...The protocol stacks from MicroControl have proven themselves thousands of times in use. They shorten and simplify software development, making it easier for developers and designers to define interfaces. The CANopen, CANopen FD, and J1939 protocol stacks offer high future security with a freely selectable transition from Classic CAN to CAN FD. Additionally, MicroControl's protocol stacks provide...
Germany, München
...IT Security Assessments, Cybersecurity and Data Protection Regulations, Penetration Testing, White Hacking, Impact Analyses, Attacker Identification, Defense Measures, Prevention, Training. China's regulations on cyber and data security are becoming increasingly stringent. The new Cybersecurity Law sets high standards for IT security and data protection. We assess the existing infrastructure of...
...More Protection for Your Products Security labels are excellent for uniquely identifying property or items. They protect against unnoticed opening of a product and against tampering. When removed from the surface, either a layer of the label comes off, it breaks into small pieces, or it cannot be removed at all. Any tampering, counterfeiting, or attempted theft is immediately visible.
Germany, Reinbek
... are the ones who are liable. Also, today’s access control processes show room for improvement with regard to efficiency and cost. That is why we are developing IntelliLock. TECHNICAL FACTS ■ For all standard or tubular frame doors ■ Keyless but can be combined with locking cylinder as backup ■ Vandal-proof equipment for tough environments ■ IT security by design against cyber risks ■ Easy software integration via REST API...
... quality, reliability, precision, and safety. A current workforce of approximately 16 employees allows us to respond quickly and flexibly to your wishes and requirements. Get in touch directly with BELLINGHAUSEN Manufacturing Technology. An inquiry is worth it!
...3-ply self-copying quick separation form or laser capture. The pre-printed form is to be used in accordance with section 8.2.6 of the procedural instructions for the IT procedure ATLAS (as of March 2009) as part of the contingency plan when more than one item is declared. The pre-printed form is to be filled out according to Title II Section I of the information sheet on the unit price (E-VSF Z 34 55).
Germany, München
...The Security Expo presents security solutions for businesses and public infrastructure: Time and access management, video surveillance, alarm systems, perimeter protection, IT security.
Matching products
Security Technology
Security Technology
Germany, Wetzlar, Deutschland
...This tie offers comfort and practical handling with its adjustable attachment under the collar. No need to tie it as the knot is securely tied for a perfect fit. The length is 51 cm with the knot and the width is 7 cm. Made of soft polyester with a satin finish. Available in solid colors. Made of high-quality microfiber, this security tie is durable and easy to care for. It is also comfortable...
Germany, Berlin
... also creates major challenges for companies. After all, companies are not only going through technical processes such as the conversion of classic files into digital documents. Digitization also stands for holistic change as well as innovative and agile rethinking. Topics such as intelligent networking, IT security and high-performance data infrastructure are coming to the fore.  ...
Germany, Fürth
...We empower brick-and-mortar retail with a consulting application that allows you to advise your customers at home via video conference. The web app is customizable to your corporate identity and will feature your logo. Clear for customers, innovative for companies. Intuitively operable and easy to understand. Perfectly suited for all types of consultations, and it also allows for secure data exchange of documents, notes, and orders. We offer a high IT security standard with hosting in Germany.
Smart Light Solutions GmbH exclusively distributes IT security products under the brand SMARTKEEPER. A cybersecurity system that secures all common hardware interfaces against unauthorized access. What is SMARTKEEPER: SMARTKEEPER is a physical IT prevention security solution that offers various ways to mechanically lock and secure all critical input and output ports of IT hardware, such as USB p...
Germany, Hildesheim
... documents Encrypts data sent and received online via VPN** Prevents webcam spies from watching you in your home Protects your children with comprehensive features Features and benefits: Excellent virus protection In 2018, Kaspersky security products were evaluated in 88 independent tests. They ranked first 73 times and made it to the top 3 a total of 77 times. The antivirus solutions have already blocked over 1.9 billion attacks this year.
Germany, Bautzen
...The "Security Seal - 70x25mm - red - from 50 pieces" is universally applicable. Once applied to the object to be protected, it exhibits strong adhesive power, providing effective protection against tampering and counterfeiting. The unique serial number and the 3D effect offer additional security and prevent unauthorized duplication. https://www.siegelwerk24.de/produkt/sicherheitsetiketten-rot-7025/...
Germany, Henstedt-Ulzburg
... destruction of data carriers according to the highest security standards. Flexible rental concept: Attractive rental and leasing options for ICT products, perfectly tailored to your needs. 1st-level support: Reliable exchange and repair of your IT devices. Business mobile plans: Customized mobile plans for businesses of all sizes. Cybersecurity solutions: Comprehensive protection for your IT infrastructure against current threats.
Germany, Eggolsheim
...), it is highly recommended to involve a data protection officer, and in many companies, it is even legally required. We see our core task as monitoring and optimizing the level of data protection within your company to ensure that it is compliant with the GDPR. Based on a comprehensive data protection analysis, we implement all necessary measures within your company. Additionally, we also conduct the necessary employee training on data protection.
