Security Foiling Limited

MicroPOISE™ MK3

MicroPOISE MK3

Security Foiling Limited launched their latest hologram application system for high value security documents, the MicroPOISE™ MK3 at the Security Document World event in London, UK. The system secures documents with holograms as they are issued. It records the document ID using barcode or QR code. It identifies which individual hologram is applied, and then links that hologram to the document record. The issuing officer accesses the system using fingerprint control; the issuing officer and issuing location are then recorded and linked to the document. Data can be output into government systems for audit and authentication purposes.


    Featured

    New Products

    • Unified VMS

      AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

    • EasyGate SPT and SPD

      EasyGate SPT SPD

      Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

    • A8V MIND

      A8V MIND

      Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.