Home Blog Page 343

Perimeter Systems Data Protection

0
Perimeter Systems Data Protection ♦ Perimeter Systems Data Protection – Perimeter Systems Australia is in the process of installing an Intrepid MicroPoint II fence detection...

Hikvision IP Video Intercoms

0
Hikvision IP Video Intercoms ♦ Hikvision IP Video Intercoms - Hikvision's IP intercoms serve a wide range of scenarios including apartment buildings, single-family homes, and...

Icon Water Facilities Security Management

0
Icon Water Facilities Security Management ♦ Icon Water facilities security management of CCTV and access control across 300 sites in ACT and NSW have been...

ICT Protege VoIP Intercom

0
ICT Protege VoIP Intercom ♦ ICT Protege VoIP Intercom – Protege PRT-IPIC-POE-C is a VoIP vandal resistant video intercom designed to handle harsh environments.VoIP capability...

AXIS D4100-E Network Strobe Siren

0
AXIS D4100-E Network Strobe Siren ♦ AXIS D4100-E network strobe siren - AXIS D4100-E network 110dB strobe siren, which helps deter intruders, ensure on-site safety...

Spectra Enhanced 7 Series

0
Spectra Enhanced 7 Series ♦ Spectra Enhanced 7 Series – Pelco’s Spectra Enhanced Look Up 7 Series features tilted views 30 per cent above the...

ARA Seeks Service Techs

0
ARA Seeks Service Techs ♦ ARA Seeks Service Techs - ARA Security is seeking service and maintenance security technicians with Tecom Challenger and Geutebruck experience,...

Milestone Systems XProtect 2022 R2

0
Milestone Systems XProtect 2022 R2 ♦ Milestone Systems XProtect 2022 R2 includes XProtect Incident Manager, XProtect Essential+ on AWS and enhanced license plate recognition.XProtect Incident...

Gallagher Empowers Queensland

0
Gallagher Empowers Queensland ♦ Gallagher Empowers Queensland - electricity transmission network service, Powerlink, is using a Gallagher solution to protect vital infrastructure.Powerlink Queensland is a...

Vesta Open Day

0
Vesta Open Day ♦ Vesta Open Day – alarm and smart home system manufacturer Vesta is participating in an open day at Source Security in...