• europages
  • >
  • COMPANIES - SUPPLIERS - SERVICE PROVIDERS
  • >
  • data encryption

Results for

Data encryption - Import export

Germany

Verified by Europages

OPC UA (Open Platform Communications Unified Architecture) is a standard for communication in the field of industrial automation - more precisely: a machine-to-machine communication protocol for industrial automation. The server enables cross-operating system data exchange between, for example, scales and higher-level systems such as ERP or MES systems. miOPC is suitable, for example, for the Combics, Signum, Midrics and IS platforms. With miOPC, Minebea Intec, as an innovation leader, offers a new solution for the market that takes an important step towards standardisation and customer independence. Your benefits: — Simple connection of existing scales via Ethernet TCP/IP or serial RS232 — Standard OPC UA scale profile according to the OPC Foundation: "OPC UA Compendium Specification for Weighing — Data security through encryption — Simple, intuitive operation

Request for a quote

Italy

he RC-CC3200 module is the second-generation series of modules in the SimpleLink family and consists of an applications microcontroller unit (MCU), Wi-Fi network processor, and a power-management subsystem. The module comes integrated with all required components including on-board flash, clocks, and RF filter for easy hardware integration and quick time-to-market.The applications MCU subsystem contains an industry-standard ARM Cortex-M4 core running at 80MHz. The RC-CC3200 module supports a wide variety of rich peripherals, including fast parallel camera of embedded RAM memory options, with peripheral drivers in ROM memory. The series also includes a secure device with on-chip 128-bit secret key supporting secure boot as well as applications and user data encryption.

Request for a quote

Germany

- For contactless reading and writing of RFID chip cards - Used in e.g. refineries, tank farms, chemical industry, medical industry, food industry or power plants - Allows the build-up of intrinsically safe access control and identification systems - Application areas: loading at filling gantries, weighing, entry and exit area - High protection against rough environmental conditions due to sturdy aluminum housing (optional available as stainless steel housing) - Explosion protection according to European ATEX-standard 2014/34/EU BENEFITS - Type of protection IIC - Contactless reading - Tamper-proof by additional data encryption via a special Timm Elektronik card coding - Temporary data at chip cards can be saved and recalled - Individual, customer-specific coding possible

Request for a quote

Russia

Converting stands for transforming data from one format to another. We will convert any audio or visual material into the format that will fulfil your requirements. Moreover, you will still retain the ability to change image quality, definition, and aspect ratio, or tweak bitrate and sound quality

Request for a quote

Russia

Upscaling is the process of upgrading the quality and definition of the content. For example, our specialists can adapt low definition videos to the higher definition displays, all while keeping the image sharp. The technology is close to scaling because it also involves a vast number of various algorithms.

Request for a quote

Do you sell or make similar products?

Sign up to europages and have your products listed

Add my business

Russia

“Cyrillica” studios is there to help you protect your content from unlicensed broadcasting, publication, selling, and other illegal uses. Illegal distribution of content damages its uniqueness, which results in its cost reduction. This is why our studio offers the most reliable technologies available to provide your digital content a fail safe protection.

Request for a quote

Germany

Power QUICC II Pro module with MPC8315 from Freescale. Key functionalities Freescale e300 Core with 400 MHz for highest computing efficiency High-speed communication via 2x Gigabit Ethernet, 2x SATA and USB 2.0 Functions can be easily extended via PCIe, PCI, SPI, I²C and flexible local bus Encrypted data communication IEEE1588 time synchronisation Extremly compact dimensions (70mm x 50mm) Low power consumption (< 3 W) enables passive cooling Extended temperature range *NRND=Not Recommended for New Designs

Request for a quote

United Kingdom

D-Tech Solutions has discovered that on average, 75% of the businesses audited lack full or useful backups, which could be used to restore their IT environment to a usable state in the event of a catastrophic disaster, quickly if at all. We look to ensure that every company that we support has an off-site backup every night. In the event of a problem, anything from a single file to their full data and email can be easily recovered. We can integrate a physical tape drive, USB or cloud backup solution into your existing IT system to address recovery challenges of any type. Please feel free to contact one of our IT Support engineers on 0203 637 6307 who will be more than happy to discuss how we can keep your business running

Request for a quote

Austria

The free tool requires manual input of meter readings, providing graphics for the specific consumption per day. It may also correlate two meters or transform odometer and fuel amounts into l/100 km or MPG. You may enter the meter reading(s) whenever you want, the server based software calculates the specific consumption. Your code encrypts your data, so the operator of the site has no access. By October 2016 SSL will be added to make it even safer.

Request for a quote

United Kingdom

Cyber Security: With an increasing threat to business from cyberattacks, your business could suffer significant financial damage and more importantly the reputation you have worked hard to build up. Genesis work on a 6-pillar security model to mitigate against the risk of cyberattack, protecting the perimeter, end points and remote access points whilst encrypting emails and data and providing encrypted backup and recovery services. Genesis can offer vulnerability assessments to test your existing security framework. No software is installed, and no-one needs to know the software is being run – not even your current IT provider. It is a fast service, and there is no commitment to work with Genesis once you receive the results. It will test the perimeter of your network to ensure it is secure, along with all internal connections and endpoints. It also will provide asset detail information.

Request for a quote