... way, you can guarantee the availability, integrity, and confidentiality of your company data. I will advise you on all matters related to the sustainable improvement of information security and assist you in implementing your individual security strategy, regardless of which philosophy (ISO 27001 or IT baseline protection) you wish to follow. Feel free to reach out to me! I am here to assist you with all aspects of information security and data protection: Robert Schneid-Karl, Data Protection Officer (DPO), Tel. 089 589394 25, robert.schneid-karl@mip.,de or robert.
...The security of information is important for businesses, authorities, and individuals. Ensure cyber security/information security for all your products with our help.
...All agreed IT components in your company are monitored by the experts at EDV Systeme. The server is regularly inspected and maintained, with electronic notifications in case of disruptions. Standardization of your client environment through centralized management on-site or remotely. High standardization and automation at low costs. You decide whether to use the client management solutions within your own infrastructure or with our customized hosting. Benefit from noticeably reduced administrative effort with our client management solutions. We reliably support your systems.
Germany, Nürnberg
... system is carried out exclusively in digital form. Together with the fast, quartz-accurate speed detection, it ensures the highest level of safety and system reliability. Design: Signal panel for installation in control cabinets and operator consoles Operating voltage: 18 … 32 VDC Operating temperature: -25 … +70 °C...
...Different application areas such as CAD, CAM, CAE, FEM, video editing, CGI, design, GIS, or VR have varying requirements for a workstation. The software used, the amount of data to be processed, processing speed, result quality, and data security are just a few criteria that must be considered when designing a workstation. It quickly becomes clear: a standard off-the-shelf computer won't get you...
Germany, Mannheim
... against extreme weather conditions. This set is ideal for those seeking a professional security solution without relying on complicated configurations. It offers free remote access options, automatic hard drive overwriting for optimized storage space, and privacy masking for personalized surveillance areas. Experience enhanced image quality even in low light conditions thanks to Digital Noise Reduction technology and secure your property.
Germany, Gröbenzell
... makes complex manufacturing processes more efficient while minimizing both costs and security risks. Our IIoT product range: - Cellular Routers: Mobile routers for industry, transport, or corporate networks - Embedded Modules: XBee Dev Kits, Zigbee Modules, Gateways, and System-on-Modules - Serial Connectivity: Console servers and adapters - USB Connectivity: Up to 48 USB ports...
Germany, Halle
...Support for Online Portals and IT Services For digital customer portals and IT services, or internal support and consulting platforms, it is crucial that our service desk delivers on its promises: addressing questions and issues, providing users with a sense of security, and organizing solutions. Typically, a solution is achieved during the first contact through the use of FAQs or remote desktop connections. As a Single Point of Contact, we monitor all processes until the problem is resolved.
Germany, Geisa
...Our solution for extensive access control: The KYO Cenloc allows for the connection of up to 16 doors and 64 access readers - ideal for projects with many access points and high security requirements. The setup and operation are straightforward thanks to the colored TFT touch display. Event notifications and system information are also provided on it for quicker diagnostics and a better...
Germany, Bochum
...IT consulting with a focus on security for businesses of all sizes. Analysis, consulting, and implementation of customized IT solutions for sustainable success and comprehensive protection.
Matching products
Consulting
Consulting
Other products
IT Support
IT Support
...Consulting for IT technologies and applications, support for certifications, implementation of ISMS, data center analyses, project management Strategy and process consulting Technology consulting Compliance/IT security Sourcing strategies Data center automation Data center infrastructure...
Germany, Ingolstadt
...We are pleased to offer you our services in the areas of network support, as well as PC support (hardware, software, and security).
Germany, Solingen
...Small wireless detector that notifies of glass being broken by intruders. It is installed at a distance of 9 m from the window and filters events that cause false alarms about breakage.
...CoriSENS is a rotation rate sensor for measuring angular velocity ω. It detects rotational movements using a MEMS gyroscope. This measuring signal in a range of ± 20° / s is converted by the sensor electronics and transmittes an analog current signal as well as voltage signal in addition. The sensor is certified according to uniform standards for electronic equipment on rail vehicles (DIN EN 50155) and can be operated directly with the usual onboard supply (24 V). Supply voltage:24 V Sensitivity:100 mV/°/s & 0,4 mA/°/s Measuring range [°/s]:± 20...
...DGUV Inspection, Maintenance, and Repair of Barriers, Barrier Systems, Bollard Systems, and Fencing, Inspection and maintenance of barrier systems for entry control or access control are now standard equipment in our industry, whether it be factory premises, industrial sites, or commercial properties. However, a defective barrier system poses a significant safety risk. It becomes even more dangerous when the barrier system lowers uncontrollably. This can lead to property damage or even personal injury. KFK Gate Service nationwide.

The europages app is here!

Use our improved supplier search or create inquiries on the go with the new europages app.

Download in the App Store

App StoreGoogle Play