Product and Services Finder

Security Robots

    
<  1  2  3  4  5  6  7  >
Demo Company  Smarter than the average human bouncer, Security Robots come in two models: Tough Guy and UltraK9.
 
Personal Security Smarter than the average human bouncer, Security Robots come in two models: Tough Guy and UltraK9.
Openware Robotics  Mobile robotic surveillance is an idea that has come and is growing rapidly. In 2002, Openware Logistx, began the ExplorBot program, initiated to develop a robust, portable, low-cost, semi-autonomous robot for...
 
Explorbot The Explorbot is an intelligent mobile surveillance system. The robot incorporates many state-of-the-art technologies and can be used in a wide variety of...
Hi-Tech Robotic Systemz  Hi-Tech Robotic Systemz is a high-technology independent systems venture committed to the cause of development of innovative revolutionary solutions for diverse fields.
 
Abhigya Development of a scalable distributed surveillance system for military and civilian applications, which will help the user in real time surveillance using...
Abtrusion Security  Abtrusion Security develops and sells software products for intrusion and virus protection on the Windows platform. The company also provides services related to intrusion protection and corporate information security....
RSA Security  RSA Security helps organizations protect private information and manage the identities of the people and applications accessing and exchanging that information.
Next Generation Security Software  NGS (Next Generation Security) Software, headquartered in Sutton, Greater London in the United Kingdom, is the trusted supplier of expert software and services to large enterprise environments and governments throughout...
Clarifying Technologies  Clarifying Technologies is a professional products and services company serving the law enforcement and security communities, as well as their missions.
 
Clarifying Climber Robot Clarifying Technologies offers the Clarifying Climber, a revolutionary new remote-controlled robot. The Climber easily scales many smooth and uneven...
 
Static Attractor Here is a vortex-powered multi-surface attachment device called the Static Attractor. It will hold nearly a pound of weight on practically any surface for...
Cybermotion  Cybermotion has been designing, manufacturing, selling, and supporting mobile robot systems since 1984.
 
I-Con Monitor and control up to 8 CyberGuard security vehicles and hundreds of fixed alarms, automatic doors, and elevators from a single remotely located...
 
NavMaster Our autonomous mobility platform, Navmaster, is the basis of our security robot as well as other applications requiring autonomous mobile operation.
 
Remotec  Remotec is the world leader in providing mobile robot systems and remotely operated vehicles for use in hazardous duty operations.
 
Andros F6-A The Anros F6A features a unique, articulated track chassis that allows it to operate over rough terrain, cross obstacles and ditches, climb stairs, and...
Bluefire Security Technologies  Bluefire Security Technologies develops mobile and wireless security software that protects handheld devices and data.
Quadratec  Our philosophy is to work closely with our clients with a focus on project management from design, through manufacture to commissioning.
 
Mosro 1 Mosro is a cost effective, indoor, autonomous surveillance robot that has been produced for where either manned or CCTV surveillance is too dangerous,...
 
Mosro Mini Mosro Mini is the world's first cost-effective surveillance robot for home use. The mobile robot protects your premises and relays information and images...
 
Robowatch  Robowatch Technologies was founded in 2000. Robowatch Technologies won the 'Founder Champion 2002' prize in Germany.
 
Mosro 1 Mosro's security tasks are as diverse as their application areas and locations. No matter what the situation, Mosro recognizes, watches, and alarms.
Internet Security Alliance  Internet Security Alliance was founded in 1999 by a group of Internet security experts and incorporated in 2000. A privately held company located in Bloomfield Hills, Michigan, it offers a system that enforces security in...
<  1  2  3  4  5  6  7  >
More

Security Robots Research Library

University Security Assessment
Dell SecureWorks
This report contains the analysis of network traffic for University XYZ from March 25th through March 27th 2004. Log files were obtained from the University in order to identify threats to the security and performance of the network. Included in the set of logs to be analyzed were signature alert logs, port scanning logs, and out of specification (OOS) logs. Signature alert logs identify traffic ...
 
Top 10 Information Security Threats for 2010
Perimeter E-Security
2010 is upon us. I am amazed that it has been a decade since all the fear and speculation of Y2K. Take a moment to review your personal technological transformation in the last 10 years. Were you using a mobile phone 10 years ago? Could you live without it today? How about how far the Internet has come and your reliance upon it? Did you ever imagine you would use technologies like Facebook and ...
 
Top 10 Information Security Breaches & Blunders of 2009
Perimeter E-Security
2010 is upon us. I am amazed that it has been a decade since all the fear and speculation of Y2K. Take a moment to review your personal technological transformation in the last 10 years. Were you using a mobile phone 10 years ago? Could you live without it today? How about how far the Internet has come and your reliance upon it? Did you ever imagine you would use technologies like Facebook and ...
 
VoIP Security Vulnerabilities
Dell SecureWorks
Since the dawn of time, humans have tried to communicate with eachother. As languages and dialects prospered, the forms of communication became more advanced by using letters in various alphabets and writing messages on papers or letters. From the Caeser cipher that Julius Caesar used where letters in encrypted messages were actually three letters off, to the Nazis in WWII who built and used the ...
 
Tenable Network Security Support Portal
Tenable Network Security
This document describes the many different functions of Tenable’s Support Portal. Customers who have purchased a Nessus ProfessionalFeed or use the SecurityCenter have access to the Tenable Support Portal located at: https://support.tenable.com/support-cent er/ The Tenable Support Portal allows Tenable’s customers to: > Manage and maintain product Activation Codes > Download Tenable software, ...
 

Security Robots Video

168 Point Inspection for Used Robots RobotWorx Here at RobotWorx, we put every used robot through a 168 point inspection with vigorous testing before we program and integrate them. Our reconditioning ...
 
Information security begins with Cyber Authentication Access Smart, LLC What do you get when you purchase the Power LogOn Administrator Starter Kit from Access Smart. Information security begins with cyber access control, and ...
 
Security Robots iCore Networks, Inc. Information

TechWatch News

Security Robots Centage Products
Security Robots CGI Products
Copyright © 2014, Questex Media Group LLC
Company descriptions and contact information are quoted from the company's website or other promotional information. Questex is not responsible for the accuracy of this information. Unless specifically noted, Questex is not sponsored by, affiliated with or otherwise connected with any of the listed companies.