April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Security Services

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information

In 2016 almost 1.1 billion identities were stolen globally.  This number is up dramatically from a reported 563.8 million identities stolen in 2015.   In addition, the same Symantec Internet Security Threat Report placed the United States at the top of the list for both the number of breaches by country (1,023) and the number of identities stolen by country.

New York State’s Division of Financial Security and other government entities around the globe have been monitoring this increased cybercriminal threat and determining means to help protect the private information of individuals as well as the information technology systems of regulated organizations.

New York State’s Division of Financial Security released new cybersecurity requirements (23 NYCRR 500), directly affecting the way that financial data is managed going forward. Applicable to financial services companies operating in New York State, these regulations declare that, on an annual basis, financial firms are required to prepare and submit a Certification of Compliance with the NY DFS Cybersecurity Regulations to the superintendent, commencing on February 15, 2018.

The scope of this legislation describes measures related to: cybersecurity programs and policy, personnel, resources and training, penetration testing and assessments, audit trails, access privileges, application security, third parties, NPI (Non Public Information) encryption, data retention, incident response and notification.

Among other requirements, this regulation dictates that companies declare any cyberattack to the superintendent within 72 hours. In the past, many companies chose to not disclose information related to these hacking exposures because much of their cost stems from damage to brand reputation and the necessary steps required to rebuild the trust of their clients post-attack.

Similar to the NY DFS proposal, the Federal Reserve Board (FSD), the Office of the Comptroller of the Currency (OCC), and the FDIC issued an advance notice of proposed rulemaking (ANPR) on enhanced cyber risk management and resilience standards for large banking organizations.  Additionally, the states of Vermont and Colorado have released laws pertaining to cybersecurity and the improved protection and monitoring of data. 

Two technologies specifically called out in the new NYS DFS Cybersecurity requirements, Multi-factor Authentication (MFA) and Risk Based Authentication (RBA), are key methods of complying with regulation and defending against attacks. 

Multi-factor authentication is defined as using at least two factors to authenticate a person, generally a combination of:

  • “Something I Have” — this could be a hardware token, a mobile soft token, etc.
  • “Something I Know” — like a PIN code, a password, and
  • “Something I Am” — such as a fingerprint or face recognition.

With MFA, the two factors are fully independent from each other (i.e. the failure of one factor would not compromise the other one).

Risk based authentication is the capacity to detect anomalies or changes in the normal use patterns of a person as part of the authentication process, require additional verification if an anomaly is detected to avoid any breach.

It is more efficient to avoid hacking and cyber-attacks in the first place by focusing attention on the security of the applications being accessed, both externally and internally.  To learn more about these regulations and how similar standards will impact you, visit www.hidglobal.com/iam.

Senstar Introduces the Senstar LM100 Lighting and Sensing Solution

New first of its kind perimeter security product to be on display at ASIS 2017 Booth 4296

Dallas, Texas (ASIS 2017) – September 26, 2017 - Senstar today introduced the Senstar LM100, the world’s first intelligent perimeter lighting and sensing solution. Combining two key security functions in one cutting-edge product, the LM100 acts as a powerful deterrent against intruders, detecting and illuminating them at the fence line while alerting a security management system (SMS). 

 “The Senstar LM100’s specially-engineered LED lighting was specifically designed for perimeter security applications and optimized for use with CCTV camera systems,” said Product Manager Todd Brisebois. “With its ability to sense vibrations caused by attempts to cut, climb or break through the fence, the LM100 is a highly effective tool for protecting property and assets from theft and vandalism.”

Consisting of luminaires mounted along the fence, the Senstar LM100 uses wireless self-healing mesh communication network technology to relay intrusion information enabling the system to operate in a coordinated fashion and resulting in robust site-wide security. When networked, the LM100 reports intrusion attempt locations to the site’s SMS to enable a directed response.

The Senstar LM100 provides configurable, localized, uniform lighting allowing cameras to operate with a higher dynamic range, and ensuring objects and people are illuminated while avoiding the generation of dark silhouettes in front of bright backgrounds. Its Color Rendering Index (CRI) of 70+ brings out critical details that enhance video analytics.

The Senstar LM100 is easy to install and maintain, environmentally-friendly, and is suitable for sites of all sizes as a standalone or complimentary perimeter security system.

