 1 certified cylindrical lock is a simple access control solution that can be easily upgraded with plug-in technology modules to meet a variety of applications. Other features include privacy mode, enabling the exterior keypad to be temporarily disabled by the user from the in-
side; 9V battery power backup, which allows the lock to be recharged with just the touch of a bat- tery; and support of up to 500 user codes, easily managed with effortless voice-guided program- ming. Yale Locks & Hardware.
Go to sp.hotims.com and enter 335 for product information.
Healthcare Security Platform
Uses advanced artificial intelligence
Cognetyx has developed a patented “Ambient Cog- nitive Cyber Surveillance” system that empowers the healthcare industry with a breakthrough solu- tion to predict, detect and mitigate security threats, data breaches and privacy violations in real time. The Cognetyx security platform is both HIPAA and HITECH compliant. Cognetyx uses advanced artifi- cial intelligence to provide cognitive decision sup- port on detection of anomalous users interacting with any application—a new, virtual defense shield—to shift the odds of success in favor of the defender against cyber security threats. Cognetyx.
Go to sp.hotims.com and enter 336 for product information.
Social Media Monitoring
Now includes child monitoring
50
0217 | SECURITY TODAY
SOLUTIONS
CSID announced that their Social Media Monitoring product now includes child monitoring services. This important addition lets businesses enable subscrib- ers with children to monitor privacy and reputational risks, cyber bullying, weapons references, and sexual predator activity for their child’s Facebook, Twitter and Instagram accounts. Social Media Monitoring empowers parents to defend against the growing threats across social media. Social Media Monitoring is available to businesses as a white-labeled solution, and can be rapidly customized and deployed via CSID’s Identity Management Center (IMC). CSID.
Go to sp.hotims.com and enter 337 for product information.

































































   64   65   66   67   68