Filtered By
Hardware/SoftwareX
Hardware or Software? [filter]
Counter Terror ExpoX
Trade Show [filter]
Results
22 Total
1.0

Cell-Seeker

Document

it l Cell-Seeker Network Mapping System Cell-Seeker is the essential tool to independently monitor or map multiple mobile networks. By continuously scanning all available networks and recording th...
1.0

Athena

Document

Version 4.8 release incorporates exciting new capabilities and developments which further enhance the "Ease of Use' experience. SMARTPHONE APPS SEARCH & USER EXPERIENCE With the continuing proli...
1.0

TACS, TME, SAMS, ANT, Covert Audio Listener, Personal Tracker, ANT Watcher, TVC 3000, TMC 1450, Mercury, Guardian, TAVLS

Document

t I ERR FIX TERRAFIX TERRAFIX TERRAFIX TERRAFIX TERRAFIX TERRAFIX TERRAFIX TERR FIX MOBILE & PERSONAL SECURITY SYSTEMS PROVIDING INTELLIGENCE SURVEIL NCE PROTECTION Security Solutions Terrafi...
1.0

Scanlock M3, SuperBroom, Tracer III, CMIS-09

Document

~.:;!:JIOTCL ) INTERNATIONAL Audiotel lncerna1ional has been market leader in 1he security sector for over 30 years. manufacturing innovative products to mee1 the needs of Commercial, Defence, L...
1.0

Raptor RXi, Hawk XTS-2500

Document

Welcome Winkelmann is a global provider of specialist search equipment, communications security and technical surveillance countermeasures (TSCM), we are the proven and trusted partner of governme...
1.0

Talon, VeriPlate, VISCE, iC320, C320, V220, V1, VP-300, SC-IV, Sabre, TG-X200

Document

Foreword from Alan Quinn CEO With high-quality, innovative Automatic Number Plate Customer care is central to our dynamic work ethic with Recognition (ANPR) and Mobile Data solutions at the a t...
1.0

AFIANT

Document

AST ...9: ;.sysBe!-ns ~lobalsatellite eommuni~atiens Remote Site Network Camera I Background Or Streaming AFIANT Satellite CCTV Camera lnternet \ GPRS, 3G, CDMA HSDPA, WI FI Leased Line, AD...
1.0

Homeland Security

Document

Today's security threats are mobile. EXFO's communication intelligence solutions are designed to quickly detect and help eliminate such threats. Our product portfolio includes portable units, with ...
1.0

Forensic Phone Analyser

Document

,. FPA~ FCIRE:nSICPFtTHWFtYS FORENSIC PHONE ANALYSER FI WCJRLCJ OF E-CJISCCJUERY Telecommunications Data: Automated Exploration, Search, Analysis & Reporting - A Big Data Exploration Tool. Thes...
1.0

MIPS

Document

Modular IP Probing System (MIPS) RCS IP probing system General Features MIPS is the RCS range of high-end Internet probes, designed for use in large static capture systems installed at the Network ...
1.0

VESPer

Document

MISSION & SECURITY SYSTEMS Superior understanding of complex terrain VESPer is a modular, multispectral, three-dimensional (30) mapping capability that provides rapid, precise and understandable ...
1.0

Raptor RXi

Document

Features • Scans 26GHz in less than 4 seconds at 3kHz resolution (approximately 100,000,000 samples per second) • Full span spectrum analyzer display, 6GHz, 1OGHz and 26GHz models available • Full ...
1.0

LIDAR

Document

J\ Environment mapping for live operations Arithmetica Main applications: • Advanced situational awareness LIDAR and point clouds Laser Imaging and Detection Ranging (UDAR) scanning is widely us...
1.0

Scanlock M3

Document

Protecting you and your intelligence Designed to counter the latest advances i n eavesdropping devices, the Scanlock M3 will keep your secrets safe. The Scanlock M3 is able to search and locate sig...
1.0

Scanlock M3, Room Guard, Casino Guard, Meeting Guard

Document

~a::;!:llOTi::L ) INTERNATIONAL ! The inte l ligence to protect Technology used by insurgents and terrorists is increasingly sophisticated and readily available; countering this threat requ...
1.0

TerraTrack, TVC 4000, AnT, TAMS

Document

ERR FIX TERRAFIX TERRAFIX TERRAFIX TERRAFIX TERRAFIX TERRAFIX TERRAFIX TE RAFI . WOULD YOU LIKE TO KNOW WHERE YOUR ASSETS ARE? CREATE REPORTS ON SPECIFIC ACTIVITIES? WITH TerraTRACK vou CAN. ...
1.0

Fox Files, DataDiode, InTell

Document

NR 1 MARCH 2013 COLUMN The Hypocrisy of Ethical Hacking lt seems such an interesting idea: 'ethical' hackers who guard our vulnerable data bases containing privacy-sensitive data . Surely there ...
1.0

Forensic Image Analyser

Document

FIA° FORENS I C I MA GE ANALYSER A FCJREnSICF'ATHWFtt..r'S WDRLD OF E-DISCDUERY Millions of Images to handle? Which Mobile Phone or Camera created which Digital Image? Forensic Image Analyser u...
1.0

Forensic Digital Exchange

Document

Fox·.: FCJREnSIC P~THW~LrJS FORENSIC DIGITAL EXCHANGE FI WORL.Cl OF E-CllSCOUERY The ultimate Information Management system fo r High Tech Crime Labs. What is FOX? FOX - A Triage Management syst...
1.0

Control Room Solutions

Document

ELECl:iRDSDNIC Control Room Solutions Control Room Solutions Electrosonic's control rooms team offers a complete and cost effective service from system design through to commissioning, maintenanc...
1.0

Control Room

Document

r I SERVICE & MAINTENANCE Electrosonic understands the critical nature of control rooms and the consequences if they underperform. Electrosonic's dedicated service team offers tailored , high q...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh