BlueRISC

WindowsSCOPE

BlueRISC’s enhanced WindowsSCOPE reverse-engineering, cyber analysis and defense, and memory forensics tool suite includes the ability to analyze any computer on a network or cloud transparently through its Phantom Probe Agent technology. The agent technology allows retroactive tracking of advanced cyber-threats across all computers in a network over time. The view of a network’s threats at each individual node enables determining what critical infrastructure, data and intellectual property has been at risk or been compromised and at what time.



    Featured

    Webinars

    New Products

    • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

      Connect ONE®

      Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

    • Camden Door Controls ‘SER” Surface Boxes and Extension Rings

      Camden Door Controls ‘SER” Surface Boxes and Extension Rings

      Camden Door Controls has introduced new ‘SER” surface boxes and extension rings that provide a complete solution for new construction. In addition, they provide a simple and robust solution when replacing round wired and manual push plate switches with either Camden’s wired or wireless SureWave™ no-touch switches or Kinetic™ no-battery wireless switches. 3

    • A8V MIND

      A8V MIND

      Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3