December 2003Data Acquisition & Telemetry
Access Control & Identity Management
Products & Solutions
The new PSI-Data/Fax-Modem/RS232 modem from Phoenix Contact provides worldwide access to machines and installations for remote data capture, remote diagnostics, remote maintenance and program downloads. Thanks to high-grade three-way isolation, this rail-mounting device is suitable for the tough requirements of industrial remote maintenance. It enables dedicated line and dial-up line connections according to the international V.34 standard.
Comprehensive security features include programmable selective call answering, password-protected dial-up and a call-back function to prevent unauthorised access. The configurable warning and fault input is particularly useful for remote installation monitoring. If the input is activated, the modem will select any predefined telephone number and send a stored text-based message as a fax or text message (SMS). There is an integrated automatic sleep function to save battery life, and the device will function over a broad supply voltage range (10 to 60 V). Plug-&-play and user-friendly configuration software ensure simple setup.
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.
Read more...Paxton opens second experience centre Paxton
News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.
Read more...DoorBell with built-in AI Ajax Systems
Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.
Read more...Raptor switches Phoenix Contact
Electrical Power & Protection
The Phoenix Contact Raptor switches enable reliable and safe operation in extreme ambient conditions. The managed switch portfolio meets the stringent requirements of IEC 61850-3 and IEEE 1613 standards and is ideal for critical infrastructure and power supply applications.
Read more...RFID tunnel solution for intralogistics
Data Acquisition & Telemetry
Turck Banner’s new UHF-SYS-TUNNEL RFID tunnel offers a ready-to-use, flexible detection solution for the automation of intralogistics processes.
Read more...Gallagher Security expands Digital Badge Programme
News & Events Access Control & Identity Management Training & Education
Following a successful launch and roll out across Australia and Papua New Guinea in 2023, Gallagher announced its Digital Badge programme is now available to channel partners and end users across the rest of APAC IMEA.
Read more...Integrated Control Technology and Ingram Micro sign distribution agreement
News & Events Access Control & Identity Management
Integrated Control Technology, a global manufacturer of intelligent electronic access control and security solutions, announced it has extended its presence in the Middle East and Africa region by entering a distribution agreement with Ingram Micro.
Read more...Kaspersky KATA 7.0 for targeted attack protection
Information Security Products & Solutions
] Kaspersky has announced a major update to its Kaspersky Anti Targeted Attack (KATA) including enhanced network detection and response (NDR) capabilities with deeper network visibility, internal threats detection and other critical security features.
Read more...Benchmark in long-range surveillance Duxbury Networking
Surveillance Products & Solutions
Duxbury Networking says the long-range, high-resolution monitoring AXIS Q1809-LE bullet camera has been enhanced further with integration into Milestone XProtect to set a new standard for forensic-level image clarity, intelligent event detection, and enhanced security management.
Read more...Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.