Page 82 - Security Today, April 2017
P. 82

PRODUCT
66
0417 | SECURITY TODAY
SOLUTIONS
Panoramic Camera Series
Delivers new features in smaller size
Arecont Vision expanded their popular Surround- Video panoramic indoor/outdoor camera series with fifth generation models that deliver important new features in a smaller size. SurroundVideo pan- oramic cameras provide four integrated lenses in either 180-degree or 360-degree configurations. The new SurroundVideo G5 Mini panoramic camera series delivers 12- and 20-megapixel (12 or 20MP) resolution at double the frame rate of previous models. The G5 Mini is also approximately 50 per- cent smaller than previous SurroundVideo models. Arecont Vision.
Go to sp.hotims.com and enter 329 for product information.
Fingerprint Biometrics
Runs on low power microcontrollers
Neurotechnology released FingerCell 3.0, a soft- ware development kit (SDK) for fingerprint recogni- tion solutions that run on low-power, low-memory microcontrollers. FingerCell can extract a finger- print template using less than 128KB of memory, enabling it to be used in compact devices that have limited on-board resources. It can also be used in various logon subsystems and small device com- ponents that can be integrated into cars and home electronics, among others. Neurotechnology.
Go to sp.hotims.com and enter 330 for product information
12 MP Fisheye Camera
Provides panoramic video
The new Illustra Pro 12MP Fisheye provides high quality 360° or 180° panoramic video. The cam-
era’s ePTZ movements are ultra-smooth, creating even transitions between pan, tilt, and zoom move- ments, while onboard dewarping technology pro- vides distortion-corrected video streaming. The camera’s integrated IR illuminator provides high- quality video up to 15 meters in even the worst lighting conditions. Tyco Security Products.
Go to sp.hotims.com and enter 331 for product information.
Vulnerability Identification
Empower C-suite to makes decisions
and create nine resident barcodes or 15 using La- bel Editor Professional software plus import images and label files to print on the go. K-Sun Corp.
Go to sp.hotims.com and enter 333 for product information
Vulnerability Analysis
Automatically installs
The CAIRA is designed to identify and quantify vul- nerabilities and risks associated with applicable Critical Infrastructure systems being subjected to various natural and manmade threats. By identify- ing single-points of failure, threat likelihood and frequency of occurrence and an asset’s resiliency factor or time to recovery and return to normal op- erations the C suite is empowered to make in- formed decisions, set priorities, and develop future plans, projects and programs needed to remediate, mitigate to its lowest level or accept the risk. Haines Security Solutions.
Go to sp.hotims.com and enter 332 for product information
Industrial Label Maker
Create durable, custom labels
Stat! from Code Dx is a software vulnerability anal- ysis and management tool that automatically in- stalls and runs up to 15 open-source static applica- tion security testing (SAST) tools against your software. Just feed your code into Stat! and it will select, configure and run SAST tool(s) based on your code’s languages, and check the vulnerability status of third-party libraries. Its management con- sole lets you view security and quality weaknesses, then rapidly triage, prioritize, assign them for reme- diation, and track their status. CodeDx.
Go to sp.hotims.com and enter 334 for product information
Risk Detection
Quantitatively measure threats
K-Sun Corp. introduces the Epson LABELWORKS PX LW-PX700 industrial label maker for creating du- rable, custom and compliant labels, wire markers and more up to 1” wide. The rugged LW-PX700 la- bel printer, engineered to meet MIL-STD 810 “drop” test specifications for the toughest environments
The ABRA process quantitatively measures threats, asset criticality, vulnerabilities, and associated risk from both the owner and the threats perspective. It identifies the current vulnerability and risk level of a given asset - a “snapshot in time” and then identi- fies optimized (improved) levels with the theoretical implementation of specified countermeasures and improvements to the security features of the asset. Decision-makers can then allocate funds for solu- tions they know will be effective in the protection of personnel and facilities. Haines Security Solutions.
Go to sp.hotims.com and enter 335 for product information

































































   80   81   82   83   84