For more information about the Senstar LM100, click here, or for a live demonstration, visit Senstar at ASIS 2017 Booth 4296. Also on the Senstar booth, check out our other perimeter intrusion detection products, and our video management systems and analytics.

About Senstar Corporation

Senstar has been safeguarding people, places and property with the world’s largest portfolio of perimeter intrusion detection sensors for over 35 years. Now combined with world-class video management systems and analytics (formerly Aimetis), Senstar offers a comprehensive suite of proven technologies that work together to reduce complexity, improve performance and unify support.

www.senstar.com  www.YouTube.com/SenstarCorp  Twitter: @SenstarCorp

For more information, please contact:

 

Miriam Rautiainen Director of Marketing

+1 613 839 5572 ext. 4357

Cell: +1 613 878 3905

[email protected]

Senstar Announces Transition to Bring Aimetis Under the Senstar Brand

Company also introduces new integration of Network Manager alarm reporting system and Symphony™ video management system

Dallas, Texas (ASIS 2017) – September 26, 2017 - Senstar today announced the beginning of a transition period to bring Aimetis under the Senstar brand. Senstar, a world leader in perimeter intrusion detection systems (PIDS), acquired Aimetis, a world leader in video management systems (VMS) and analytics, in April 2016. Since that time the two companies have worked in parallel to continue to provide market-leading PIDS and VMS solutions, but over the coming months, Senstar and Aimetis will become one company, resulting in reduced complexity, improved performance, and unified support.

“Bringing together the PIDS expertise of Senstar with the VMS and analytics knowledge of Aimetis enables us to offer an unrivaled range of innovative security solutions and world-class support,” said Senstar President Brian Rich. “Throughout the transition period we are committed to ensuring as little disruption as possible to our business. Our customers and partners can expect the same accessible, responsive and flexible sales and support they have always relied on, and to be well-informed regarding any changes that may affect them.”

The combination of PIDS and VMS addresses a growing trend in the security industry to reduce complexity by enabling customers and partners to source comprehensive security solutions from a single provider, resulting in reduced costs and greater accountability.

Senstar is also pleased to introduce the integration of its Network Manager alarm reporting system and Symphony VMS (formerly Aimetis). Network Manager is a software gateway that allows communication with a wide array of Senstar sensors, including FlexZone®, FiberPatrol®, OmniTrax®, and UltraWave™. Symphony, the new benchmark for intelligent video management, is an ideal software solution for recording, monitoring and analyzing video from both single server installations and multi-server deployments.

The integration enables Symphony to receive the full range of alarm and status information from Senstar sensors via an IP connection. For each sensor alarm the full range of Symphony’s security responses can be initiated, including commanding camera actions and providing visual and audio alerts.

To learn more about the transition and the integration, and to check out our market-leading PIDS and VMS products, including the new Senstar LM100™ perimeter lighting and sensing solution, visit Senstar at ASIS 2017 Booth 4296.

About Senstar Corporation

Senstar has been safeguarding people, places and property with the world’s largest portfolio of perimeter intrusion detection sensors for over 35 years. Now combined with world-class video management systems and analytics (formerly Aimetis), Senstar offers a comprehensive suite of proven technologies that work together to reduce complexity, improve performance and unify support. 

www.senstar.com  www.YouTube.com/SenstarCorp  Twitter: @SenstarCorp

For more information, please contact:

Miriam Rautiainen Director of Marketing

+1 613 839 5572 ext. 4357

Cell: +1 613 878 3905

[email protected]

VIVOTEK Showcases the Latest IP Surveillance Solutions at ASIS 2017

San Jose, September 25, 2017 – VIVOTEK, the global leading IP surveillance solution provider, today presents the latest IP surveillance solutions at ASIS 2017, September 26th to 28th in Dallas, Texas (Booth #3863, Kay Bailey Hutchison Convention Center). Drawing in more than 550 exhibitors and over 22,000 security professionals, ASIS has been the premier event for security professionals worldwide, providing industry-leading education, countless business connections, and the latest products and services that shapes the future of the security industry.

VIVOTEK’s booth at ASIS will exhibit its latest technology in surveillance security that includes H.265 to H.264 solutions, panoramic solutions, compact solutions and cameras with enhanced cyber security application.

Extensive H.265 to H.264 Solutions: VIVOTEK introduces a lineup of network cameras ranging from 2 to 12-Megapixels, compatible with H.264 or H.265 compression technology. What makes VIVOTEK’s H.265 solutions stand out from others in the field is the bandwidth and storage saving technology, Smart Stream II. By adopting VIVOTEK’s Smart Stream II and H.265 technology, users will benefit from reduced bandwidth and data storage demand by up to 80% more than other systems using H.264. Models exhibited include FD8169A, FD836BA, FD9171-HT, FD8377-HW, FD9181-HT, SD9161 and MS8391-EV.

180 Degree to 360 Degree Panoramic Solutions: VIVOTEK’s panoramic solutions are designed with multiple sensors or fisheye lens providing higher resolution, maximizing the field of view and ultimately reducing the total number of cameras required, conclusively saving on installation costs. This solution can monitor full horizontal views and deliver high-quality comprehensive coverage, making it an ideal outdoor surveillance solution with sharper and more detail images. Models on display include FE9182-H, FE9181, MA8391-ETV, MS8392-EV, FE9382-EHV, CC8371-HV, CC8370-HV and MS9390.

Compact Surveillance Solutions: VIVOTEK demonstrates a wide range of cameras focused on discretion and compact in size, including FE8182, FE8180, FD8366-V, FD816CA-HF2, FD8166A-N, IB8369A, IB8360-W, and IP8160-W. This diverse range of

inconspicuous surveillance for indoor or outdoor use is ideal for retail operations, banks, restaurants, offices and other public areas.

Enhanced Cyber Security Application: Recognizing the growing risks of cyber security, VIVOTEK unveils its first cyber security solutions with the Trend Micro Incorporated, a global leader in cyber security solutions during ASIS. The specific models of VIVOTEK’s network cameras are armed with Trend Micro’s IoT Security Software, making it a robust and enhanced cyber security IP surveillance solution to secure both public and data safety.

VIVOTEK invites you to visit their booth, #3863 at ASIS International in Dallas, Texas, September 26th to 28th. Discover VIVOTEK’s new and comprehensive security solutions in HD and megapixel IP surveillance cameras and ask knowledgeable VIVOTEK’s sales representatives questions about your surveillance needs and how you can See More in Smarter Ways with VIVOTEK’s cameras.

For more information about VIVOTEK and its extensive product      lines, please visit: www.vivotek.com.

About VIVOTEK

VIVOTEK Inc. (TAIEX: 3454) was founded in Taiwan in 2000. The Company markets VIVOTEK solutions worldwide, and has become a leading brand in the global IP surveillance industry. Its comprehensive solutions include network cameras, video servers, network video recorders, PoE solutions, and video management software. Through the growing proliferation of IoT, VIVOTEK aspires to become the Eye in IoT by drawing on its expansive technological capabilities in image and audio. The Company has established offices and subsidiaries in the United States (California), Europe (Netherlands), India (Delhi), Middle East (Dubai), and Latin America (Mexico) in 2008, 2013, 2014, 2015, and 2016, respectively.      To create a sound industrial ecosystem, VIVOTEK has expanded strategic alliances with leading international software and hardware partners and works with over 183 authorized distributors across 116 countries. For more information, please visit www.vivotek.com.

Media Contact:  Monica Barragan

Email: [email protected]

Hikvision’s ‘Partner.Win.’ Ad Campaign Accentuates Winning Moments, Debuts At ASIS 2017

Hikvision partners rely on Hikvision field support to win before, during and after the sale

 

 DALLAS—Sept. 25, 2017—Hikvision USA Inc., and Hikvision Canada Inc., the North American leaders in innovative, award-winning video surveillance products and solutions, today, on the first day of ASIS 2017, introduced its new “Partner.Win.” advertising campaign, which is focused on how the Hikvision team works with its partners to win business and garner customer loyalty.

 

“Partner.Win. is more than an advertising campaign, it’s a top priority for Hikvision North America,” said Alex Asnovich, Hikvision North America director of marketing. “In addition to providing high tech enterprise-level products, we have built a network of professionals that is dedicated to our partners’ business success. If one of our partners has an issue with a product or a project, they can call Hikvision and get immediate onsite support, before, during or after the sale,” Asnovich added.

 

The Partner.Win. theme is evident in Hikvision’s newly designed 3,600-square foot booth (#3703) at ASIS 2017, which opened today in Dallas.  View a video of the Hikvision Partner.Win. campaign here and in the Hikvision Booth at ASIS 2017.

 

“Winning a soccer match, summiting a mountain, catching the big fish, the Hikvision Partner.Win. campaign captures winning moments and powerful partnerships that produce wins,” said Manny Gonzalez, Hikvision creative manager. “The imagery conveys the feeling of excitement during a winning moment and the confidence of knowing you’re on a winning team.” 

 

Visit Hikvision Booth #3073 at ASIS to see Hikvision’s enterprise-level video surveillance solutions, including vertical market-focused solutions, thermal and new deep learning technology. Check out Hikvision’s “Hall of Innovation,” participate in Thought Theater events, and learn more about Hikvision’s Dealer Program. See more details and a schedule of events here. 

 

About Hikvision

Hikvision is the world’s leading supplier of video surveillance solutions. Featuring the industry’s strongest R&D workforce, Hikvision designs, develops, and manufactures standard- and high-definition cameras, including a variety of IP cameras, analog cameras, and cameras featuring the latest in high-definition analog technology. Hikvision’s product suite also includes digital video servers, hybrid and standalone DVRs, NVRs, and other elements of sophisticated security systems for both indoor and outdoor use. Committed to the utmost quality and safety of its products, Hikvision encourages partners to take advantage of the many cybersecurity resources Hikvision offers, including the Hikvision Security Center.  

###

 

Martha Entwistle, Senior Manager Strategic Communications

Hikvision USA Inc.

[email protected] 

HID Global Unifies Identity Lifecycle Management for Physical Security with Quantum Secure SAFE Enterprise Software

Quantum Secure SAFE Enterprise

Austin, Texas, September 25, 2017 – HID Global®, a worldwide leader in trusted identity solutions, today introduced Quantum Secure SAFE Enterprise, an off-the-shelf addition to its SAFE Physical Identity and Access Management (PIAM) offering that brings together everything organizations need to streamline and centralize management of the entire lifecycle for employee, contractor and visitor identities.

“SAFE Enterprise transforms the security function, enabling collaboration across different departments and teams to address identity management and compliance challenges through a single, centralized platform,” said Julian Lovelock, Vice President of Quantum Secure - Identity & Access Management Solutions (IAMS) with HID Global. “It bundles our core products into the industry’s most comprehensive PIAM solution, while also giving organizations the flexibility to meet identity management needs today and in the future.”
SAFE Enterprise enables organizations to manage all of their identity types at a lower cost and without having to purchase separate, stand-alone products. As a centralized platform, it facilitates identity management across the entire lifecycle through on-boarding, badging, access rights management and off-boarding, while also providing compliance and actionable intelligence. The policy-driven software ensures that consistent identity management processes are applied throughout the enterprise regardless of existing infrastructure and new acquisitions. All identities can be properly vetted and authorized based on role, location and other organizational policies so people have the right access to the right areas and for the right length of time to reduce risks.
The new solution consists of four modules and add-ins. Each delivers compliance reporting and auditing functionality and is available in special configuration packages for applications in healthcare, aviation, finance, government, and sports and events. The modules include:
  • Badge Manager: Provides a platform to use external identity sources to pre-load identity information, capture badging prerequisites and print badges for employees and contractors.
  • Advanced Access Manager: Streamlines central management of the physical access lifecycle for an organization’s employees and contractors.
  • Visitor Manager: Securely and quickly manages the entire visitor lifecycle from easy pre-registration to welcoming visitor invitations through rapid check-in and check-out.
  • Security Reporter and Operations Analytics: Enables organizations to understand and coordinate all on-boarding, badging, and access and visitor management activities.
The first of many planned add-ins to be offered for SAFE Enterprise is predictive analytics, which transforms security data into critical knowledge and actionable insights called Indicators of Compromise (IOCs) that help organizations take preventive actions against possible threats.
About HID Global
HID Global powers the trusted identities of the world’s people, places and things.  We make it possible for people to transact safely, work productively and travel freely. Our trusted identity solutions give people convenient access to physical and digital places and connect things that can be identified, verified and tracked digitally. Millions of people around the world use HID products and services to navigate their everyday lives, and over 2 billion things are connected through HID technology. We work with governments, educational institutions, hospitals, financial institutions, industrial businesses and some of the most innovative companies on the planet. Headquartered in Austin, Texas, HID Global has over 3,000 employees worldwide and operates international offices that support more than 100 countries. HID Global® is an ASSA ABLOY Group brand. For more information, visit www.hidglobal.com
 
 # # #

Captis Intelligence Announces Investment and Appointment of David Leppan to Board of Directors

Captis Intelligence, formerly Qface Systems, a leading provider of I-4 crime solutions (Intelligence, Information, Investigation, Identification) has announced the appointment of David Leppan to Board Member and Chairman of their Board of Advisors.
Leppan, founder of World-Check (now part of Thomson Reuters) and co-founder of WealthX, is a pioneer and recognized expert in KYC (Know Your Customer), Due Diligence, and Risk Mitigation data services to the public and private sector. Leppan's experience within the financial banking industry and regulatory /enforcement agencies will be instrumental in developing Captis' growth in the financial sector. "The financial market's requirements in security measures, KYC, and identification progress at a rapid pace," said Leppan. "Captis's product offering and leading market position exceed today's requirements and anticipate tomorrow's requests," added Leppan.
Leppan's investment will accelerate Captis's next phase of continued innovation and expand its reach globally throughout several strategic vertical markets, most notably the financial institution vertical where Leppan's World-Check solution became a standard. With a focus on advanced facial recognition with corresponding database, the Captis Financial solution will deliver a next-generation system expanding on Leppan's initial KYC vision. "David is a globally recognized expert and visionary with an impressive track record in the financial sector," said Charles Archer, former Assistant Director of the FBI and Chairman of the Captis Law Enforcement Council. "David's involvement reaffirms Captis's commitment in partnering with global experts to drive progression and expansion."
David is a globally recognized expert and visionary with an impressive track record in the financial sector.
 CHARLES ARCHER, CHAIRMAN - LAW ENFORCEMENT COUNCIL
About Captis Intelligence
Captis Intelligence's I-4 platform (Intelligence, Information, Investigation, Identification) provides an advanced cloud-based system for public and private sector applications. Captis unifies situational awareness, geographic crime intelligence, social media investigation, facial recognition, criminal databases, access to solveacrime.com, and secured information exchange portals for neighboring businesses and law enforcement. A global innovator, Captis is headquartered in Los Angeles and has offices in London and Singapore. Captis was founded on the principle of innovation and remains at the forefront of pioneering I-4 crime prevention/suspect identification technologies.

Do you know what to look for in ID badge printing solution provider?



HID

More than ever before, security is top of mind for many global organizations. Many companies are now moving beyond simple ID badges to multi-function cards that link to other systems to confirm the identities of those seeking to access facilities or information on the network.

A key element to ensuring that your employees, staff, and data are protected is to have a strategy for vetting solutions providers that can help you create and manage the production and issuance of secure ID credentials.
The white paper, ID Badge Printing Solutions – An Executive’s Guide to Selecting the Right Provider, outlines the top seven things to look for when seeking a solution provider for creating secure IDs for your employees, staff and contractors.

To access this whitepaper click here

 



Advancing CyberSecurity Innovation in the Public Sector

Ankur Chadda, Director of Product Marketing, Gurucul - www.gurucul.com

I confess. I've read the book Borderless Behavior Analytics – Who’s Inside? What’re They Doing? three times. I keep discovering new insights on addressing the vanishing security perimeter based on what organizations are doing in response to this challenge.

In chapter five, Robert Rodriguez , Chairman and Founder of the Security Innovation NetworkTM (SINET) , describes a number of compelling developments. SINET is an international community building organization whose mission is to advance innovation and enable global collaboration between the public and private sectors to defeat cybersecurity threats. Rodriguez's observations are both authoritative and enlightening.

He observed that many CISOs have recognized the need to move from automation to orchestration of cyber security to enable centralized visibility and decision-making. This means putting in place an infrastructure to integrate all the monitoring, data collection, analysis, control and response components needed for a holistic and flexible model with the flexibility to adapt to future needs.

This orchestration capability can help assure comprehensive remediation of threats. Eventually, some form of attribution should be included because a number of industries and corporations are battling with this challenge. Nevertheless, in order to do proper attribution, it must become clearly mandated within the cybersecurity industry. That’s something to look forward to in the future.

In terms of other trends, Rodriguez notes that it is disappointing we’re not seeing more disruptive innovation in cybersecurity. He has not seen anyone inventing fire or the light bulb. Meanwhile, it’s a cat and mouse game. Sometimes we’re staying ahead of adversaries, and other times we’re not. What’s needed are intelligence-based solutions that can recognize the weakness in security defenses, attacker strengths and likely scenarios.

One of the inhibiting factors of dynamic innovation in cybersecurity, however, has been the rapid evolution and transformation of the Internet. Use cases rise in popularity, and quickly morph into something drastically new. Facebook is a good example. It is very different today, compared to its original incarnation. Multiply this phenomenon exponentially, and you have today’s Internet. From a cyber security standpoint, we’re trying to work backwards to fix a framework which is extremely porous. In many respects, we’re chasing a moving target.

The hope for productive change in cybersecurity lies inherently with risk takers and early adopters. These change agents are willing to take the leap of faith needed to implement next-generation security approaches, many of which are now drawing strength from analytics and machine learning models. Part of the challenge in the government sector, is that there’s no reward for taking risks. Primarily because there are no profit margins or shareholder value, no driving motivation to deliver more for less. The culture in government, therefore, is different than in the commercial world.

Nevertheless, government CISOs are increasingly looking to risk takers and early adopters in both the public and private sectors to inform their thinking and challenge their strategic planning assumptions. The book I mentioned earlier, Borderless Behavior Analytics – Who’s Inside? What’re They Doing? , is one resource where readers can hear first hand accounts of cyber security transformation projects from leading CIOs and CISOs that span a wide range of vertical industry perspectives.

 

 

 


Gatekeeper Security CEO, Christopher Millar, Describes Their Winning Product

Gatekeeper Security CEO Christopher Millar describes his company's only fully automatic (AUVIS) under vehicle inspection in the world capable of automatically inspecting all vehicles traveling on a road or rail. The AUVIS can work on either a one-to one basis when deploying Gatekeeper’s license plate readers system or on a one to many basis when using Gatekeeper’s pattern recognition software to find the same or similar vehicle in the system’s database using the only the undercarriage image as a reference.

Gatekeeper was the Winner in GSN’s recent 2017 Airport, Seaport, Border Security Awards in the Categories of “Border Security and Immigration” and “Best Physical/Logical Privileged Access Solution.” See Mr. Millar’s description of Gatekeeper Security below: 

Gatekeeper produces the only fully automatic under vehicle inspection system (AUVIS) in the world capable of automatically inspecting all vehicles traveling on road or rail. The Gatekeeper system produces virtual 3D images of the undercarriage looking forward and backward at 60 degrees to inspect on top of axles and cross beams. The AUVIS can work in a one to one basis when deploying Gatekeeper's license plate reading system or on a one to many basis by recovering a vehicle reference image from the system database based purely on the undercarriage image. AUVIS is the only under vehicle system that can automatically detect change to an undercarriage whether it is a foreign object or a change in configuration. The AUVIS is not susceptible to driver behavior such as a vehicle stopping on top of the scanner, speeding up or slowing down while being scanned or if drivers cross the scanner in different places (to the left or to the right of center) at each scan. The scanning system has an environmental rating of IP68 and operates as a stand alone platform or as a large multi scanner platform sharing references images and vehicle records via a central database. System are deploy in 30 countries from Russia to the Middle East to SE Asia.

To learn more about Gatekeeper products and the company, visit: 

www.gatekeepersecurity.com 

Pages

 

Recent Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...
PureTech Systems is a technology leader in the use of geospatial video, focusing on perimeter security.  When combining geospatial capabilities with video analytics and PTZ camera control, managers of critical facilities can benefit by allowing the video management system to aid them in the process...