Product and Services Finder

Homeland Security Compliance

    
<  1  2  3  >
VisionAir  VisionAir began working with local law enforcement agencies in 1989 providing solutions to meet their mission-critical needs.
 
VisionAir Public Safety Suite The VisionAir Public Safety Suite provides software solutions to public safety communities across the United States.
Betrusted  Betrusted is a provider of security, identity and trust solutions to the world`s leading organizations.
 
UniCERT UniCERT is used by the world's leading organizations as a mission critical system, applying the same safeguards that exist for physical business to the...
Bardon Data Systems  Bardon Data Systems is a privately-held software publishing company.
 
WinU This softwre is a full Windows user-interface replacement with security access control, timeout, logging, web-browser monitoring, remote administration, and...
 
WinU Full Control Full Control is a complete Windows security access management system that has many features including: system stabilization, access control, remote...
 
Plumtree Software  Plumtree Software enables a suite of applications that coordinate human-managed activities across systems, processes and business boundaries. Features flexible and open portal system.
 
Heroes The Homeland Emergency Response Operations Systems is an enterprise Web application for planning, mitigating and managing all types of emergencies,...
NCX Group  NCX Group is a business risk management consulting firm focusing on information security, business continuity, and emergency management.
 
Security Compliance The GLBA requires financial institutions to establish administrative, technological, and physical safeguards to ensure the confidentiality and integrity of...
Steelcape  Steelcape makes the next-generation network protocol that augments the TCP/IP environment.
 
Steelcape Enterprise Server Steelcape Enterprise Server is a next generation transport protocol that Augments TCP/IP yet will not open susceptible ports in the firewall.
SAIC  Founded by Dr. J. Robert Beyster and a small group of scientists in 1969, SAIC, a Fortune 500 company, now ranks as the largest employee-owned research and engineering firm in the United States. SAIC and its subsidiaries...
 
Consequence Assessment Tool Set CATS emphasizes the calculation and analysis of consequences, not merely the display of hazard distributions. It contains models for converting spatial and...
 
GeoRover GeoRover software runs at all levels of ArcGIS software ArcView, ArcEditor, and ArcInfo software products and enables you to quickly and easily create,...
 
eCustoms  eCustoms provides scalable Global Trade Management and Compliance solutions that enhance the speed, flexibility, visibility and assurance of global supply chains, including Denied Party Screening, Restricted Party...
IRIS Corporation Bhd  IRIS Corporation Bhd is a manufacturer and designer of electronic secured documentation (ie. smart card, E-ID, electronic passport, drivers ID, ePP inlays) mobile card readers and card management systems.
 
SCR21U compact smartcard reader The SCR21U compact smartcard reader reads all chip-based card and electronic smart card and extra secure with SAM slot and ISO7816 compliant.
mini gadgets inc  Importer and manufacturer of spy gadgets like the World`s smallest pocket DVR, button cameras, camera binoculars, voice pen recorders. Wholesale to the trade only.
 
World`s smallest DVR with button camera If you`re looking for the smallest, lightest body worn, covert DVR with 640x480 30 fps recording device, we have the only one in the market that will...
Ross Systems / CDC  Ross Systems is a global provider of enterprise software solutions for the food and beverage, CPG, life sciences, chemicals, metals, natural products and other process industries.
Guidance Software, Inc.  Guidance Software is recognized globally as the world leader in eDiscovery and other digital investigations. Our EnCase software solutions provide the foundation for corporate government and law enforcement organizations...
 
Field Intelligence Model The FIM investigative platform consists of five core components.
LogPoint  LogPoint offers an advanced SIEM solution, delivering on Log Management, Compliance, Forensics, Operational Insight, Application Management, Information Security, ISO 27001, SOX, Advanced Persistent Threats, and SAP...
 
LogPoint SIEM & Log Management tool
<  1  2  3  >
More

Homeland Security Compliance Research Library

LogPoint Document
LogPoint
SIEM – or Security Information and Event Management. What is it? SIEM is the Information Technology version of Closed Circuit Television (CCTV). In short: a surveillance system of all data within an entire IT landscape in order to catch intrusions, provide insight into operations and report on functioning. Metaphorically, SIEM takes the most modern CCTV system and adds even more ...
 
communication Security (COMSEC) and secure information transfer
Shoghi Communications Ltd.
With more than 15 years experience in development and design of Customer specific Mil Grade Crypto system, Shoghi is a sincere partner for your requirements of end to end communication Security (COMSEC) and secure information transfer. We have strong experience in creating customer specific Algorithms and Key management schemes. All the hardware, inspite of all the complexities can be loaded by ...
 
Security Technology Comparison
Access Smart, LLC
Today, IT managers have a host of security management technologies available to them. While all these products have their advantages, if the incorrect technology is chosen and the solution is too complex to manage, then the computer network and data may actually be less secure than before.
 
A Cloud Security Poem: The SPYder and the Guy
Access Smart, LLC
The world is abuzz about the cloud. Articles are written daily about how cloud computing with lower IT costs, increase revenues and make employees more productive. However, there are an equal number of articles warning about the security risks, liabilities and data mining of customers. Read a whimsical poem based on the “Spider and the Fly” that warns of the security side of the cloud.
 
Ensuring Compliance with PCI Security Standards
INetU, Inc.
Ensuring compliance with PCI Security Standards: Understand how hackers hack and how to protect your business and your customers Executive Overview At online retailers and merchants of every variety, CIOs and IT directors spend a great deal of time and costs in an effort to become — and remain — PCI compliant. And with good reason. Thousands of data breaches are reported every year. Data theft ...
 

Homeland Security Compliance Video

B2B Integration and Homeland Security GXS Steve Keifer, GXS Vice President of Marketing, explains the critical role that B2B integration technologies play in Homeland Security. He cites examples ...
 
LogPoint Product Presentation LogPoint Presenting LogPoint. LogPoint provides its clients with unique analytic capabilities, and insights presented in customizeable dashboards. Further, ...
 
Homeland Security Compliance AvaLAN Wireless Technology

Homeland Security Compliance News

Homeland Security Compliance Interax Group, Inc. Products
Homeland Security Compliance IT Asset Management Group Company
Copyright © 2014, Questex Media Group LLC
Company descriptions and contact information are quoted from the company's website or other promotional information. Questex is not responsible for the accuracy of this information. Unless specifically noted, Questex is not sponsored by, affiliated with or otherwise connected with any of the listed companies.