UNDER THE PATRONAGE OF H.R.H. PRINCE ABDULAZIZ BIN SAUD BIN NAYEF BIN ABDULAZIZ AL SAUD, MINISTER OF INTERIOR OF SAUDI ARABIA

In partnership with

Ministry of Interior

Associate Partner

SAFCPD

Strategic Partner

Mobile Land Systems

2018 Product Gallery

Loading
  • Xenio-AC50
    All in one smart card reader built to verify users quickly and accurately
  • Xenio-AC200
    Smart biometric fingerprint reader built to fit even the slimmest of door panels.
  • Xenio-AC500
    Innovative access control reader designed for today’s cloud and IoT world.
  • Xenio-AC700
    Smart fingerprint access control reader built to withstand the demands of the most unforgiving and harsh environments.
  • Xenio-T50
    Smart Card RFID Terminal Designed for today’s connected cloud and IoT world.
  • Xenio-T200
    Smart & Modern Fingerprint Terminal A biometric intercom terminal built for today’s connected cloud and IoT world.
  • Xenio-T500
    Smart Card RFID Terminal Designed for today’s connected cloud and IoT world.
  • Xenio-T700
    Industrial Grade Biometric Protection Rugged fingerprint terminal designed for today’s connected cloud and IoT world.
  • Xenio-I1000
    Touchless Iris Verification at a Blink Iris recognition terminal, designed for today’s connected cloud & IoT world.
  • Xenio-M200
    Mobile Fingerprint Verification Sleek, portable fingerprint recognition terminal
  • Xenio-R700
    Built for Those Tough Jobs Rugged and mobile advanced fingerprint recognition terminal.
  • Advantis NG Control Console
    Advantis NG, technology at the service of the imagination. A console with character, with pure lines that converge to define a unique architecture. ADVANTIS NG is the perfect machine: power and control. Durable and tactile. Technology and innovation at the service of the imagination. Creativity and efficient design for a safe environment. The latest 24/7 console designed by GESAB seamlessly integrates the experience of our industry-leading expertise on Decision and Control Rooms with the latest technological trends. With ADVANTIS New Generation everything is under control. It’s time to discover the new generation of command & control.
  • Manufacturing
  • JJW201Enclosed Anti-Explosion Container
    This product is an equipment used for storing and transferring explosive devices or suspicious items that have been detected. Prevent explosive devices from exploding in public places, it can effectively protect the safety of people and public facilities. When an explosive devices explodes, the blast, debris and high pressure of the explosion can be sealed in the tank and without leakage.Purpose: Public safety, armed police, railway stations, customs, important places, large venues. Due to the large opening of the tank, it is especially suitable for airport, railway station and automobile passenger station, which can put the draw-bar box of 55cm*45cm*25cm into the tank directly.
  • JJWQ Spherical Anti-Explosion Container
    Widely used in airports, stations, subway, stadium, exhibiting venues, square, conference center, security place, passenger and cargo ships, trains and anywhere specially used storing and transferring explosive devices or suspicious items that have been detected. It is also applicable to the military enterprises and army, which need to carry out the blasting operation just like mines, construction projects and other inflammable and explosive materials which need to be stored and transported.
  • JJW2 Spherical Anti-Explosion Container
    This product is equipment used for storing and transferring explosive devices or suspicious item that have been detected. Prevent explosive devices from exploding in public places; it can effectively protect the safety of people and public facilities. Suitable used in security inspection department of public security, airport, railway station, customers, important places and large-scale activities.
  • JJW40 Series of On Vehicle Anti-Explosion Container
    JJW401, 402 and 403 series of On Vehicle Anti-Explosion Container are the patented products of our company, which is mainly suitable for the use of public security, armed police and other departments. Apart from the advantages of ordinary explosion-proof tank, suitable for all kinds of large-scale activities and important security places. The explosive devices that were found could be transported to the safe areas in a timely manner for people disposal. Therefore, it is the first choice for public security and armed police departments. It is also cheaper than similar products abroad and is widely used.
  • JJW903 EOD Robot
    JJW-903 EOD Robot is independent research and development product by our company, is the National Ministry of Science and Technology project. Characteristic: Capture with long arm gripper equipment, is the only device than can put exploder into On Vehicle Anti-Explosion Container and take out of it easily, which is superior to all kinds of robots at home and abroad. Purpose: Widely used in search exploder and explosive removal and to exclude radioactive substances, instead of people to complete dangerous mission. High quality and inexpensive, and the optimal price performance, as one of the preferred equipment for EOD personnel.
  • JJW 38mm Explosive Destruction Device
    The product can be used alone, and also can be installed in the EOD robot. The device is equipped with a laser red dot sighting device, when execute exploder clearing task, only need to sighting suspicious explosive devices with laser red point, and adjustment distance between the muzzle and the suspicious explosive device to a specified range, and evacuate the surrounding personnel to a safe area, operate the detonator of explosive destruction device to destroy explosive. This product is widely used in explosive-removal and anti-terrorist field.
  • JJW Anti-Explosion Simulation Training System
    This product can be used for the armed forces and public security departments teaching and training for EOD personnel. The Anti Explosion Simulation Training System filled the domestic blank of EOD personnel training equipment, it’s effective to prevent EOD personnel injury because of wrong operation.
  • FDY3R-JJWFH01 Bullet-Proof Vest
    This product is superimposed with the high strength TWARON and yam UD cloth, which is tested with live ammunition by the authority departments of the Ministry and the Ministry of Public Security. The company’s series of public security bulletproof vests of class IIIcan effectively prevent the penetration of 7.62mm lead heart projectiles for the micro submachine gun of type 79, which are suitable for single protection of the soldier, police, border guard, etc. The product is waterproof, moisture-proof, fireproof, bulletproof, UV proof, light weight, high bulletproof performance, safe and reliable.
  • FBT-JJW16 Explosion-Proof Blanket
    Explosion-proof blanket, explosion-proof enclosure with light weight, easy to carry, easy to operate, excellent anti-detonation. Used for explosives isolation, protection, requirements for explosion-proof equipment, valuable instruments, cultural relics archives and special public places, is necessary equipment for the public security, armed police, civil aviation, railway, port and customs. Explosion-proof blanket adopt advanced double barrier structure, can effectively block produced damage effect during the 82-2 type grenade explosion, equivalent to the explosion power of 70G TNT explode, it can form a three-layer blocking effect for blast debris and impact force, so as to prevent the people and objects near the explosive from injury, is an important device of the site temporary disposal of explosives.
  • JJW8020 Safety Shoe-Scanner
    This Shoe-Scanner Detective can detect automatically whether the shoes and the lower part of the body carried be explosive device or not. It is simple, convenient, safe, fast and reliable, and can be found effectively if there’s a metal and dangerous goods. It is the only effective way to prevent terrorists from carrying guns, detonators, bullets and controlled cutters in shoes.
  • ClearSkies  NG SIEM-as-a-Service & Big Data Advanced Security Analytics
    Redefining SIEM Incorporating the power of Big Data Advanced Security Analytics ClearSkies™ NG SIEM-as-a-Service is a fast, robust, scalable and flexible Next Generation SIEM solution. It provides real-time correlation of log data combined with evidence-based knowledge of emerging threats and vulnerabilities, thus allowing the early detection and response to targeted attacks and data breaches. Having received the 2015 Data Impact Award for Most Admirable Architecture, ClearSkies™ NG SIEM-as-a-Service integrates Big Data Advanced Security Analytics (real-time in-depth User & Entity Behavioral, Artificial Intelligence, Predictive and Machine Learning analysis) from its already powerful and feature-rich ClearSkies™ Big Data Advanced Security Analytics Platform. These powerful capabilities extract contextual information regarding users and assets for the prediction of suspicious and/or the detection of abnormal behavior, which would otherwise go undetected by conventional SIEM systems.
  • ACTEA Slide

    ACTEA Slide

    GESAB

    Minimalism given shape. Discover the ACTEA Slide console whose design hides the latest in innovation to create the definitive console. http://gesab.com/control-rooms-and-command-centers/control-consoles/actea-series/actea-slide/
  • KVM DESKWALL

    KVM DESKWALL

    GESAB

    Our experience in control rooms has led us to develop a new generation of Dynamic KVM that is changing the way operators work in the entire world. http://gesab.com/dynamic-kvm/
  • CSX Cybersecurity Training Platform
    The ISACA cybersecurity training platform is a cloud based solution that encompasses beginner level topics like network scanning/packet analysis up to advanced pieces such as malware analysis, and SOC activities. Each topic is spun up in a virtual kali Linux lab environment, and is performed on a hands on basis, with an enterprise dashboard for tracking progress and earning CPE credits. Every Quarter we release a new lab volume and 1-2 new courses to ensure that we keep our clients up to date with the latest cybersecurity threats and trends.
  • DataCheck
    Data Check is one of the projects of the Specialized International Verification Services Company. This entails verification of academic and professional qualifications certificates, including professional licenses through more than 21,000 issuing authorities across more than 120 countries and territories.
  • SC - 9X19mm Blank
  • SC - 9X19mm Ball (M882)
  • SC - 5.56X45mm Blank (M200)
  • SC - 5.56X45mm Ball (M855)
  • SC - 5.56X45mm TRACER (M856)
  • SC - 7.62X51mm BLANK (M82)
  • Market Check
    Market Check service is the first of its kind in the Middle East aimed at protecting intellectual properties as well as monitoring markets that import products. With this service, our mission is to combat counterfeiting and piracy by promoting laws, regulations, directives and relationships designed to render the theft of intellectual property undesirable and unprofitable.
  • Security Check
    Security Check uses global criminal databases derived from the public domain and individual history, ensuring that privacy rules are not violated. Our databases ensure that the result of the security audit is accurate and up-to-date
  • Remote USV Operations
    USV manufacturer Al Marakeb, along with its autonomous systems division MAP-Tech, will be showcasing a live autonomous demonstration at SNSR 2018. The C2Pro- portable command and control unit will be situated at the exhibition grounds, and will perform live maneuvers with a USV located in UAE waters.
  • Camoufalge Army Combat Uniform
  • M65 Field Jacket
  • Second Sight MS – Gas Detector
    Second Sight MS is the only standoff gas cloud detector for real time surveillance and with source localization.
  • SaphyRAD MS
    The SaphyRAD MS is a multiprobe survey meter with gamma dose rate measurement and contamination detection functions designed for military operations.
  • GammaTRACER Spider
    GammaTRACER SPIDER, a gamma probe designed for emergency response and enabling a fast deployment in the critical area with minimum human intervention. Data is transmitted via proprietary UHF radio or satellite.
  • Viper MRAP
    The Viper MRAP is a compact, scalable, high mobility and multi role 4x4 vehicle featuring a powerful engine with automatic transmission, and independent suspension. Designed for the toughest terrains and conditions, the vehicle is a true military workhorse featuring some of the industry’s most cutting edge design philosophies and technology. Viper draws from decades of experience from its design team, and its customers alike. Viper truly represents the next generation in protected vehicle technology.
  • Cobra APC & Double Cabin Range
    The Cobra APC and Double Cabin Range offers the unique value proposition of a V-shaped, mine resistant APC built on a reliable and very high performance commercial chassis. The Cobra utilises MLS’s design and technology philosophies usually found in its military class vehicles. With its aggressive features matched with functionality it’s perfect for many government operations in urban areas. Available in Double Cabin and APC variants. APC variants include eithr 5 door or 3 door configurations.
  • Shield APC
    The Shield APC is a world class and field tested vehicle designed for police and peacekeeping operations. Shield combines strength, speed and agility in a highly mobility security vehicle designed to provide the characteristics usually only found in military class vehicles, in a compact and capable policing vehicle. Unlike many of its peers, the Shield APC does not use any commercial chassis: the Shield APC chassis is 100% design engineered, produced and owned by MLS. As well as APC variants, there is also a VIP variant with VIP cabin with 2 comfortable and elegant chairs and entertainment / CCTV system. This could be used where the VIPs don’t want to draw attention to themselves and move amongst normal police vehicle movements.
  • Caprivi MRAP
    The Caprivi Range of MRAP vehicles have been designed to provide customers with cutting edge ballistic and blast protection in a class leading vehicle. From the monocoque V- shaped mine resistant hull technology, to the carefully designed door mechanisms, the Caprivi is the MRAP designed for Soldiers, by Soldiers. The Caprivi series of MRAPs are offered in standard configurations such as troop carriers, field ambulance, indirect fire support, recovery, command and control and long range surveillance. The unique design of the vehicle enables any Caprivi to be fully customizable to the end users’ needs and requirements.
  • Scorpion Armoured Pickup
    The Scorpion armoured pick up has been designed on a commercial chassis to provide a cost effective solution for urban police operations. The engine bay area has full protection to level CEN B6 through the usage of sidewall and under bonnet protection whilst the crew cabin received full protection equivalent to STANAG Level 2 ballistic protection. The vehicle offers an enclosed turret for protection of gunners, especially in urban areas where there is a threat from overhead in buildings. To the rear of the vehicle is an enclosed storage compartment with space for any equipment including drones, riot gear and personal equipment.
  • Commercial Armoured Vehicles
    MLS offers armouring of commercial vehicles to European BR and VPAM specifications. Our designs offer a discreet but highly reliable protection not only to VIPs but any individual who is exposed to different types of physical threats. MLS’s engineering and production teams understand the unique intricacies and challenges associated with increasingly high levels of protection required in VIP vehicles. MLS utilises highly advanced state of the art materials to design and fabricate the client requested protection envelope. All vehicles feature premium run-flat inserts, upgraded tyres, fuel tank protection, and optional protection for major engine components (radiator, battery box, fuse box, ECM). Other customized protection options are available on request.
  • Mobile Registration Vehicle
    The mobile registration vehicle is designed to offer mobile government citizen registration services around the customer’s country. Based on a commercial chassis the vehicle has comfortable seating in the office area for the operator and two civilians. Fully air-conditioned with two additional AC systems the vehicle offers a comfortable work environment whatever the weather. The office area is fitted with all necessary registration equipment such as cameras, fingerprint scanners and printers. All registration data is sent securely over VSAT satellite connection to the government’s chosen location. All systems are run off a silent running generator whilst the vehicle is deployed.
  • Prisoner Transport Vehicle
    The Prisoner Transport Vehicle is designed to securely carry up to 8 prisoners between secure locations. Based on a Mercedes Actros chassis and armoured to customer specifications it is also feature-rich with numerous situational awareness features as standard. Seating is also provided for up to 8 guards whilst the driver cab includes space for the vehicle commander / co-driver.
  • Canine Transportation Unit
    The Canine Transportation Unit is designed for hot environments where the health of working dogs during transportation and training is a high priority. With 6 x air-conditioned kennels, working dogs can be transported between locations whilst their kennel temperature can be monitored on the move by the driver / co-driver. Fitted with a high capacity generator the vehicle systems including the AC system can be run with the vehicle’s engine turned off.
  • Long Range Surveillance Vehicle
    The Long Range Surveillance vehicle is a low profile vehicle based on a GMC Yukon Denali XL. The main components of the system are a lightweight 360° X-Band radar integrated with long range daylight and thermal cameras mounted on a pneumatic mast. The vehicle is ideal for providing vulnerable point security during convoy moves as well as providing a fully integrated mobile surveillance system for VIPs at temporary locations.
  • Jamming Vehicle
    The MLS jamming vehicle is available in both soft skin and armoured configurations. Designed to keep up with VIP convoy speeds the vehicle is fitted with secure communications equipment, situational awareness features and MLS’s own tried and tested Sentinel V jamming system.
  • Vehicle Fitted Jammer (Sentinel-V)
    The MLS Sentinel vehicle hybrid jammer system is a next generation system harnessing the power of the latest in Software Defined Radio architecture. The system combines an extremely flexible and power efficient jamming unit combined with an interception unit capable of scanning for threats extremely quickly. Choose between fully Active, Reactive or Hybrid jamming modes dependent on concept of operations. Exciters and amplifiers are modular and so a system can be built to customer requirements.
  • Portable Jammer (Sentinel-P)
    The MLS Sentinel portable hybrid jammer system is a next generation system harnessing the power of the latest in Software Defined Radio architecture. The system combines an extremely flexible and power efficient jamming unit combined with an interception unit capable of scanning for threats extremely quickly all packaged in a wearable system under 20kg. Choose between fully Active or Hybrid jamming modes dependent on threat.
  • Drone Jammer (Sentinel-D)
    The MLS Sentinel drone jammer system uses similar system architecture to the Sentinel-P and Sentinel-V systems. The system works as a virtual fence against drones entering the perimeter of your infrastructure, jamming all known drone signals up to a height of 1,000m. Sentinel-D is a cost efficient means to protecting any size of perimeter without interfering with existing legitimate communications devices. The system works either stand alone or can be integrated with other detection systems.
  • Indoor Jammer (Checkpoint Plus)
    The MLS Checkpoint Plus can be used in a number of scenarios to block cellular, Bluetooth and WiFi signals within designated areas. Each unit houses up to 6 resource cards that are configurable to jam client specified bands. MLS offers a survey service to determine what signals are present to ensure accurate jamming with the right configuration of equipment.
  • IMSI Grabber (Roomshield)
    The Roomshield works in conjunction with the Checkpoint Plus to allow and block chosen mobile phones. The Roomshield unit identifies all devices within its range that have an active SIM card. Once identified, the unit is able to either allow the SIM card to continue operating or to block its access to the network.
  • KS2 Electronic Turret
    The KS2 Electronic turret offers a completely enclosed turret for a vehicle’s gunner. Although the turret has advanced electronic features for ease of use, the turret has fully redundant systems should the gunner need to operate the turret and weapon system manually. In addition, slew and elevation drives can be manual, electronic or electronic stabilized.
  • KS3 Electronic Stabilised Turret
    Available in both stabilised and non-stabilised variants, the KS3 turret allows the mounting of both a primary and a coaxial weapon offering the gunner a choice dependent on threat being faced.
  • Next Generation Remote Access (ECOS)
    Highly Secure Remote Access Solution for Terminalserver,VDI and Web Applications.
  • Email Security Gateway (LIBRA ESVA)
    Email is the main VECTOR for spreading malware, ransomware, phishing, spear-phishing and other types of EMAIL cyber attacks!
  • PRIVILEGED ACCESS MANAGEMENT (FUDO Security)
    Fudo provides every possible tool to supervise privileged remote sessions including: live sessions viewing, session sharing for both Fudo users as well as third parties. Furthermore proactive monitoring allows for notification alerts, suspension or termination of a suspicious session.
  • Big Data Analysis (Devo)
    “Devo offers the unique ability to rapidly collect and analyze data from every part of the business, providing Telefónica the ability to harness the power of data for competitive advantage and business success.”
  • Fraud Detection Solution for Online and Mobile Banking (ThreatMark)
    Detect and prevent fraudulent transactions thru online channels.
  • SAEEDURITY Consultancy
    The primary aim of SAEEDURITY Co. is to raise the level of cyber security among government agencies as well as private sector companies with a clear vision that is inclined towards minimizing cyber security threats and maximizing confidentiality, integrity and availability within an organisation.
  • Explorer Cases 9413

    Explorer Cases 9413

    EXPLORER CASES by GT LINE

    With the development and expansion of industries and activities which involve the use, transportation or storage of valuable and expensive equipment there has been a growing need for an effective and reliable system that could provide this degree of protection. When it comes to the firearms industry there is also a fourth factor that corroborates the need of a hard case: the security. Whether it is for travel for a match or tactical training away from home, for staying overnight in a hotel, or simply for raising the level of security of a truck gun the implementation of a tool such as a hard case could mean the difference between a gun in the hands of a good guy and a gun in the hands of a bad guy. This contemporary firearm training [nomad] lifestyle that involves a much more dynamic and mobile approach to tactical training, in which users often times move domestically in the US requires a high degree of protection, security and practicality. A tool such as a high quality hard case becomes almost as a "mobile safe". Because of the extremely high quality standards, Explorer cases are able to sustain the shift of action from an everyday urbanistic approach of protection from iniquitous acts to the conventional protective purpose from the elements out in the field; which is the actual origin of this type of case. Depending on type of use, time of exposure and other key climatic factors, the field can be an extremely demanding environment to which only very few quality-focused cases can withstand. The gasket's design is usually a noticeable failure point for water-tightness; in order to overcome this possible issue, Explorer, has focused on the manufacturing process rather than the design itself. Instead of utilizing the ubiquitous rubber-polymer tube of which the connection point could potentially be the weakest point, they have implemented a system that extrudes a foam-like material directly into the gasket housing. This innovative manufacturing process has proven to be effective and reliable. The IP67 waterproofness rating and the fact that it is retained without compromise throughout the lifespan of the case is directly related to the ruggedness of this gasket design, compared also to the weaker hollowtube design. Temperatures play a key role in the longevity of a gasket or sealant and Explorer does not utilize rubberized material O-ring or glue. As the temperature is decreased the rubber passes from a soft (easily deformed) and elastic state to a more rigid state and finally to a brittle glasslike condition. On the other hand glues tend to a detachment process when reaching higher temperatures, as well as freeze towards glaciation. The water tightness is achieved also through an intrinsically mechanical strength of the closure design. The latches are sized to obtain a strong, secure and constant pressure along the perimeter between the case and the lid. Despite this the opening and closing process are facilitated mainly by two factors: the double-action of the mechanism (with two pivotal points) and the relatively large surface of the latch. The hinges mechanism is reliable and the action is smooth and repeatable. The hinges are designed to optimize the efficiency on the field by opening up to 90Deg and by staying open without the necessity of two-hand manipulation. Unlike other products on the market, the Explorer case does not tip over when opened empty... Differently from similar products on the market, once closed, the Explorer cases latches do not make any [annoying] noise, which (even though it is not carried into direct combat action) is still, in our opinion, inappropriate in a "Tactical" weapons case. One aspect in which we really wanted to focus was the tolerances between the parts of the assembly. The very high grade of precision in the dimensions of the lid, main case and metal rod protects the mechanism from any external agent, even after prolonged use in dusty and sandy environments. The smoothness of the hinge mechanism is usually a substantial differentiation between high quality cases and less quality after some use in the field. The case is provided with three handles, a primary, larger, and two secondary smaller. The handles are well built and very durable, the injection-molded polymer is tough and does not bend under the heavy load of firearms. Explorer produces all hinges with extreme accuracy; even after prolonged field use, with the case exposed to the elements, the movement of the handle is solid and repeatable, and the metal rod does not show weak points or corrosion. Even after the testing and evaluation process the handles stay in position, which is an explicit indication of quality. The two secondary handles locate at the exact opposite side from each other provide a very comfortable two-men carrying solution, especially with heavier weapon systems. Of course with the 9413 one could only fit enough items, but with the larger models this feature could be vital. In the central portion of the case, between the primary-handle attaching points, are located the air valve and the luggage nametag. The manual pressure release valve is a key component for operation with variable barometric excursion. The valve is designed with an internal stop ring, for preventing the user from overrunning it and completely extract it. The nametag is protected by a translucent polymer shield and is only accessible when the case is open. Four latches are located relatively to the four hinges of the case. Next to the four latches are positioned four padlock-able points, and with two of them being metal plated there is the possibility to safely lock the case with either standard padlocks or TSA approved ones. Explorer offers three different padlocks, a combination, a heavy-duty brass with key and TSA-approved. The combination padlock is designed with the chamfering of the edge inherently constructed in the dimensions, covering the entire pin (for enhanced security from tools such as bolt cutters) as well as tightly securing it and preventing it from swinging, which may be causing noise. The case is provided with ball bearing wheels that enable a more comfortable and effective transportation of heavier items. The wheels are exposed enough to allow the case to be pulled from a wide range of angles, but the overall dimensional extremities still allow the case to stand in the upright position very solidly, even when loaded with firearms. The wheels are designed to be utilized also for pulling the case from a horizontal surface with an extremely low angle; this provides a high level of mobility when loading or unloading weapons from trucks of vehicles. Even after carrying the case in all types of terrains for several months, the wheels spin smoothly and freely, do not show any stress point or failure points, and are still very silent. The foam insert set consist of a convoluted panel for the lid, two pre-cubed sections and a thin stabilizing layer for the body. The pre-cubed foam allows for a high degree of customizability by the user and seems to withstand weight and time. As for the material utilized the main case sections are manufactured from an injection molded copolymer Polypropylene compound, which seems to have a good balance between rigidity and elasticity, for maximum toughness and protection. Throughout the heat of the summertime, the case has not shown any brittleness from the extensive direct sunlight exposure. On the bottom side of the case are located six rubberized feet for better stability both on surfaces and for stacking.
  • Eskan Adrana 50 Hostage and Crisis Recorder
    The Adrana 50 is hostage negotiation equipment, used to record phone conversations and to detect active notification of the incoming and outgoing messages and store them in the system memory.
  • XMini
    Comprised of our 5-axis carbon fiber structure, spindle, Integrated MQL system and full Siemens 840D controller, the XModule can be utilized in many ways. Mounted in virtually any orientation, the possibilities are endless and allows the XMINI to provide machine tool capabilities with robotic flexibility integrated into many custom manufacturing solutions.
  • ALTARIQ
  • Corporate Brochure-English
    Contain about the company and all its business units
  • Corporate Brochure - Arabic
    Contains information about the company and its business units
  • Bahri Logistics - English Brochure
    Talks about the activities and information related to Bahri Logistics business unit
  • Bahri Logistics Booklet - English
    Provides a quick glance of Bahri Logistics profile
  • Explorer Cases 15416
    The Explorer Cases 15416 is the longest rifle hard case available on the market and is able to carry an assembled .50 caliber sniper rifle. Due to the construction process and the due to the properties of the copolymer polypropylene, the case is rigid and provides protection along all axis of the content, despite the very generous dimensions. Mechanical strength is one of the most important aspects with such a long case. In order to protect and maintain zero and POA/POI during transportation the case has to keep its rigidity without compromising transportability with excessive weight. The balance between ribbing and the polymer compound delivers a great result even with these dimensions. The protective hard case is a vital element in equipment transportation, protection and storage. The very close relationship between hard cases and firearms revolves around the key concept of having the firearms stored and protected in order to be combat-effective when taken out and utilized, even with minimal preparation. One of the advantages of these protective solutions is that environmental effects do not alter the status of firearm during transport or storage. In the past, due to technological limitations, the ability to stored assembled rifles was compromised in some instances; for example, .50 BMG precision rifles or even sniper rifles with suppressors already attached (direct thread for example). Wider Latches with Safe Button The larger dimensions require a more secure locking and sealing system, hence the wider latches with the addition of a safe button. To ensure the maximum protection and sealing consistency the case features six latches, four on the longer edge and 1 per each side. Reinforced Hinges The four hinges are heavily reinforce and, despite the large dimension of the case, provide a smooth and unimpeded opening, even after being exposed to dusty or sandy environments. The case, when opened while empty, does not tip. Carrying Handles The 15416 case was designed specifically for platforms that are most likely going to be heavier; consequently, the carrying method needs to be effective for the user without obstructing the operating procedures of the case. The dimension, position and build quality of the handles featured by Explorer Cases are functional and comfortable. Self-Lubricating Wheels The inherent nature of this case is to efficiently carry weapon platforms that usually require disassembly or two man operation. The wheels of the 15416 are oversize and provide, in conjunction with the rigidity of the case, a very effective carrying solution on all sorts of terrain, despite the heavy load. •
  • Explorer Cases 13513
    With the rising need of enhanced precision rifle on modern battlefields, the SOF community is looking closely at the possible implementation of precision cartridges, like 6.5 Creedmoor and .260 Remington, within an AR10 frame. The need for precise fire from these platform requires and inherent higher degree of precision within the entire package, from the sniper rifle itself to optics and mounting systems. To achieve reliability and consistency in precision the proper care and maintenance of these platforms is key; the use of high quality and durable cases, for storage and transportation solution, aids the operators in successfully fulfilling the mission with confidence in their equipment. The 13513 case is able to protect a fully assembled AR-10 platform (or variant) with a barrel up to 18″ with its accessories (suppressor, thermal/IR clip-on optics, laser devices and additional magazines).
  • Hushmeeting smartphone
    Our ironclad Hushmeeting smartphones have been designed to prevent any attack regardless the network used: every device features a custom operating system (to prevent malwares and spywares infections by design), a post-quantum encryption layer and modified hardware (to prevent firmware-based attacks and vulnerabilities). These devices, fully designed at our laboratories, provide a full set of communication and collaboration functionalities: audio and video communication, chatting, file exchange and audio messaging, with a very high scalability and a low bandwidth consumption.
  • Hushmeeting laptop
    Our Hushmeeting laptop has been designed to supply a fully secure environment for communication and productivity. Featuring a custom operating system (to prevent malwares and spywares infections by design), a modified hardware (to prevent firmware-based attacks and vulnerabilities) and a strong encryption layer, it is enriched with a set of custom productivity tools to produce and share documents, without any fear for information leakages or attacks: a secure tool to produce documents, similar to Word, a tool similar to Excel to produce spreadsheets, a secure mail application, and a complete secure unified communication and collaboration framework for audio, video and data exchange. Like our smartphones, its security is completely independent from the used network and it is able to support the customer's security expectations even in the most demanding scenarios.
  • Hushmeeting
    Our Hushmeeting enterprise solutions are the most complete answer for governmental organizations, military departments, companies and VIP citizens who need to communicate with the guarantee of not being spied on. It has been fully developed in house with no exceptions (server, protocols, codecs, OS, HW, …), in order to grant our Customers the full control of the provided solution, without compromises. The solution can be fully customized by the Customer, choosing his own encryption algorithms and keys. Preventing any data breach, Hushmeeting is the only solution on the market granting a rich set of communication and collaboration features, such as audio, video, conferencing, messaging, file transfer, secure productivity tools for document, spreadsheet, email processing, support to field operations and remote critical activities via specific devices. Our solution complies the highest security standards, featuring military grade and post-quantum encryption algorithms: for top security scenarios, our secure smartphones and laptops are the only ones on the market granting a full protection at the software, hardware and operating system layers. Feedback Italia grants a real full technology control of its technology: installed at the Customer’s premises to prevent any unauthorized access by third parties, our solution allows a thorough source code inspection, giving our Customers the unique opportunity to autonomously check the system for backdoors and vulnerabilities.
  • Managed Security Line of Services
    Designed for organizations that lack the skills and expertise to protect themselves from sophisticated targeted attacks and insider threats, Odyssey's 24/7 Managed Security Line Of Services helps you: - Predict, - Detect, - Prevent and - Rapidly Respond to Cyberattacks before it is too late. Essentially acting as a remote extension of your security operations and operating out of 24/7 ISO 27001 certified Security Operations Centers (SOCs), Odyssey's Managed Security Line of Services empower you to promptly enhance your - Threat Anticipation (Threat Intelligence & Advanced Security Analytics) - Real-Time Visibility into your security posture - Detection and Incident escalation capabilities, - Data Forensics - Audit and Legal regulatory compliance capability.
  • IthacaLabs™ Risk Assessment Services
    Odyssey’s IthacaLabs™ Risk Assessment Services help organizations to Identify, Quantify, Prioritize Vulnerabilities and Configuration Weaknesses found on their mission-critical systems, applications, IoT, network and security devices. The outcomes of these services determine the organization’s level of Risk and cybersecurity preparedness.
  • M4A1
  • Modular Barrier - F11
    Unique and mobile solution against ramming attacks Fully portable and movable barrier (priority vehicles) Stops the passage of vehicles even in a hostile situation Quick and easy assembly, requires no tools PITAGONE ANTI-TRUCK-RAM BARRIERS ARE DESIGNED, DEVELOPED AND PRODUCED IN BELGIUM. Capable to stop a vehicle or truck launched at average speed Resist to a shock of a 7,5 tons truck launched at 48 Km/h Fully adjustable, the PITAGONE F-11 adapts to all surfaces and all terrain (including sidewalks, gradients and bumpy roads) Compact assembling elements, easy storage and transport Long service life, minimal maintenance
  • Pitagone F-11
    Specifications : F-11 : Anti-ramming barrier module : Height : 3,28 ft Weight : +/- 132 lbs (assembled) Distance between modules : 2,62 ft Punch Tip Mobile System
  • Bahri Logistics - Arabic Brochure
    Outlines information about Bahri Logistics activies
  • Falcon Ray
    Longest Effective Range in the Market Blocks GPS and Common ISM RF Bands (Customizable Upon Request)
  • AEROSCOPE
    AeroScope is a comprehensive drone detection platform that rapidly identifies UAV communication links, gathering information such as flight status, paths, and other information in real-time. This monitoring data stream helps users make an informed response as soon as possible.
  • X820 Industrial Drone
    A Quad-rotor Drone for Industry Application > Carbon fiber > 940mm Diagonal wheelbase > Max Flight Time: 45mins > Max Speed: 25m/s > Max Transmission Distance: 10Km > Max Flight Height: 1500m > Multiple optional Payloads (Thermal/zoom) > Satellite Positioning Systems: GPS / Beidou / GLONASS > Operating Temperature -20°C ~ 60°C (-4°F ~ 140°F) > All Weather (dust/rain proof) IP54
  • ARCON | Privileged Access Management
    ARCON Privileged Access Management suite helps in mitigating insider and advanced cyber threats by providing alerts, analytics, and monitoring of privileged users in real-time. The solution helps in mitigating insider and advanced cyber threats. With a host of advanced features, ARCON | PAM suite provides real-time threat alerts, analytics and monitoring that helps in preventing unauthorized access to the systems. The solution essentially provides a robust security framework whilst boosting operational efficiency.
  • IAM Managed Security Services
    Aujas offers engineering, design and build expertise in the security space to accelerate product development, build third party integrations for data exchange, actions and orchestration, and deliver made-to-order solutions to solve critical cyber security challenges. With hundreds of man years of experience under our belt, and our deep understanding of all cyber security domains, we bring to the table a potent accelerator for all your security related bespoke development needs.
  • NeuVector | Container Network Security
    twork visibility is difficult enough without pods and containers constantly scaling up and down. NeuVector makes it easy to view summary connection data and drill down into actual packet visibility for each container. When a threat is detected, NeuVector will automatically capture and display the packet info, making it easy to investigate. Suspicious activity can be investigated by easily turning on packet capture for one or more containers. Packet capture is also useful in testing and staging to debug applications before they go into production.
  • FusionSight – Night Vision Device
    FusionSight is a world-first digital night and day vision device providing smart fusion for threat and target accurate detection.
  • RSWS_MK2
    Smart gun management system for rifle storage
  • KPA
    Power Ascender
  • Dominator
    High performance lightbar designed and assembled in Saudi Arabia
  • RSWS-H1
    Rotation weapon management system for Handgun
  • R&S®SITLine ETH50
    Reliable Ethernet encryption everywhere
  • 3MP Smart traffic Capture Unit
    Dedicated camera for ANPR - HD resolution - Integrated IR - Professional shutter speed control - Built-in ANPR engine, equipped with deep learning algorithm - Multiple detection and recognition - Vehicle type recognition - Vehicle color recognition - Vehicle Manufacturer - Radar speed measurement
  • 8MP True WDR H.265+ EXIR Bullet
    1/2.5" Progressive Scan CMOS 3840 × 2160 @20fps H.265, H.265+ 120dB WDR IP67, IK10 IR range: up to 50 m 4 behavior analyses and face detection
  • 16 MP PanoVu Series 360° Camera+PTZ
    Hikvision DS-2DP1636ZIX-D/236(5mm) PanoVu Series 360° Panoramic + PTZ Camera, is able to capture panoramic images as well as close-up images to give consideration to both panorama and details. The panoramic images are captured by eight sensors, which could realize 360° panorama monitoring. The design of integration model and high speed PTZ can offer the function of fast detail positioning over panoramic area. Furthermore, with its advanced video analysis and multiple targets tracking algorithm, PanoVu camera also features a wide range of smart functions for multiple targets within the panoramic view filed, including intrusion detection, line crossing detection, region entrance detection, and region exiting detection. The camera could also output alarm signals to link the PTZ for tracking, benefitting users with great improvement on security efficiency.
  • 96 Deeplearning Super NVR
    Face picture analysis Modeling and analyze human faces in pictures captured by connected capture cameras. Realize blacklist alarm and stranger alarm via face picture library. Search target people via the search by picture and the search by name features Behavior detection events The false alarm filter feature enables the system to perform secondary recognition for the human body target in the behavior detection events (line crossing detection, intrusion detection) and effectively reduces the false alarm caused by the tree leaves shaking, shadow, light, vehicle, small animals, etc.
  • Intelligent 4 arms UAV
    Hikvision Falcon UAV system is made up of the drone, load, and ground station. UAV-MX4080AI receives control signal such as to perform task and send back the location information, flying data, and video from the camera to the ground station. The ground station sends the location information, flying data, and video to the command center to provide live video of the location.
  • Intelligent face recognition camera
    iDS-2CD8426G0/F-I adopts advanced deep learning algorithm and powerful GPU to realize instant face detection, capture, and comparison to accomplish face recognition and related alarm triggering. The camera can be widely used in retail industry and security departments, such as hotel, shopping malls to improve the VIP service, custom, airport to control some key passageway.
  • Powerful Hikcentral server
    The Hikvision Open Manage systems management portfolio includes innovative solutions that simplify and automate management tasks, making IT operations more efficient and more cost-effective throughout the server life cycle. Leveraging the incomparable agent-free capabilities of the embedded iDRAC with Life cycle Controller, server deployment, configuration and updates are rapid and worry-free. Remote monitoring and control of the s is provided by Open manage Essentials and can also enable anytime, anywhere mobile access, through Open Manage Mobile.
  • Smart Face Recognition Turnstile
    The DS-K3B601 series swing barrier with 12pairs of IR lights is designed to detect unauthorized entrance or exit. By adopting the swing barrier integrated with the access control system, person should authenticate to pass through the lane via swiping IC or ID card, scanning QR code, etc. It is widely used in attractions, stadiums, construction sites, residences, etc.
  • Smart Mobile NVR
    Connects 8-ch IP cameras via PoE interfaces. Connects 8 more IP cameras via PoE switch. Up to 1080p resolution of H.264/H.265 compression for each IP camera. Two pluggable 2.5-inch HDDs/SSDs, adopting hard disk vibration damping technology. Pluggable 3G/4G module and Wi-Fi module providing flexible data transmission solutions. Built-in GPS (Global Positioning System) module precisely positioning the vehicle via the satellite and recording the location information in the video stream. Information collection interfaces collecting driving information such as left/right turning, braking, reversing, etc.
  • Thermal & Optical Bi-spectrum PTZ Dome
    Hikvision DS-2TD4166-25/50 Thermal & Optical Bi-spectrum Network Speed Dome is applied to perimeter defense and fire-prevention purposes in critical infrastructures such as: airport, railway, prison, power station, 4S stores, and so on. The pre-alarm system helps you discover unexpected events immediately and protects you from property loss.
  • Thermometric Positioning System
    Hikvision DS-2TD6266-100C2L Thermal & Optical Bi-spectrum Network Positioning System is applied to frontier defense occasions, maritime defense occasions, port monitoring, airport perimeter security, and so on. The pre-alarm system helps you discover unexpected events immediately and protects you from property loss.
  • CN10 Data Sheet
  • CN20 Data Sheet

    CN20 Data Sheet

    Vidor Kis Marton

  • CN10 Solar Data Sheet

    CN10 Solar Data Sheet

    Vidor Kis Marton

  • Financial Institutions
    Securing payment diversity In a very short amount of time, advancements in digital technology have changed the way we live. In the not so distant past, forgetting your wallet meant a U-turn straight back home. Today, with a few swipes, taps or clicks on your smartphone, you can prove your identity, make a money transfer, sign a banking contract, order a ride, go shopping and dine out with friends. The trust of consumers is the basis for any form of transaction. But how can we ensure this effortless swiping doesn’t fall into the wrong hands? Biometrics for authentication and identification We all agree that security is what matters most when it comes to payment means and banking accounts, but sometimes it only adds stress. We have all been there before — forgetting a PIN code, struggling with cumbersome logins and passwords to check banking account balances on smartphones, or failing to make a transaction abroad or online even though you are the rightful cardholder. At IDEMIA, we believe security must not be at the expense of convenience. Our biometric solutions enable financial institutions to rely on a trusted identity, based on biometrics — whether a quick smartphone selfie or a fingerprint scan on a bank card — we allow banks to offer a secure and convenient experience at all times, be it in the physical or digital world. Payment for today and tomorrow From wearable cards to completely digitized wallets, there are more and more ways to pay. But did you know that most non-cash retail purchases are still done with a physical payment card? At IDEMIA, we obviously invest in the payment future with digital wallet and mobile shopping solutions, but we also continue to promote and lead innovation in the payment card business – with contact and dual interface EMV payment cards, because we know that the most difficult aspect of new technology adoption is changing user habits. This is why we keep enhancing the payment card that the vast majority of customers have already adopted, adding additional security measures such as dynamic CVV codes or fingerprint sensors that replace PIN numbers. We also observed that cardholders now want a sense of uniqueness. With our solutions, they can customize their card with a photo or they can earn flashy, exclusive membersonly metal cards. Banking anywhere, anytime A lost bank card is always a nightmare — calling to cancel it then waiting for a replacement. And imagine if this happens while traveling in some remote corner of the Earth, the problem becomes exponentially more difficult… until now. With IDEMIA’s innovations, banks can instantly issue a replacement card, in branch or on a smartphone, ensuring that users are never cut off from their resources. Subscribing to a new contract — credit loan, new payment card… — can be done remotely as well, with the same legal value as an in-person signature. Waiting several days, or even weeks, to finally receive a card is outdated. Today’s connected customers want quicker, more efficient processes and so do banks. At IDEMIA we ensure that any cardholder can get physical and digital cards in hand faster than ever.
  • Citizen Identity
    A person’s identity is precious One could argue that it is the second most precious thing after life itself. It allows you to exist in the eyes of society as well as to take an active part in it. With it, you can access many services such as education and health services or open a bank account. As such identity should be your most protected possession and yet, there are still many areas in the world where people do not have an identity and other areas where it is at risk of theft or fraud. Enroll, verify and match IDs The situation is a familiar one: you’re taking your first trip abroad. Before you see the sights and dive into the culture, you’ll need a passport. You take a trip to the local town hall, fill out forms and capture your biometric data. Authorities run the data through the system to verify your identity and ensure its uniqueness. Our innovations and solutions seamlessly handle this entire process, whatever the biometrics to be captured – fingerprint, face, and even iris in some countries. The same technology can be used in different markets and use cases: for driver license application or voter list preparation, to securely enroll patients and enhance health monitoring or for census for instance. Whatever the situation – whether in a large metropolis or remote and rural areas where access to these services is limited, our teams make this technology boundless. Issue and manage credentials Building trusted identity is a first key step. Ensuring the carrier of that identity can also be trusted enables its use. Our solutions secure your credentials both in the design of the document as well as in its production and personalization processes. Our documents include design elements that deter would-be fraudsters – holograms, secondary photos and several other patterns. Our production process is secured and our personalization techniques add another layer of security to our documents. For example, our LASINK technology engraves the photo in a unique pattern making the photo, generally the first thing a fraudster would change, incorruptible. Identify, authenticate and transact Everything we used to do in person – our banking and shopping, file and pay our taxes, renew passports or register a company – we can now do online from the comfort of our own homes. At IDEMIA, we ensure that continuity from physical to digital: we leverage all of the technology and innovations in the physical space to build a trusted identity that can be used in the digital space. This does not only represent huge advances in convenience and security for individual citizens, but it also means significant savings for governments. As citizens are increasingly able to prove their identity securely online, governments can digitize more services, increasing efficiency and their level of service at the same time.
  • Connected Objects
    Connected objects, a part of our daily life We have experienced tremendous technological advancements in recent times. The rise in connected objects is changing the lives of individuals as well as companies. The barriers once put in place by time and distance fade away. People and objects can now connect wherever and whenever necessary to exchange data, opening opportunities for new services based on powerful analytics. Connectivity At IDEMIA we transform our world with seamless connectivity. In addition to eSIM solutions to simplify access to cellular networks for consumer and M2M devices, we provide additional security measures to secure access to non-cellular networks as well. Our offer is network-agnostic. Frequent business travelers are all too familiar with the eternal hunt for WiFi. But as more and more PC makers adopt our eSIM technology, newer laptop models allow users to connect to the local cellular network on the spot — making connectivity issues a thing of the past. In the meantime, we also ensure that all the connected objects in homes or wherever users may be, from smart meters to health devices or security cameras, can securely connect to cellular or non-cellular networks to simplify their life with the same peace of mind. Confidence At some point, hacking can happen to the best of us — whether it impacts attractive targets in the physical world, such as production plants, cars or homes, non-tangible assets such as a company’s reputation, or human safety. With more and more devices connected through cellular or other networks, new security concerns emerge about confidentiality, privacy, integrity and the control of data. At IDEMIA, we understand that our clients need to secure data and ensure that it will not be tampered with, cloned or accessed by unauthorized parties. Our aircraft clients, for example, need remote software updates they can depend on. And like with any type of information, these updates are only valuable if the data sent and received is truly reliable. Convenience What is more secure, unique and convenient than your own face, your fingerprint or your iris to identify yourself? Our expertise in biometrics, applied to connected objects, is taking the hassle out of our everyday life. Relying on who you are we enable our clients to digitalize the consumer journey, combining security and ease of use. Remember the last time you stepped off the plane after a long flight, and then you saw it: the zigzagging line at the car rental desk. “There has to be a better way!” you thought to yourself. Thanks to IDEMIA, there is. No need to go to the rental desk anymore. Our solutions make it possible for you to securely register with the rental car service on your smartphone, identifying yourself with your ID document and a quick selfie. Next, the keys will be dematerialized and sent to your phone. All that’s left to do is to unlock the car with your phone, and off you go!
  • Mobile Operators
    Securing mobility and beyond The number of smartphone users will exceed 6 billion by 2020 – and for good reason. These mobile devices put an incredible amount of information in the palm of our hands: our schedules, banking details, emails, and anything else we might need. While technology responds to new connectivity challenges and opportunities – particularly with the growing IoT market – heightened protection of our digital identities is required, more than ever. Protect the networks and their users We may not realize it, but every time we make a phone call or send a text message, we have to provide secure credentials to access the network, our SIM card does this for us; it is our ID on the network. Despite the rising interest around eSIMs, traditional SIM cards are still the most widely distributed tokens in the world. At IDEMIA, we deliver over 1 billion every year. Our complete range from core to advanced SIM cards enables MNO and MVNO to meet different market connectivity and service requirements not only for their traditional mobile business, but also in the growing M2M and IoT environment. With these cards, our clients ensure that mobile users can have worryfree usage of their mobile phones and connected objects and they safeguard their mobile identities. Orchestrate the mobile user experience Today, we all expect hassle-free access to mobile networks and services. At IDEMIA, we support MNO and MVNO to make mobile devices work smoothly from day one, and every day after. To achieve that goal, we provide industry-leading eSIM lifecycle managment and subscription activation solutions. And once devices are connected, our clients can rely on our complete suite of mobile equipment configuration and real-time diagnosis solutions to enhance customer care based on accurate quality of experience monitoring and advanced SIM and device management. We also believe that establishing trusted identities is a vital step at the beginning of this mobile customer journey. With our mobile KYC biometric solutions MNO and MVNO can verify a user’s identity even at a distance and generate a unique and strong digital ID for subsequent authentication. We make customer identification as transparent and as digital as possible. Enable & secure the Internet of Things Connected objects already outnumber the human beings on Earth. They are everywhere around us, transforming industrial processes, energy metering, healthcare, home surveillance and much more. At IDEMIA we understand that this scattered IoT ecosystem, besides all its promises, also brings new challenges to MNO and MVNO to guarantee perfect service continuity and ensure the optimum security of all data exchanged. We provide our clients with dedicated platforms not only for the remote management of subscriptions but also to accurately measure network quality and availability at the object level. We also invest in network-agnostic solutions to help ensure endto- end security between connected objects and application servers.
  • Public Security
    Protecting people and places Travel isn’t what it used to be! People today are in constant motion – moving faster and traveling further than ever before. While this spike in movement around the globe brings our societies closer, it also generates new demands for increased efficiency and safety for public authorities. Enhanced, adaptable, strengthened and self-sovereign identity that creates a safer world for everyone. Not long ago, we experienced a new wave of technology that drastically changed our world. Today, the pace of change quickens with each passing moment. We’re shifting from an ownership economy to a services economy, switching from physical documents to electronic ones, moving from in-person to online – all developments that generate a spike in exchanges and new business models involving new sectors, new players, new issues and new threats. Information now travels rapidly around the digitized world, defying boundaries and breaking the traditional codes of security. Empowering people to enjoy life through trusted identities At IDEMIA, we embrace this new reality and we understand the security concerns that accompany advancement. We analyzed the world around us and reinvented the concept of identity. We call it Augmented Identity – an identity that ensures privacy and trust and guarantees secure, authenticated and verifiable transactions. An identity that is so enhanced and adaptable that it allows us to truly enjoy life – because securing our identity is key to making our world a safer place A safer, more streamlined identification We now use our identity to pay, travel, cross borders, commute every day, have fun, open a bank account, seek medical care and use our connected devices – and this list will only continue to expand in the coming years. Given the vast range of environments and usages, securing our identity has become mission critical in the world we live in today. However, we recognize that even the strictest security measures are useless if they complicate usage – they must then be convenient and user-friendly. We also observed that our lifestyles demand a level of continuity never seen before. Indeed, we need our identity to travel with us seamlessly – whether in the physical or digital world or for government, civil or commercial usages.
  • Security Fog
  • Security CIT Samsonite
  • Security Seals
  • M16 Dual lens Thermal camera
    True to the original: Weatherproof and robust, the latest successor to our successful M1 through M12 dual camera models features interchangeable sensor modules as well as the latest MOBOTIX system technology. The result is a product completely unrivaled in terms of performance, functionality and design.
  • S16 DualFlex
    The S16 from MOBOTIX is a weatherproof system that stands out first and foremost for the extremely flexible installation options it offers. Two sensor modules are connected to the concealed camera housing via cables up to three meters long. This makes it possible to discreetly monitor two neighboring rooms with just a single camera.
  • c26 Indoor 360°
    The c26 is the smallest and lightest MOBOTIX hemispheric complete video system for ceiling installation indoors. Its features include a light-sensitive 6MP day or night sensor and MxAnalytics video analysis tools, which can be used for depicting customer movements in sales rooms, for instance.
  • USVs B-SERIES-Arabic
  • USVs B-SERIES - English
  • B-250
  • Scout Camera
    The Scout camera is remote smart intelligence motion camera which can both store and transmit pictures over a low data rate network
  • UMRAmini MK3
    UMRAmini MK3 is a miniaturized wireless seismic & acoustic sensor for detection and classification of human activity
  • 13.5m Interceptor
    The 13.5 Meter Fast Interceptor is certified by the DNV and This has been designed to serve our professional Coast Guard and Naval forces for regular coastal and offshore patrol duties, intercepting anti-symmetrical threat facilities in territories of the coastal area. These Interceptors have a formidable reputation and are currently in service with UAE Coast Guard.
  • 16m Combat Boat
    Designed and engineered by Al Fattan Ship Industry – Composite Division, the 16 Meter Combat Boat has the capability to deliver a large group of troops into a combat zone through rough and shallow waters at a high rate of speed. It was constructed from a combination of fiber glass and aluminium fitouts to minimize lightship weight and maximize its capacity to carry combat-ready troops, gears, weapons, ammunitions, a captain, and a helmsman, along with all other provisions. The Combat Boat was built to serve as a fast-attack and multi-purpose military boat that can be utilized for: • Combat • Troop Carrier • Patrolling / Intercepting • Surveillance • Interdiction • Search and Rescue
  • Mesh PIR
    The Mesh PIR is a small and rapidly deployable passive infraRed sensor for fast and reliable detection of travel direction of a moving target
  • Gateway VMS
    The flexnet Gateway and VMS are highly advanced base station that can store and transmit data, pictures and video. It works as a hub in the flexnet network, communicating between sensors and backbone network. The gateway have two integrated radios and interface to other communication such as 3G/4G, satcom or IP radio.
  • أكسجين التحاليل الجنائية
    استخراج بيانات المحمول يقدم استخراج البيانات من iOS ،Android ، و Windows Phone ، وأجهزة BlackBerry ، والهواتف العادية ،الوسائط وبطاقات SIM. اكتساب في وقت واحد من عدة الأجهزة المتاحة. يقوم البرنامج باستيراد نسخ احتياطية متعددة والصور ، بما في ذلك النسخ الاحتياطي لـ iTunes و Android و BlackBerry ،صور JTAG و Chip-off ، وغيرها الكثير. يستخدم العديد من طرق الملكية لتجاوز أو تعطيل قفل الشاشة على الأجهزة المحمولة ، بما في ذلك سامسونج ، LG ، وموتورولا ، والرقاقات الصينية منها. البرنامج يجد تلقائيا كلمات السر إلى النسخ الاحتياطية والصور المشفرة باستخدام القوة الغاشمة ، القاموس ، Xieve ، وغيرها من الهجمات. استخراج البيانات السحابية يسمح لك بالوصول إلىiCloud، Google، Microsoft، Samsung، Huawei accounts، E-mailالخادم والخدمات الأخرى ، مثل Facebook و Twitter و Dropbox وWhatsApp ، إلخ. البرنامج قادر على استيراد وتحليل استكمال النسخ الاحتياطية على iCloud (عادة ما يصل إلى 3 من كل جهاز). استخراج بيانات طائرة بدون طيار تمكن أكثر الطائرات بدون طيار مطولا تحليل البيانات وتحليلها من مقالب المادية، وسجلات الطائرات بدون طيار تطبيقات الهاتف المحمول. يمكن للبرنامج استيراد الطائرة بدون طيار المادية تفريغ وتحليل مواقع GPS التي تعرض بيانات المسار القيّمة وكذلك البيانات الوصفية مثل السرعة والاتجاه والارتفاع وغير ذلك يمكنك استيراد ملفات السجل بدون طيار مباشرة إلى خرائط لتصور المواقع وتتبع مسار الرحلة بدون طيار.علاوة على ذلك ، يتوفر تحليل البيانات من تطبيقات الطائرات بدون طيار من أجهزة iOS و Android. يمكن خبراء الطب الشرعي فكالصور ومقاطع الفيديو بدون طيار ، والطوابع الزمنية وغيرها الكثير بيانات قيمة. استيراد بيانات تقارير الاتصالات تمكن من استيراد بيانات المكالمة سجلات في أي شكل وردت من مقدمي الاتصالات. البرنامج يرشدك بشكل مريح من خلال عملية CDR استيراد ورسم الخرائط الميدانية ، بسهولة تحويل البيانات إلى تنسيق موحد.بمجرد تحويلها ، يسمح لك البرنامج بتحليل ملفات CDR المعالجة وسهولة تحديد المباشر وغير المباشر الروابط بين المتصلين المختارين في الرسم البياني المرئي. إذا كان ملف CDR يحتوي على إحداثيات جغرافية ، حيث يستغرق نقرة واحدة لفتحها في خرائط. يمكن حفظ النتائج التي تمت معالجتها دليل لمزيد من التحليل. الخرائط الجغرافية يكتسب الإحداثيات الجغرافية من الجميع المصادر المحتملة بما في ذلك الأجهزة المحمولة والطائرات بدون طيار والسحابة التخزين وبطاقات الوسائط والصور المستوردة. بمجرد تحليلها ،يمكن الاطلاع على البيانات داخل إما الخرائط عبر الإنترنت أو دون اتصال.الخرائط هي أداة متقدمة تقدم:• تحديد أماكن زيارة صاحب الجهاز بشكل متكرر• تصور حركات المستخدم خلال فترة محددة منزمن• تحديد المواقع الشائعة لعدد من مستخدمي الأجهزة• العمل بسلاسة مع مجموعات كبيرة من النقاط الجغرافية
  • البرنامج الاستباقي لاستعادة كلمات المرور
    (Proactive System Password Recovery ) إذا كان باستطاعة المستخدم الولوج إلى نظام ويندوز فإن هذا البرنامج يستطيع القيام باستعادة الكثير من كلمات المرور المختلفة على الفور ، والسماح ﻓﻲ الوقت نفسه بالقيام بهجمات ذات إمكانية تخصيص عالية لاستعادة باقي الأنواع، كما يمكنه أيضاً عرض المعلومات الخفية ﻓﻲ النظام مثل معرف المنتج ومفتاح القرص المدمج
  • برنامج إلكُم سوفت لاستعادة نظام التشغيل
    إن ما يقرب من أربعين بالمائة من مكالمات طلب الدعم الفني تتعلق بكلمات المرور المنسية وعدم القدرة على تسجيل الدخول، ولكن الآن يمكن استعادة أو إعادة ضبط كلمات المرور الخاصة بنظام ويندوز بسهولة تامة وعلى نحو تلقائي! فلا حاجة بعد الآن إلى إعادة تهيئة القرص الصلب أو إعادة تثبيت نظام ويندوز ، فكل ما تحتاج إليه هو الإقلاع من القرص المدمج وكسر كلمة المرور ﻓﻲ غضون دقائق. ويمكن لهذا البرنامج إعادة ضبط كلمات مرور للحسابات فوراً مع إمكانية شن هجمات واسعة النطاق لاستعادة كلمات المرور الأصلية
  • البرنامج المتطورلاستعادةكلمات مرور ووردبرفكت أوفيس
    يمكنك الآن أن تفتح مجدداً مستندات كوريل أوفيس (Corel Office ) المحمية بكلمات مرور باستخدام هذا البرنامج بسرعة و بشكلٍ تلقائي ! إن هذا البرنامج يكشف سريعاً كلمات المرور التي تحمي المستندات المنشأة ببرامج كوريل أوفيس و ورد برفكت (Corel Office WordPerfect ) ، وكاترو برو (Quattro Pro) ، وبارادوكس (Paradox ) دون الحاجة إلى هجمات مطولة أو إعدادات متقدمة، فكل ما عليك فعله هو تشغيل البرنامج والنقر على زر " افتح" (Open) لتحصل على كلمة المرور التي تريدها ﻓﻲ غمضة عين! ويمكن لهذا البرنامج استعادة كلمات المرور التي تحمي المستندات المنشأة من جميع إصدارات برنامج كوريل و ورد برفكت أوفيس (Corel WordPerfect Office ) ، ويدعم جميع خيارات الحماية الخاصة به، كما يمكنه التعرف على كلمات مرور المستندات المنشأة ببرامج و ورد برفكت (*.wp, *.wpd ) ، وكاتروبرو (*.qpw, *.wb?, *.wq? ) ، وبارادوكس (*.db ) ، واستعادتها ، وكذلك الأمر بالنسبة ل كلمات المرور الخاصة بحسابات برنامج كوريل و ورد برفكت ليتنينج (Corel WordPerfect Lightning)
  • البرنامج المتطور لاستعادة كلمات مرور سيدج
    يمكِّن هذا البرنامج من استعراض كلمات مرور المستخدم والمدير ﻓﻲ برنامج المحاسبة (Sage PeachTree Accounting) ، وفتح مستندات (ACT! ) على الفور، ويمكِّن أيضاً على استعادة أو تبديل كلمات المرور التي تحمي ملفات (BLB ) و (MUD) و (ADF ) و (PAD ) المنشأة بواسطة مجموعة برمجيات ACT! أكنت تعمل على كمبيوتر محلي أو أحد الأجهزة البعيدة . ويقوم البرنامج المتطور لاستعادة كلمات مرور سيدج على الفور بكشف كلمات المرور التي تحمي المستندات التي تقوم بتخزينها جميع إصدارات مجموعة ACT! وبعدها يقوم بإعداد قائمة بكلمات مرور المستخدمين والمدراء ﻓﻲ برنامج المحاسبة Sage PeachTree Accounting
  • البرنامج المتطور لاستعادة كلمات مرور صناديق البريد
    يقوم البرنامج باستعادة بيانات تسجيل الدخول وكلمات المرور المخزنة على الأجهزة المحلية والتي تحمي حسابات البريد الالكتروني والملفات الشخصية ، ويدعم الكثير من برامج البريد المنتشرة سواء البرامج التابعة لشركة مايكروسوفت أو من شركات أخرى،ويقوم باستخدام أداة محاكاة لمخدم البريد(POP ۳ ) أو (IMAP) من أجل استعادة كلمات المرور الخاصة لهذين النوعين من الحسابات ﻓﻲ جميع برامج البريد الالكتروني الموجودين حالياً
  • البرنامج المتطور لاستعادة كلمات مرور لوتس
    يقوم هذا البرنامج باستعادة كلمات المرور التي تحمي المستندات المنشأة ببرنامج (IBM) أو لوتس سمارت سوت (Lotus SmartSuite) على الأجهزة المحلية أو البعيدة، ويقوم بتنظيم واستعادة كلمات مرور مستندات لوتس أورجانيزر (Lotus Organizer ) ، ولوتس وورد برو (Lotus WordPro) ، ولوتس ١ - ٢ - ٣ (Lotus ۱ - ۲ - ۳ ) ، ولوتس أبروتش (Lotus Approach) ، وفريلانس جرافيكس (Freelance Graphics ) ، بالإضافة إلى كلمات م رور بروتوكول نقل الملفات (FTP ) ، وكلمة مرور المخدم الوكيل )بروكسي ( الموجودة ﻓﻲ مكونات برنامج لوتس سمارت سوت
  • البرنامج المتطورلاستعادةكلمات مروربرامج (الدردشة)
    يقوم هذا البرنامج باستعادة فورية لبيانات تسجيل الدخول وكلمات المرور التي تحمي حسابات المستخدمين ﻓﻲ العديد من برامج التراسل الفوري (المسنجر) . كما أنه يدعم حالياً أكثر من سبعين نوع مختلف من برامج الدردشة هذه، وبالتالي فإنه أكثر برنامج ضمن هذا التصنيف انتشاراً وعالمية، وإذا كان هناك أكثر من حساب واحد ﻓﻲ النظام فإن هذا البرنامج يقوم باستعادة جميع كلمات المرور
  • البرنامج المتطور لاستعادة كلمات مرور انتويت
    يمكنك الآن استعادة كلمات المرور المفقودة أو المنسية لملفات انتويت كويكن (Intuit Quicken ) ، وكويكن لاير (Quicken Lawyer ) ، وكويك بوكس (QuickBooks) و ضمنها الإصدارات الدولية متعددة اللغات
  • البرنامج المتطورلاستعادةكلمات مرورقواعدبيانات SQL
    يمكنك الآن وعلى الفور استبدال أو إعادة ضبط كلمات مرور المفقودة أو المنسية للمستخدم أو للمدير التي تحمي قواعد بيانات مايكروسوفت (Microsoft SQL Server) . فلم يعد هناك حاجة لتثبيت قواعد البيانات SQL لاستعادة كلمة مرور، أو كسر حماية قواعد البيانات المحمية بكلمات مرور من أي حاسب ، فكل ما تحتاج إليه لاستبدال أي كلمة مرور سواء كانت خاصة لمستخدم أو لمدير هو هذا البرنامج وملف master.mdf . ويدعم البرنامج برنامجي م ا يكروسوفت SQL Server ومايكروسوفت (SQL Server Express ۰۰۰۲ / ٥۰۰۲ / ۸۰۰۲ ) . يقوم البرنامج المتطور لاستعادة كلمات مرور قواعد بيانات (SQL ) بإعادة ضبط أو استبدال كلمات المرور مهما كان طولها أو تعقيدها أو اللغة التي كتبت بها أو نظام تشفيرها، وهو يعمل على الفور دون القيام بهجمات مطولة ودون الحاجة إلى إعدادات متقدمة
  • برنامج إلكُم سوفت لكسر كلمات مرور الانترنت
    يظهر هذا البرنامج بشكلٍ فوري كلمات المرور الخاصة بالإنترنت، ويستعيد بيانات تسجيل الدخول، وكلمات المرور التي تحمي مجموعة متنوعة من موارد الإنترنت، وصناديق البريد لمختلف برامج البريد الإلكتروني. وتدعم الأداة الجديدة لاستعادة كلمات المرور استعادة فوريةً لتلك الكلمات والاستمارات المخزنة (Forms) ، وبيانات التعبئة الذاتية (AutoComplete) ﻓﻲ برنامج متصفح الإنترنت من مايكروسوفت (IE) ، وكلمات مرور صناديق البريد الإلكتروني، وتعريف الهوية ﻓﻲ جميع إصدارات برنامج مايكروسوفت أوتلوك إكسبرس (Microsoft Outlook Express ) وكلمات مرور جميع أنواع الحسابات وملفات (PST ) من برنامج مايكروسوفت أوتلوك ، وكلمات مرور حسابات البريد الإلكتروني ﻓﻲ برنامج ويندوز ميل (Windows Mail ) ، وبرنامج ويندوز لا يف ميل (Windows Live Mail ) ، كما يدعم البرنامج أيضاً متصفحات سفاري (Apple Safari ) ، كروم (Google Chrome) ، فايرفوكس (Mozilla Firefox ) وأوبرا (Opera)
  • البرنامج المتطور لكسر كلمات مرور مجموعة أوفيس
    يقوم هذا البرنامج بكسر حماية المستندات المنشأة باستخدام برنامج مايكروسوفت أوفيس وورد و إكسل ٩٧ و ٢٠٠٠ ، وكذلك المستندات المخزنة باستخدام برنامج مايكروسوفت أوفيس XP و ٢٠٠٣ ﻓﻲ وضع التوافق مع أوفيس ٩٧ / ٢٠٠٠
  • البرنامج المتطورلاستعادة كلمات مرورملفات الأرشيف
    استرجاع كلمات مرور الحماية أو إلغاء تأمين ZIP و RAR المشفرة الأرشيفات التي تم إنشاؤها مع جميع إصدارات أرشفة شعبية. استعادة كلمات السر للأرشيف العادي واستخراجها الذاتي إنشاؤها مع PKZip و برنامج لضغط الملفات ، RAR و WinRAR تلقائيا أو بمساعدتكم. فتح مضمون من المحفوظات التي تم إنشاؤها باستخدام برنامج لضغط الملفات 8.0 وفي وقت سابق أقل من ساعة واحدة ممكن عن طريق استغلال عيب في التنفيذ. ميزة Advanced Password Password Recovery تتميز بالتوافق التام بين أنواع مختلفة من المحفوظات ، ويعرف نقاط ضعف معينة أنواع الحماية ويوفر أفضل أداء في فئته فتح جميع أنواع المحفوظات.
  • البرنامج المتطورلاستعادةكلمات المرورﻓﻲ ملفات PDF
    يمكنك الآن استعادة كلمات مرور ملفات PDF وإزالة كافة القيود الموضوعة عليها فوراً ، وكذلك فتح الملفات المحمية بكلمة مرور سريعاً وبكفاءة، بالإضافة إلى إزالة حماية المستندات من هذا النوع فوراً وذلك من خلال التخلص من القيود الموضوعة على الطباعة والتعديل والنسخ، فهذا البرنامج يمكنه كشف أو التخلص على الفور من كلمات المرور التي تحمي أو تؤمن هذا النوع من المستندات والتي تم إنشاؤها بواسطة جميع إصدارات أدوبي أكروبات أو أي برنامج آخر
  • مدقق كلمات المرور الاستباقي
    يساعد هذا البرنامج مدراء الشبكات على فحص مدى أمان شبكاتهم وذلك عن طريق تدقيق كلمات مرور الخاصة بحسابات المستخدمين، ويكشف هذا البرنامج إلى أي مدى هذه الشبكة آمنة عند تعرضها للهجوم من خلال الكشف عن كلمات المرور غير الآمنة، ويقوم هذا البرنامج بما يلي: • تحديد مدى الأمان الذي تتمتع به الشبكة الحاسوبية للشركة. • كشف كلمات المرور الخاصة بحسابات المستخدمين. • القيام بهجمات باستخدام أسلوب القوة الضاربة أو الهجوم المعجمي أو باستخدام قناع (Mask) من داخل أو خارج الشبكة. • الكشف عن ٩٥ % من كلمات المرور ﻓﻲ دقائق فقط
  • البرنامج المتطورلاستعادةكلمات المرورمن مجموعةأوفيس
    أصبح بالإمكان فك تشفير المستندات والوثائق لجميع إصدارات مايكروسوفت أوفيس المكتبية ابتداءاً بداية من الإصدار ٢٫٠ وحتى الإصدار الحديث ٢٠١٣ ، حيث يتيح القدرة على استعادة كلمات مرور ملفات برامج مايكروسوفت وورد (Word ) ، وإ كسل (Excel ) ، وآكسيس (Access) ، وأوتلوك (Outlook ) ، وبروجيكت (Project ) ، وموني (Money ) ، وبوربوينت (PowerPoint ) ، وفيزيو (Visio ) ، وببلشر (Publisher ) ، ووننوت (OneNote) ، و النسخ الاحتياطي (Backup ) ، و (Schedule+ ) و البريد الإلكتروني (Mail ) ، ويمكنك أيضاً إعادة ضبط كلمات المرور الخاصة بأداة مراقبة المحتوى (Content Advisor ) ﻓﻲ متصفح الإنترنت، وفتح أي مشروع (VBA) محمي بكلمة مرور من خلال استغلال الثغرات الأمنية بطريقة الباب الخلفي (backdoor )
  • مستكشف إلكٌم سوفت للنسخ الإحتياطيةلأجهزةبلاك بيري
    إمكانية الوصول الشرعي إلى المعلومات المخزنة في النسخ الاحتياطية التي يتم إنتاجها باستخدام إصدارات أجهزة الكمبيوتر الشخصي وأجهزة Mac من BlackBerry Desktop Software. مراجعة سجلات المكالمات والوصول إلى رسائل البريد الإلكتروني والرسائل القصيرة ورسائل الوسائط المتعددة وعرض معلومات المنظم المخزنة في أجهزة BlackBerry.
  • برنامج إلكُم سوفت لتدقيق أمان الشبكات اللاسلكية
    يسمح هذا البرنامج لمدراء الشبكات بالتحقق من مدى أمان الشبكة اللاسلكية الخاصة بشركة ما، وذلك من خلال القيام بفحص وتدقيق للشبكات اللاسلكية المتوفرة، يستخدم هذا البرنامج تقنيات فعالة مسجلة ببراءة اختراع، وهي التسريع باستخدام المعالجات الرسومية، ومن خلال هذه ا لتقنية يحاول البرنامج الوصول إلى كلمات المرور النصية الأصلية الخاصة بالتشفير من النوع WPA/WPA ۲ -PSK من أجل اختبار مدى أمان الشبكة اللاسلكية
  • حزمة إلكُم سوفت لاستعادة كلمات المرور
    حزمة متكاملة من الأدوات البرمجية المتخصصة لاستعادة كلمات المرور والتي تسمح لمستخدميها ﻓﻲ الشركات الخاصة والمصالح الحكومية بإزالة الحماية عن أقراص الحاسوب وأنظمة التشغيل، بالإضافة إلى فك تشفير الملفات والمستندات المحمية بواسطة برامج الحماية شائعة الاستخدام . وتعتبر هذه الأدوات البرمجية هي الأسرع ﻓﻲ استعادة كلمات المرور والأسهل استخداماً مقارنةً بغيرها من البرامج المتاحة ﻓﻲ الأسواق كما أنها الأقل سعراً وذلك استناداً إلى الاختبارات التي أجريت عليها داخل الشركة وعلى التعليقات الواردة من عملائنا
  • حزمة إلكُم سوفت الجنائية للأجهزة النقالة
    تُمكن مجموعة الأدوات الجنائية للأجهزة النقالة هيئات تطبيق القانون، والشركات والحكومات من الحصول على تحليل محتوى مجموعة واسعة من الأجهزة النقالة . حيث تُمكن الخبراء القيام باستحواذ مادي، ومنطقي وعبر الأثير للهواتف الذكية والأجهزة اللوحية، وكسر كلمات المرور وفك تشفير النسخ الاحتياطية للأجهزة النقالة، عرض وتحليل المعلومات المخزنة ﻓﻲ الأجهزة النقالة . وتقدم خصم يصل إلى 30% مقارنة مع شراء أدوات منفصلة تشابه هذه الحزمة بمكوناتها، فهي توفر أفضل قيمة ﻓﻲ السوق . وذلك استناداً إلى التجارب المنزلية وملاحظات العملاء، وهي من بين أفضل الحزم ﻓﻲ السوق، وغالباً ما تقدم ببساطة وظائف فريدة من نوعها غير متوفرة ﻓﻲ أي مكانٍ آخر.
  • برنامج إلكُم سوفت لاستعادة كلمات المرور الموزعة
    يقوم بكسر كلمات المرور المعقدة ، واستعادة مفاتيح التشفير القوية ، وحل رموز شيفرة الوثائق ﻓﻲ بيئات الإنتاج. يعد هذا البرنامج أحد الحلول المتقدمة التي تفيد هيئات البحث الجنائي والإدارات الحكومية ، وخدمات استعادة كلمات المرور والبيانات ، والشركات التي بها حاسبات متقدمة من نوع محطة العمل (Workstation) متصلة عبر شبكة محلية أو عبر شبكة الانترنت . ويستخدم هذا البرنامج تقنيات تسريع فريدة من نوعها بالإضافة إلى إمكانية التوسع الخطي دون المزيد من الأعباء ، مما يجعله أسرع برنامج لاستعادة كلمات المرور وبفارق كبير عن غيره من البرامج كما أنه يعد الأكثر تقدماً من الناحية التقنية ﻓﻲ استعادة كلمات المرور مقارنة بالمنتجات المتاحة حالياً ﻓﻲ الأسواق
  • أدوات إلكُمسوفت البرمجية الجنائية لأنظمة تشغيل iOS
    يمكنكم الآن القيام بتحليل جنائي كامل لبيانات المستخدم المشفرة المخزنة ﻓﻲ بعض أجهزة التليفون المحمول آي فون (iPhone) والحاسب اللوحي آي باد (iPad) ومشغل الوسائط آي بود (iPod) مهما كانت إصدارة نظام التشغيل iOS التي تستخدمها هذه الأجهزة، وتسمح هذه الأدوات البرمجية الجنائية للمستخدمين العاملين ﻓﻲ هذا المجال بالحصول على نسخة طبق الأصل (bit -to -bit) من ملفات النظام ﻓﻲ هذه الأجهزة والحصول على الكلمات المرورية التي يحتويها الهاتف (مثل الشيفرات السرية وكلمات المرور ومفاتيح التشفير ) بالإضافة لإمكانية فك تشفير ملف التفريغ الخاص بالنظام، وتتيح هذه الأدوات للمستخدم الحصول على معظم البيانات بشكلٍ فوري
  • برنامج إلكُم سوفت لكسر كلمات مرور الهواتف
    يمكِّن هذا البرنامج من الوصول إلى المعلومات المخزنة ﻓﻲ أنظمة iOS ، وسحابة آبل، والأجهزة المحمولة كهواتف بلاك بيري ١٠ وهاتف ويندوز . وهو يدعم جميع إصدارات هواتف بلاك بيري (BlackBerry ) والهواتف الذكية من شركة آبل حتى يومنا هذا، وبالتالي فهو يعتبر الأول من نوعه الذي يستخدم أسلوب استعادة كلمات المرور باستخدام تقنية التسريع بالمعالجات الرسومية للحصول على كلمات المرور التي تحمي النسخ الاحتياطية ﻓﻲ أجهزة آي فون ) iPhone ( وآي بود ) iPod ( وذلك بمساعدة بطاقات عرض متعددة من إنتاج شركتي (AMD) وإنفيديا (NVIDIA) المتوفرة بأسعار المستهلك أو حتى أجهزة تابلو (Tableau TACC ۱٤٤۱ )
  • مستكشف إلكٌم سوفت للسحابة
    أتريد أن تعلم ما يعرف جوجل عنك ! مستكشف إلكُم سوفت للسحابة يجعل من السهل تحميل المعلومات التي قمت بجمعها باستخدام هذا الباحث العملاق. و الوصول إلى سجل التصفح والبحث ، وعرض جهات الاتصال و الملاحظات ، و رسائل برنامج المحادثة هانغ آوت، والصور من حسابك ﻓﻲ صور جوجل . يستخدم هذا البرنامج من قبل اختصاصيين ﻓﻲ التحقيق الجنائي الرقمي لتسريع التحقيقات . موفراً خدمة تحميل الكل ﻓﻲ واحد ، وعرض وتحليل المعلومات ذات الصلة، مما يجعله لا يقدر بثمن عندما يتعلق الأمر بالتحقيق ﻓﻲ أنشطة المستخدمين على الإنترنت . العارض التكاملي يعرض البيانات المنزلة ﻓﻲ شكل قابل للقراءة، مما يجعل من السهل تحليل دوائر اتصال المستخدمين، وأنشطة البحث و التصفح . يتضمن العارض وظيفتي التصفية الفورية و البحث السريع . مما يجعل من السهولة بمكان العثور على بعض الأسماء، أو رسالة أو اعتمادات مصادقة موقع إنترنت فما عليك إلا أن نكتب جزءاً من الكلمة التي تبحث عنها ﻓﻲ مربع البحث
  • مستكشف إلكٌم سوفت لبرنامج واتس أب
    هذه الأداة من إلكُم سوفت تقوم على استحواذ وفك تشفير وعرض سجل اتصالات واتس أب . وتوفر خيارات استحواذ متعددة وذلك لاستخراج وفك تشفير بيانات واتس أب من النسخ الاحتياطية المحلية ومن نسخ iOS الاحتياطية السحابية (آي تيونز والسحابة iCloud ) ، وتدعم استخراج نسخ واتس أب الاحتياطية الموجودة على محرك الأقراص السحابي. يمكن فك تشفير النسخ الاحتياطية المشفرة تلقائياً بشرط أن يتم تزويدها بكلمة المرور الصحيحة . إن تنزيل نسخ السحابية الاحتياطية من سحابة آبل ومحرك الأقراص السحابي يتطلب معرِف آبل للمستخدم وكلمة المرور أو استخدام رمز المصادقة الثنائي المستخرج من الحاسب الخاص بالمستخدم . يقدم العارض المدمج عرض مناسب لـ الرسائل والمكالمات والصور المخزنة ﻓﻲ قواعد بيانات واتس أب المتعددة الحاصلين عليها من مصادر مختلفة . تسمح التصفية والبحث الفوريان العثور على السجلات المطلوبة ﻓﻲ بضع ثوان . يعتبر مستكشف إلكٌم سوفت لبرنامج واتس أب أداة استحواذ واستخراج وعرض مستقلة لنسخ واتس أب الاحتياطية
  • برنامج إلكُم سوفت لفك تشفير الأقراص
    يتيح هذا البرنامج للخبراء الجنائيين وصول كامل ومباشر لجميع المعلومات المخزنة على حاويات التشفير الشائعة. فهو يدعم إصدارات حماية BitLocker العادية والمحمولة، ويدعم حماية PGP و TrueCrypt ، هذه الأداة تستطيع أن تفك تشفير جميع الملفات والمجلدات المخزنة على الحاويات المشفرة، أو يمكن تحميلها كمحرك أقراص جديد وذلك للوصول الفوري. يمكن الحصول على مفاتيح التشفير من خلال تحليل ملفات الإسبات أو تفريغ الذاكرة المنتجة من منتجات التحقيق الجنائي، أو الحصول عليها عن طريق هجوم بروتوكول السلك الناري . إن الأدوات البرمجية الجنائية التي تطرحها شركة إلكُم سوفت والتي لا تترك ورائها أي أثر، وتوفر وصول مباشر للمعلومات المشفرة، جعل هذا البرنامج أداة لا تقدر بثمن للمحققين، وللخبراء الجنائيين وخبراء أمن وتكنولوجيا المعلومات
  • برنامج إلكُم سوفت للتنقيب عن كلمة المرور
    برنامج إلكُم سوفت للتنقيب عن كلمة المرور هو أداة تعمل على نظام تشغيل ويندوز من أجل فك تشفير محتوى النظام وسلسلة مفاتيح مستخدم مستخرجة من حاسب يعمل بنظام تشغيل ماك OS . تقوم هذه الأداة بتفريغ بيانات مجموعة كاملة ﻓﻲ ملف XML لتسهيل الاستعراض والتحليل. وبنقرة واحدة يتم بناء قاموس يوفر القدرة على تفريغ كل كلمات المرور من سلسلة المفاتيح إلى ملف نصي عادي، منتجاً بذلك قاموس مخصص لاستخدامه مع أدوات استعادة كلمة المرور . ويمكن استخدام هذا القاموس لتسريع عملية استعادة كلمة المرور عند كسر المستندات أو النسخ الاحتياطية المشفرة . كما يمكن فك تشفير النظام وجميع سلاسل مفاتيح المستخدمين
  • برنامج إلكُم سوفت لاستعراض الهاتف
    استكشاف المعلومات المخزنة ﻓﻲ النسخ الاحتياطية السحابية أو المحلية والمنشأة من قبل هواتف آبل iOS ، وبلاك بيري ١٠ ، وهاتف ويندوز ٨ . يمكنك البرنامج من الوصول إلى جهات الاتصال والرسائل وسجلات المكالمات والملاحظات وبيانات التقويم الموجود ﻓﻲ النسخ الاحتياطي للهاتف . ويعرض المعلومات الأساسية حول الجهاز مثل اسم الطراز والرقم المسلسل، وتاريخ آخر نسخة احتياطية الخ . فضلا عن ذلك يمكن للأداة استعادة الرسائل المحذوفة من الأنواع (SMS – iMessage) من نسخ الاحتياطية لـ iOS . تم تصميمه كأداة دخول أولى لتحليل المعلومات الموجودة ﻓﻲ النسخ الاحتياطية للهواتف النقالة. وهو يسمح باستعراض النسخ الاحتياطية لأنظمة بلاك بيري ١٠ المنشأة بواسطة روابط بلاك بيري ، وكذلك النسخ السحابية لهاتف ويندوز إصدار ٨ / ٨٫١ المنزلة من ويندوز لايف بواسطة برنامج إلكُم سوفت لكسر كلمات مرور الهواتف . ويمكن بواسطة هذه الأداة استكشاف محتويات النسخ السحابية iCloud و آي تيونز iTunes الاحتياطية المنشأة على أجهزة آي فون ) iPhone ( و آي باد ) iPad ( و آي بود اللَّمسي (iPod Touch) . بما ﻓﻲ ذلك النسخ الاحتياطية المستعادة من السحابة )باستخدام برنامج إلكُم سوفت لكسر كلمات مرور الهواتف(. ويمكن لهذا البرنامج التعامل مع النسخ الاحتياطية بصيغة آي تيونز الأصلية ومع أ سماء الملفات المحولة/ المستعادة .
  • البرنامج المتطور لاستعادة البيانات المشفرة بنظام EFS
    يقوم البرنامج بفك تشفير الملفات المحمية ، ويعمل مع جميع إصدارات ويندوز ٢٠٠٠ ، إكس بي XP ، سيرفر (مخدم) ٢٠٠٨ ، فيستا، سفن ٧ ، ويمكن استعادة البيانات حتى عندما يكون النظام معطلا وغير قابل للتحميل ، أو عند العبث ﻓﻲ بعض مفاتيح التشفير. ويقوم هذا البرنامج باستعادة البيانات المشفرة بنظام تشفير الملفات EFS التي لايمكن الوصول إليها بسبب خطأ ﻓﻲ إدارة النظام مثل إزالة حسابات المستخدمين وبياناتهم الشخصية ، أو خطأ ﻓﻲ إعداد صلاحيات استعادة البيانات ، أو تحويل المستخدمين فيما بين النطاقات ، أو نقل الأقراص الصلبة من جهاز إلى آخر
  • مفتاح يوبي سي نانو
    YUBIKEY 4C Nano هو جهاز USB-C الذي تستخدمه مع اسم المستخدم / كلمة المرور الخاصة بك لإثبات هويتك. مع لمسة بسيطة ، يحمي YubiKey 4C Nano الوصول إلى أجهزة الكمبيوتر والشبكات والخدمات عبر الإنترنت. احتفظ بواحد على سلسلة المفاتيح الخاصة بك باستخدام مفاتيح منزلك ، ومفتاح النسخ الاحتياطي الثاني في مكان آمن. يؤدي مفتاح الأمان القابل للتكوين الكل في واحد: FIDO U2F ، والبطاقة الذكية (PIV) ، و Yubico OTP ، وتوقيع الشفرة ، و OpenPGP ، و OATH-TOTP ، و OATH-HOTP ، والاستجابة للتحدي. أسهل وأكثر أمانًا من تطبيقات المصادق: لا مزيد من الوصول إلى هاتفك الذكي لإعادة كتابة رموز المرور التي تتلقاها عبر الرسائل القصيرة SMS أو من تطبيق مصادق. مجرد سد العجز في YubiKey الخاص بك ، انقر فوق ، ويفعل بقية لك. يعمل الصندوق مع مئات التطبيقات: استخدمها مع خدمات شائعة مثل Facebook و Gmail و GitHub و Dropbox و Dashlane و LastPass و Salesforce و Duo و Docker و Centrify ومئات أخرى. شكلي لتسجيل الدخول إلى الكمبيوتر (Windows ، Mac ، Linux). اتبع التعليمات التي توفرها كل خدمة ، لتسجيل YubiKey الخاص بك.
  • مفتاح يوبي نانو
    YubiKey 4 NANO هو جهاز USB الذي تستخدمه مع اسم المستخدم / كلمة المرور الخاصة بك لإثبات هويتك. مع لمسة بسيطة ، يحمي YubiKey 4 الوصول إلى أجهزة الكمبيوتر والشبكات والخدمات عبر الإنترنت. احتفظ بواحد على سلسلة المفاتيح الخاصة بك باستخدام مفاتيح منزلك ، ومفتاح النسخ الاحتياطي الثاني في مكان آمن. يؤدي مفتاح الأمان القابل للتكوين الكل في واحد: FIDO U2F ، والبطاقة الذكية (PIV) ، و Yubico OTP ، وتوقيع الشفرة ، و OpenPGP ، و OATH-TOTP ، و OATH-HOTP ، والاستجابة للتحدي. أسهل وأكثر أمانًا من تطبيقات المصادق: لا مزيد من الوصول إلى هاتفك الذكي لإعادة كتابة رموز المرور التي تتلقاها عبر الرسائل القصيرة SMS أو من تطبيق مصادق. مجرد سد العجز في YubiKey الخاص بك ، انقر فوق ، ويفعل بقية لك. يعمل الصندوق مع مئات التطبيقات: استخدمها مع خدمات شائعة مثل Facebook و Gmail و GitHub و Dropbox و Dashlane و LastPass و Salesforce و Duo و Docker و Centrify ومئات أخرى. شكلي لتسجيل الدخول إلى الكمبيوتر (Windows ، Mac ، Linux). اتبع التعليمات التي توفرها كل خدمة ، لتسجيل YubiKey الخاص بك.
  • مفتاح يوبي
    YubiKey 4 هو جهاز USB الذي تستخدمه مع اسم المستخدم / كلمة المرور الخاصة بك لإثبات هويتك. مع لمسة بسيطة ، يحمي YubiKey 4 الوصول إلى أجهزة الكمبيوتر والشبكات والخدمات عبر الإنترنت. احتفظ بواحد على سلسلة المفاتيح الخاصة بك باستخدام مفاتيح منزلك ، ومفتاح النسخ الاحتياطي الثاني في مكان آمن. يؤدي مفتاح الأمان القابل للتكوين الكل في واحد: FIDO U2F ، والبطاقة الذكية (PIV) ، و Yubico OTP ، وتوقيع الشفرة ، و OpenPGP ، و OATH-TOTP ، و OATH-HOTP ، والاستجابة للتحدي. أسهل وأكثر أمانًا من تطبيقات المصادق: لا مزيد من الوصول إلى هاتفك الذكي لإعادة كتابة رموز المرور التي تتلقاها عبر الرسائل القصيرة SMS أو من تطبيق مصادق. مجرد سد العجز في YubiKey الخاص بك ، انقر فوق ، ويفعل بقية لك. يعمل الصندوق مع مئات التطبيقات: استخدمها مع خدمات شائعة مثل Facebook و Gmail و GitHub و Dropbox و Dashlane و LastPass و Salesforce و Duo و Docker و Centrify ومئات أخرى. شكلي لتسجيل الدخول إلى الكمبيوتر (Windows ، Mac ، Linux). اتبع التعليمات التي توفرها كل خدمة ، لتسجيل YubiKey الخاص بك.
  • مفتاح يوبي نيو
    في جهاز واحد ، لدى YubiKey NEO اتصالات (USB) واتصال بدون اتصال (NFC ، MIFARE). وهو يدعم كلمة المرور لمرة واحدة ، ووظائف البطاقة الذكية ، بما في ذلك OpenPGP و PIV ، وبروتوكول FIDO Universal العالمي الثاني (U2F). يمكن استخدام YubiKey NEO لتأمين الوصول إلى مجموعة واسعة من التطبيقات ، بما في ذلك الوصول عن بعد والشبكات الخاصة الافتراضية ، ومديري كلمات المرور ، وتسجيل الدخول إلى الكمبيوتر ، و FIDO U2F login (Gmail ، و GitHub ، و Dropbox ، الخ) وأنظمة إدارة المحتوى والخدمات الشهيرة عبر الإنترنت والكثير أكثر من. الميزات يعمل على أنظمة التشغيل Microsoft Windows و Mac OS X و Linux ؛ المتصفحات الرئيسية هواتف Android والأجهزة اللوحية NFC تدعم عدة بروتوكولات مصادقة ، بما في ذلك مصادقة Yubico OTP ، والبطاقة الذكية ، ومصادقة FIDO U2F Mobile من خلال تقنية NFC بدون اتصال (NDEF type 4) ، تعمل مع Android MIFARE Claassic ، لأنظمة التحكم في الدخول المادية القديمة. العناصر الآمنة للأمان تحمي التشفير الخاص بك مفتاح
  • مفتاح يوبي سي
    YubiKey 4C هو جهاز USB-C تستخدمه مع اسم المستخدم / كلمة المرور الخاصة بك لإثبات هويتك. مع لمسة بسيطة ، يحمي YubiKey 4C الوصول إلى أجهزة الكمبيوتر والشبكات والخدمات عبر الإنترنت. احتفظ بواحد على سلسلة المفاتيح الخاصة بك باستخدام مفاتيح منزلك ، ومفتاح النسخ الاحتياطي الثاني في مكان آمن. يؤدي مفتاح الأمان القابل للتكوين الكل في واحد: FIDO U2F ، والبطاقة الذكية (PIV) ، و Yubico OTP ، وتوقيع الشفرة ، و OpenPGP ، و OATH-TOTP ، و OATH-HOTP ، والاستجابة للتحدي. أسهل وأكثر أمانًا من تطبيقات المصادق: لا مزيد من الوصول إلى هاتفك الذكي لإعادة كتابة رموز المرور التي تتلقاها عبر الرسائل القصيرة SMS أو من تطبيق مصادق. مجرد سد العجز في YubiKey الخاص بك ، انقر فوق ، ويفعل بقية لك. يعمل الصندوق مع مئات التطبيقات: استخدمها مع خدمات شائعة مثل Facebook و Gmail و GitHub و Dropbox و Dashlane و LastPass و Salesforce و Duo و Docker و Centrify ومئات أخرى. شكلي لتسجيل الدخول إلى الكمبيوتر (Windows ، Mac ، Linux). اتبع التعليمات التي توفرها كل خدمة ، لتسجيل YubiKey الخاص بك.
  • YubiHSM 2

    YubiHSM 2

    WJN

    Description The YubiHSM 2 is a game changing hardware solution for protecting Certificate Authority root keys from being copied by attackers, malware, and malicious insiders. It offers superior cost effective security and easy deployment making it accessible for every organization. It offers a higher level of security for cryptographic digital key generation, storage, and management, for organizations running Microsoft Active Directory Certificate Services. The YubiHSM 2 features are accessible through Yubico’s Key Storage Provider (KSP) for industry-standard PKCS#11 or Microsoft’s CNG, or via native Windows, Linux and macOS libraries . Its ultra-slim “nano” form factor fits inside a server’s USB port, eliminating the need for bulky additional hardware, and offers flexibility for offline key transfer or backup. YubiHSM 2 can be used as a comprehensive cryptographic toolbox for a wide range of open source and commercial applications. The most common use case being hardware-based digital signature generation and verification. YubiHSM 2 offers a compelling option for secure generation, storage and management of digital keys including essential capabilities to generate, write, sign, decrypt, hash and wrap keys. Benefits Cost-effective HSM solution Easy deployment Secure key storage and operations Use Cases Enhance Protection for Cryptographic Keys YubiHSM 2 offers a compelling option for secure generation, storage and management of keys. Key protection is done in the secure on-chip hardware isolated from operations on the server. Most common use cases involve protecting of the certificate authorities (CAs) root key. YubiHSM 2 capabilities include: generate, write, sign, decrypt, hash and wrapping keys. Enable Hardware based Cryptographic Operations YubiHSM 2 can be used as a comprehensive cryptographic toolbox for low-volume operations in conjunction with a huge set of open source and commercial applications spanning many different products and services. Most common use case involve on-chip hardware based processing for signature generation and verification. Secure Microsoft Active Directory Certificate Services YubiHSM 2 can provide hardware backed keys for your Microsoft-based PKI implementation. Deploying YubiHSM 2 to your Microsoft Active Directory Certificate services not only protects the CA root keys but also protects all signing and verification services using the root key. Secure key storage and operations Extensive cryptographic capabilities: RSA, ECC, ECDSA (ed25519), SHA-2, AES Secure session between HSM and application Role-based access controls for key management and key usage 16 concurrent connections Optionally network sharable Remote management Unique “Nano” form factor, low-power usage M of N wrap key Backup and Restore Interfaces via YubiHSM KSP, PKCS#11, and native libraries Tamper evident Audit Logging Feature Details Secure key storage and operations Create, import, and store keys, then perform all crypto operations in the HSM hardware to prevent theft of keys while at rest or in use. This protects against both logical attacks against the server, such as zero-day exploits or malware, and physical theft of a server or its hard drive. Extensive cryptographic capabilities YubiHSM 2 supports hashing, key wrapping, asymmetric signing and decryption operations including advanced signing using ed25519. Attestation is also supported for asymmetric key pairs generated on-device. Secure session between HSM and application The integrity and privacy of commands and data in transit between the HSM and applications are protected using a mutually authenticated, integrity and confidentiality protected tunnel. Role-based access controls for key management and key usage All cryptographic keys and other objects in the HSM belong to one or more security domains. Access rights are assigned for each authentication key at creation time which allow a specific set of cryptographic or management operations to be performed per security domain. Admins assign rights to authentication keys based on its use case, such as a event monitoring app that needs the ability to read all audit logs in the HSM, or a Registration Authority that needs to issue (sign) end user digital certificates, or a domain security admin who needs to create and delete crypto keys. 16 concurrent connections Multiple applications can establish sessions with a YubiHSM to perform cryptographic operations. Sessions can be automatically terminated after inactivity or be long-lived to improve performance by eliminating session creation time. Network Sharable To increase the flexibility of deployments, the YubiHSM 2 can be made available for use over the network by applications on other servers. This can be especially advantageous on a physical server that is hosting multiple virtual machines. Remote Management Easily manage multiple deployed YubiHSMs remotely for the entire enterprise – eliminate on-call staff complexity and travel expense. Unique “Nano” form factor, low-power usage The Yubico “Nano” form factor allows the HSM to be inserted completely inside a USB-A port so it’s completely concealed – no external parts that protrude out of the server back or front chassis. It uses minimal power, max of 30mA, for cost-savings on your power budget. M of N wrap key Backup and Restore Backing up and deploying cryptographic keys on multiple HSMs is a critical component of an enterprise security architecture, but it’s a risk to allow a single individual to have that ability. The YubiHSM supports setting M of N rules on the wrap key used to export keys for backup or transport, so that multiple administrators are required to import and decrypt a key to make it usable on additional HSMs. For example in an enterprise, the Active Directory root CA private key might be key wrapped for 7 administrators (M=7) and at least 4 of them (N=4) are required to import and unwrap (decrypt) the key in the new HSM. Interfaces via YubiHSM KSP, PKCS#11, and native libraries Crypto enabled applications can leverage the YubiHSM via Yubico’s Key Storage Provider (KSP) for Microsoft’s CNG or industry-standard PKCS#11. Native libraries are also available on Windows, Linux and macOS to enable more direct interaction with the device’s capabilities. Tamper evident Audit Logging The YubiHSM internally stores a log of all management and crypto operation events that occur in the device and that log can be exported for monitoring and reporting. Each event (row) in the log is hash chained with the previous row and signed so that it’s possible to determine if any events are modified or deleted.
  • YubiKey 5 NFC
    The YubiKey 5 NFC is a hardware based authentication solution that provides superior defense against phishing, eliminates account takeovers, enables compliance and offers expanded choices for strong authentication. This key delivers strong authentication over Near Field Communications (NFC) and via USB-A ports. New with the YubiKey 5 NFC is support for FIDO2 allowing organizations to enable passwordless login. The YubiKey 5 NFC includes: Support for strong single factor, two-factor hardware and multi-factor authentication Strong authentication with support for multiple protocols (Yubico OTP, OATH HOTP, OATH TOTP, U2F, PIV, and Open PGP), and FIDO2 the new standard enabling the replacement of weak password-based authentication. Out of the box integration with hundreds of services, with no shared secrets. A seamless user experience that is easy to use, fast and reliable and is proven at scale to significantly reduce IT costs. How it Works: Choose a service to sign-in with and enter your username and password. When prompted, simply insert the YubiKey into a USB port or touch it to NFC supported devices. Authenticate effortlessly with a touch or tap the YubiKey 5 NFC to your NFC-enabled device. Benefits Strong single factor, two-factor hardware and multi-factor authentication Easy and fast authentication with a single touch or tap to NFC enabled device Reduces IT operational costs Multiprotocol support on a single key Crush-resistant and waterproof Made in the USA & Sweden Four times faster than typing a One Time Passcode Always on and accessible because no batteries or network connectivity is required Features Supported protocols: FIDO2, FIDO U2F, smart card (PIV), Yubico OTP, OpenPGP, OATH-TOTP, OATH-HOTP, and Challenge-Response Secure element hardware to protect cryptographic keys and perform cryptographic operations Crypto Algorithms: RSA 40965, RSA 30725, RSA 2048, RSA 1024, ECC p2566, ECC p3846 Interface: USB-A and NFC Works on Microsoft Windows, macOS, Linux and on major browsers such as Chrome, Firefox2, Safari3, Edge7, and Opera4 Works on mobile platforms such as iOS1 and Android4 Works with Google, Facebook, Dropbox, Twitter, LastPass, Dashlane, and hundreds of other services. Find a service here. PIV smart card compatible, smart card minidriver available on Windows Works only with Yubico OTP over NFC via apps that have integrated support Firefox ships with FIDO U2F disabled and it must be enabled in the about:config menu. Some services that use U2F do not work with Firefox even after enabling the feature. Not compatible with FIDO U2F or FIDO2/WebAuthn Not compatible with FIDO2/WebAuthn Supported only on OpenPGP. Supported only on smart card (PIV). Requires Windows 10 1809 or newer. Edge does not support the U2F API.
  • YubiKey 5 Nano
    The YubiKey 5 Nano is a hardware based authentication solution that provides superior defense against phishing, eliminates account takeovers, enables compliance and offers expanded choices for strong authentication. This key delivers strong authentication via USB-A ports. New with the YubiKey 5 Nano is support for FIDO2 allowing organizations to enable passwordless login. The YubiKey 5 Nano includes: Support for strong single factor, two-factor hardware and multi-factor authentication Strong authentication with support for multiple protocols (Yubico OTP, OATH HOTP, OATH TOTP, U2F, PIV, and Open PGP), and FIDO2 the new standard enabling the replacement of weak password-based authentication. Out of the box integration with hundreds of services, with no shared secrets. A seamless user experience that is easy to use, fast and reliable and is proven at scale to significantly reduce IT costs. How it Works: Choose a service to sign-in with and enter your username and password When prompted, simply insert the YubiKey into a USB port Authenticate effortlessly with a touch of the gold contacts Benefits Strong single factor, two-factor hardware and multi-factor authentication Easy and fast authentication with a single touch Reduces IT operational costs Multiprotocol support on a single key Water-resistant Made in the USA & Sweden Four times faster than typing a One Time Passcode Always on and accessible because no batteries or network connectivity is required Features Supported protocols: FIDO2, FIDO U2F, smart card (PIV), Yubico OTP, OpenPGP, OATH-TOTP, OATH-HOTP, and Challenge-Response Secure element hardware to protect cryptographic keys and perform cryptographic operations Crypto Algorithms: RSA 40965, RSA 30725, RSA 2048, RSA 1024, ECC p2566, ECC p3846 Interface: USB-A Works on Microsoft Windows, macOS, Linux and on major browsers such as Chrome, Firefox2, Safari3, Edge7, and Opera4 Works on mobile platforms such as iOS1 and Android4 Works with Google, Facebook, Dropbox, Twitter, LastPass, Dashlane, and hundreds of other services. Find a service here. PIV smart card compatible, smart card minidriver available on Windows Works only with Yubico OTP over NFC via apps that have integrated support Firefox ships with FIDO U2F disabled and it must be enabled in the about:config menu. Some services that use U2F do not work with Firefox even after enabling the feature. Not compatible with FIDO U2F or FIDO2/WebAuthn Not compatible with FIDO2/WebAuthn Supported only on OpenPGP. Supported only on smart card (PIV). Requires Windows 10 1809 or newer. Edge does not support the U2F API.
  • YubiKey 5C
    The YubiKey 5C is a hardware based authentication solution that provides superior defense against phishing, eliminates account takeovers, enables compliance and offers expanded choices for strong authentication. This key delivers strong authentication via USB-C ports. New with the YubiKey 5C is support for FIDO2 allowing organizations to enable passwordless login. The YubiKey 5C includes: Support for strong single factor, two-factor hardware and multi-factor authentication Strong authentication with support for multiple protocols (Yubico OTP, OATH HOTP, OATH TOTP, U2F, PIV, and Open PGP), and FIDO2 the new standard enabling the replacement of weak password-based authentication. Out of the box integration with hundreds of services, with no shared secrets. A seamless user experience that is easy to use, fast and reliable and is proven at scale to significantly reduce IT costs. How it Works: Choose a service to sign-in with and enter your username and password When prompted, simply insert the YubiKey into a USB port Authenticate effortlessly with a touch of the gold contacts Benefits Strong single factor, two-factor hardware and multi-factor authentication Easy and fast authentication with a single touch Reduces IT operational costs Multiprotocol support on a single key Water-resistant Made in the USA & Sweden Four times faster than typing a One Time Passcode Always on and accessible because no batteries or network connectivity is required Features Supported protocols: FIDO2, FIDO U2F, smart card (PIV), Yubico OTP, OpenPGP, OATH-TOTP, OATH-HOTP, and Challenge-Response Secure element hardware to protect cryptographic keys and perform cryptographic operations Crypto Algorithms: RSA 40965, RSA 30725, RSA 2048, RSA 1024, ECC p2566, ECC p3846 Interface: USB-C Works on Microsoft Windows, macOS, Linux and on major browsers such as Chrome, Firefox2, Safari3, Edge7, and Opera4 Works on mobile platforms such as iOS1 and Android4 Works with Google, Facebook, Dropbox, Twitter, LastPass, Dashlane, and hundreds of other services. Find a service here. PIV smart card compatible, smart card minidriver available on Windows Works only with Yubico OTP over NFC via apps that have integrated support Firefox ships with FIDO U2F disabled and it must be enabled in the about:config menu. Some services that use U2F do not work with Firefox even after enabling the feature. Not compatible with FIDO U2F or FIDO2/WebAuthn Not compatible with FIDO2/WebAuthn Supported only on OpenPGP. Supported only on smart card (PIV). Requires Windows 10 1809 or newer. Edge does not support the U2F API.
  • YubiKey 5C Nano
    The YubiKey 5C Nano is a hardware based authentication solution that provides superior defense against phishing, eliminates account takeovers, enables compliance and offers expanded choices for strong authentication. This key delivers strong authentication via USB-C ports. New with the YubiKey 5C Nano is support for FIDO2 allowing organizations to enable passwordless login. The YubiKey 5C Nano includes: Support for strong single factor, two-factor hardware and multi-factor authentication Strong authentication with support for multiple protocols (Yubico OTP, OATH HOTP, OATH TOTP, U2F, PIV, and Open PGP), and FIDO2 the new standard enabling the replacement of weak password-based authentication. Out of the box integration with hundreds of services, with no shared secrets. A seamless user experience that is easy to use, fast and reliable and is proven at scale to significantly reduce IT costs. How it Works: Choose a service to sign-in with and enter your username and password When prompted, simply insert the YubiKey into a USB port Authenticate effortlessly with a touch of the gold contacts Benefits Strong single factor, two-factor hardware and multi-factor authentication Easy and fast authentication with a single touch Reduces IT operational costs Multiprotocol support on a single key Water-resistant Made in the USA & Sweden Four times faster than typing a One Time Passcode Always on and accessible because no batteries or network connectivity is required Features Supported protocols: FIDO2, FIDO U2F, smart card (PIV), Yubico OTP, OpenPGP, OATH-TOTP, OATH-HOTP, and Challenge-Response Secure element hardware to protect cryptographic keys and perform cryptographic operations Crypto Algorithms: RSA 40965, RSA 30725, RSA 2048, RSA 1024, ECC p2566, ECC p3846 Interface: USB-C Works on Microsoft Windows, macOS, Linux and on major browsers such as Chrome, Firefox2, Safari3, Edge7, and Opera4 Works on mobile platforms such as iOS1 and Android4 Works with Google, Facebook, Dropbox, Twitter, LastPass, Dashlane, and hundreds of other services. Find a service here. PIV smart card compatible, smart card minidriver available on Windows Works only with Yubico OTP over NFC via apps that have integrated support Firefox ships with FIDO U2F disabled and it must be enabled in the about:config menu. Some services that use U2F do not work with Firefox even after enabling the feature. Not compatible with FIDO U2F or FIDO2/WebAuthn Not compatible with FIDO2/WebAuthn Supported only on OpenPGP. Supported only on smart card (PIV). Requires Windows 10 1809 or newer. Edge does not support the U2F API.
  • YubiKey FIPS
    Description The YubiKey combines hardware-based authentication and public key cryptography to eliminate account takeovers. Simply insert into a USB slot and authenticate with a touch. YubiKey authentication is four times faster than typing a One Time Passcode and does not require a battery nor network connectivity so it is always on and accessible. The YubiKey FIPS Series comes in four form factors. Each option includes the same internal components, functionality, and capabilities. Keychain – For your keychain Nano – Leave in your USB port YubiKey FIPS – USB-A YubiKey C FIPS – USB-C YubiKey Nano FIPS – USB-A YubiKey C Nano FIPS – USB-C Benefits Utilizes public key cryptography to eliminate the risk of account takeovers Strong two-factor hardware based authentication Easy and fast authentication with a single touch Reduces IT operational costs Multiprotocol support on a single key Crush-resistant and waterproof Choice of USB-A and USB-C form factors Made in the USA & Sweden Features Supported protocols: FIDO U2F, smart card (PIV), Yubico OTP, OpenPGP, OATH-TOTP, OATH-HOTP, and Challenge-Response Secure element hardware to protect cryptographic keys Crypto Algorithms: RSA 2048, ECC p256, ECC p384 Interface: USB-A and USB-C Works on Microsoft Windows, Mac OS X, Linux, Chrome OS operating systems, and on major browsers PIV smart card compatible, minidriver available on Windows Support for PKCS#1
  • YubiKey Nano FIPS
    Description The YubiKey combines hardware-based authentication and public key cryptography to eliminate account takeovers. Simply insert into a USB slot and authenticate with a touch. YubiKey authentication is four times faster than typing a One Time Passcode and does not require a battery nor network connectivity so it is always on and accessible. The YubiKey FIPS Series comes in four form factors. Each option includes the same internal components, functionality, and capabilities. Keychain – For your keychain Nano – Leave in your USB port YubiKey FIPS – USB-A YubiKey C FIPS – USB-C YubiKey Nano FIPS – USB-A YubiKey C Nano FIPS – USB-C Benefits Utilizes public key cryptography to eliminate the risk of account takeovers Strong two-factor hardware based authentication Easy and fast authentication with a single touch Reduces IT operational costs Multiprotocol support on a single key Crush-resistant and waterproof Choice of USB-A and USB-C form factors Made in the USA & Sweden Features Supported protocols: FIDO U2F, smart card (PIV), Yubico OTP, OpenPGP, OATH-TOTP, OATH-HOTP, and Challenge-Response Secure element hardware to protect cryptographic keys Crypto Algorithms: RSA 2048, ECC p256, ECC p384 Interface: USB-A and USB-C Works on Microsoft Windows, Mac OS X, Linux, Chrome OS operating systems, and on major browsers PIV smart card compatible, minidriver available on Windows Support for PKCS#1
  • YubiKey C FIPS
    Description The YubiKey combines hardware-based authentication and public key cryptography to eliminate account takeovers. Simply insert into a USB slot and authenticate with a touch. YubiKey authentication is four times faster than typing a One Time Passcode and does not require a battery nor network connectivity so it is always on and accessible. The YubiKey FIPS Series comes in four form factors. Each option includes the same internal components, functionality, and capabilities. Keychain – For your keychain Nano – Leave in your USB port YubiKey FIPS – USB-A YubiKey C FIPS – USB-C YubiKey Nano FIPS – USB-A YubiKey C Nano FIPS – USB-C Benefits Utilizes public key cryptography to eliminate the risk of account takeovers Strong two-factor hardware based authentication Easy and fast authentication with a single touch Reduces IT operational costs Multiprotocol support on a single key Crush-resistant and waterproof Choice of USB-A and USB-C form factors Made in the USA & Sweden Features Supported protocols: FIDO U2F, smart card (PIV), Yubico OTP, OpenPGP, OATH-TOTP, OATH-HOTP, and Challenge-Response Secure element hardware to protect cryptographic keys Crypto Algorithms: RSA 2048, ECC p256, ECC p384 Interface: USB-A and USB-C Works on Microsoft Windows, Mac OS X, Linux, Chrome OS operating systems, and on major browsers PIV smart card compatible, minidriver available on Windows Support for PKCS#1
  • YubiKey C Nano FIPS
    Description The YubiKey combines hardware-based authentication and public key cryptography to eliminate account takeovers. Simply insert into a USB slot and authenticate with a touch. YubiKey authentication is four times faster than typing a One Time Passcode and does not require a battery nor network connectivity so it is always on and accessible. The YubiKey FIPS Series comes in four form factors. Each option includes the same internal components, functionality, and capabilities. Keychain – For your keychain Nano – Leave in your USB port YubiKey FIPS – USB-A YubiKey C FIPS – USB-C YubiKey Nano FIPS – USB-A YubiKey C Nano FIPS – USB-C Benefits Utilizes public key cryptography to eliminate the risk of account takeovers Strong two-factor hardware based authentication Easy and fast authentication with a single touch Reduces IT operational costs Multiprotocol support on a single key Crush-resistant and waterproof Choice of USB-A and USB-C form factors Made in the USA & Sweden Features Supported protocols: FIDO U2F, smart card (PIV), Yubico OTP, OpenPGP, OATH-TOTP, OATH-HOTP, and Challenge-Response Secure element hardware to protect cryptographic keys Crypto Algorithms: RSA 2048, ECC p256, ECC p384 Interface: USB-A and USB-C Works on Microsoft Windows, Mac OS X, Linux, Chrome OS operating systems, and on major browsers PIV smart card compatible, minidriver available on Windows Support for PKCS#1
  • 13.5m Inshore Patrol Vessel
    The 13.5 Meter Inshore Patrol Vessel has been developed to meet the requirements of professional Coast Guard and Naval Forces. It is a well-designed, well-built and well-equipped patrol boat responsible for conducting coastal patrol operations, search & rescue missions and defend the territorial water against attack mounted by sea-borne forces. The Inshore Patrol Vessel is designed to meet the operational requirement with its main missions such as: • Surveillance and guarding the boundaries of naval bases • Deterring hostile marine vehicles (HMV) threats • Engaging with HMV if necessary via mounted guns • Harbor patrolling duties
  • 11m High Speed Interceptor
    The 11 Meter High Speed Interceptor is a high-speed Interceptor that has been especially developed for navies, coastguards and police forces. It is an upgraded version of the Al Fattan’s 10 Meter Interceptor. It is faster, more stable and have greater load capacity. It can carry one 12.7mm gun at the front and 2 minimi 7.62mm guns on deck sides. It was built and designed to fulfill its basic functions to accomplish military operations and missions at the fastest possible time. It can support special operations, offshore and patrol vessels and can perform missions such as: • Anti-smuggling or anti-terrorist operations • Marine law enforcements operations • Rapid response actions • Patrolling & surveillance
  • A140
    The Getac A140 fully rugged tablet is our largest and most powerful tablet to date. It delivers exceptional performance with industry leading security. An expansive 14" display provides wider viewing angles, greater operational space and reduces scrolling. Convenient carrying and mounting accessories ensure the A140 delivers maximum mobile productivity.
  • B300
    Our most rugged laptop, the B300 rugged notebook has been called "The Best Rugged Laptop on the Market"1. With maximum performance, enhanced security, best-in-class battery life and one of the brightest displays in the industry, the 7th generation B300 is the most rugged notebook you can get and the clear choice for working in some of the most extreme environments.
  • EX80
    The ruggedly designed EX80 tablet delivers Windows touchscreen technology to the frontlines of the oil and gas industry. Certified for duty under harsh conditions and where fire hazards may be present, the EX80 brings unmatched image clarity, precision input ability, and maximum safety, along with the proven power of the Windows 10 operating system, wherever work takes you.
  • Firehawk FP-600 Rugged Tablet
    - Meets IP67 / 65 and MIL-810G standards - Choice of OS: Android & Windows - High-Precision GPS Navigation - Outdoor sunlight readable - Full Day Shift Battery backup
  • V110
    The Getac V110 fully rugged convertible notebook is the best convertible we’ve ever made: It features best-in-class performance, industry-leading security, a large 11.6” widescreen display and a design that is as thin and light as ever – at 1.98kg light and 39mm thin.
  • RX10
    We designed the RX10 Tablet with the latest Intel® Core M Processors, providing optimum mobile performance, exceptional responsiveness and potentially limitless battery life. With a 10.1 inch full HD LumiBond® display plus IP65 and MIL-STD 810G certification, the RX10 fully rugged tablet is the perfect solution for mission critical work environments.
  • RX10H
    The RX10H Windows Healthcare Tablet is the ultimate tool for medical professionals. From its antimicrobial surface and 10.1" LumiBond® display to the limitless battery life and class-leading support, the RX10H sets new standards in patient care.
  • F110
    The award-winning F110 is a true revolution in rugged tablet computing. The F110 combines best-in-class performance, industry-leading security, a large 11.6” widescreen display and a thin and light design that redefines rugged mobility.
  • 10" Rugged Tablet Firehawk FT-150
    Firehawk FT-150 -Meets IP65 and MIL-810G standards -Choice of OS : Windows / Android -High-Precision GPS Navigation -Outdoor sunlight readable -Full Day Shift Battery backup
  • 8" Rugged Tablet Firehawk FT-850
    Firehawk FT-850 - Meets IP67 and MIL-810G standards - Choice of OS: Windows / Android - High-Precision GPS Navigation - Outdoor sunlight readable 400nits - Full Day Shift Battery backup
  • S410
    Raising the bar on the semi-rugged notebook class, the new S410 is more rugged, slimmer and lighter than ever before. The all-new S410 boasts the latest computing innovations, including 8th generation Intel® Core™ i7 processor, enhanced graphics and multiple security options for greater flexibility. The S410 puts greater power and adaptability into the hands of mobile professionals across a range of industries.
  • T800
    Built for today's mobile workforce, the Getac T800 fully rugged tablet features an 8.1" HD LumiBond® display for better viewing experience, the latest wireless technology, and a thin, ergonomic design which allows it to be held comfortably in one hand. The T800 provides best-in-class battery life to get you through your shift and it's no-compromise rugged features guarantee that it will always be ready.
  • X500
    The new X500 ultra rugged computer remains our flagship model. By combining powerful 7th generation quad-core processors with a brilliant 15.6 inch full HD display and endless expansion, the X500 is the most powerful ultra rugged notebook we've ever made.
  • ZX70
    Compact and powerful, the ZX70 7” fully rugged Android tablet is just the right size. With a thin and light, ergonomic design that’s easy to hold in one hand, it's the ideal solution for improved mobile productivity. The ZX70 provides the best battery runtime performance for mission-critical field operations in its class. Rugged to the core, the ZX70’s design is optimised for a wide variety of configurable features and no-compromise ruggedness.
  • MX50
    The MX50 has been designed to meet the data input and output requirements of the digital dismounted soldier and is the first wearable product designed by Getac to address the requirements of the defence sector. With a 5.7" screen & Intel® Atom X5 processor, the MX50 meets battlefield SWaP requirements.
  • Dead Cult

    Dead Cult

    ISnSC

    An Autonomous Cyber Dome. An integrated security capabilities to protect information using Artificial Intelligence .
  • Kaloom

    Kaloom

    Kaloom

    Kaloom is comprised of a group of technology veterans with proven track records of delivering large-scale networking, analytics and Al-based solutions for the world's largest networks. Having come from leading companies including Ericsson, Xelerated, Cisco, Redback Networks, 3Com, Nortel and Apple, we have come together to build a critically-needed solution to address the emerging challenges in data center networking. Backed by strong investors (Fonds FTQ, Somel Investments Inc., MBUZZ) and partners (Red Hat, Accton, Barefoot, Foxconn) that share in Kaloom's belief, ideas and future direction; we are committed to creating a world class solution that will change the data center networking industry. Our research and development office is located in the heart of the Quartier de !'innovation in Montreal, Quebec with the sales and marketing teams in Silicon Valley.
  • Noviflow

    Noviflow

    Noviflow

    Programmable Match-action Data Planes Application Enablers and Software Solutions SDN Network Operating Systems, Scalable Cybersecurity at Terabit Speeds, Accelerated throughput and dynamic scaling for Cyber security, In-Line Packet Brokering, Load Balancing, BNG/BRAS, Next Generation, Central Office, Lifecycle Service, Orchestration, SD WAN, Data Center Interconnect
  • Altadrea Storm B7 Armored APC
  • B6 Armored TLC 79 (Single Cab)
  • B6 Armored TLC 79 (Double Cab)
  • Secure Electronic Monitoring Solutions
    As a complete solution provider, GEOSATIS off ers a unique range of expertise at every stage from product innovation and design all the way to customer solutions implementation and support. With headquarters based in the Jura watch valley, GEOSATIS and its partners make the best use of Swiss know-how in micro-mechanics and wearable devices.
  • Luxury Armored Vehicles
  • Armored Guard Rooms
    مواصفات فنية غرف حراسة مدرعة بمستوى EN1063 BR7 (Class A) مزودة ببرج رماية علوي 1. الشكل الخارجي و مستوى الحماية: الغرفة مصممة بشكل مضلع ومدروس بعناية لتوفير الحماية من كافة الاتجاهات. مع وجود برج مدرع دوار في الاعلى. الغرفة محمية بمستوى حماية EN1063 BR7 للحماية من الذخيرة عيار 7.63x51 mm AP في جميع الاتجاهات. الابعاد الخارجية: الارتفاع: 2200 / 3190 ملم (بدون البرج / مع البرج). العرض: 2200 ملم. الطول: 2300 ملم. 2. حديد التدريع: الحديد المستخدم هو حديد عالي القساوة (600 ) بسماكة تتراوح بين 12 ملم الى 14.5 ملم. مما يوفر مستوى حماية EN1063 BR7 للحماية من الذخيرة عيار 7.63x51 mm AP. 3. زجاج التدريع: زجاج بسماكة 75 ملم. عدة طبقات مزود بطبقة داخلية مانعة للتطاير مصنع خصيصا لتأمين مستوى حماية EN1063 BR7 للحماية من الذخيرة عيار 7.63x51 mm AP.. مع وجود حماية من حديد التدريع يتم اغلاقها في حال تكسر الزجاج. 4. فتحات الرماية: الغرفة باحدى عشر فتحة للرماية سهلة الفتح و الاغلاق موزعة على جميع جوانب الغرفة كما هو موضح في الرسومات المرفقة. بحيث تكون مناسبة للرماية في و ضعيتي الجلوس و الوقوف و فوق كل فتحة رماية نافذة من الزجاج المدرع. 5. برج الرماية: برج الرماية مثبت في أعلى الغرفة على قاعدة قابلة للدوران 360 درجة بواسطة تروس تدار يدويا. البرج مصنع من نفس حديد التدريع و مزود بنوافذ تمنح الرؤية من الأمام و الجوانب. كما يتم تزويد البرج بكرسي لجلوس الرامي. بالإمكان تجهيز البرج بمنصب للسلاح (يتم تحديد نوعية السلاح من قبل المستخدم). 6. التجهيزات الخارجية: - بوابة دخول و خروج موجودة في الجهة الخلفية تقفل بواسطة قفل عالي الأمان و مزودة أيضا بقفل مزلاج احتياطي. - صندوق مدرع جانبي يحتوي على نقاط تزويد الغرفة بخطوط الطاقة و الاتصالات. - قاعدة خارجية لتثبيت هوائي جهاز الاتصالات. - ثلاث نقاط للرفع و النقل بواسطة السلاسل. - نقاط للرفع و النقل بواسطة الرافعة الشوكية. - قاعدة لتثبيت وحدة التكييف الخارجية - عزل حراري لجميع جدران الغرفة بمادة مناسبة لتخفيف تأثير الحرارة الخارجية و للمحافظة على الحرارة الداخلية للغرفة. التجهيزات الداخلية: - سلم قابل للطي لتمكين الرامي من الصعود و النزول إلى برج الرماية. - كرسي متحرك عدد اثنين. - طفايات حريق عدد اثنين سعة كل منهما 1 كغم. - رف جانبي قابل للطي. - حقيبة إسعافات أولية. - مكان مخصص ومجهز لوضع ثلاجة مكتبية حجم 4.5 قدم مكعب. 7. التجهيزات الكهربائية: - مدخل خارجي لمصدر طاقة 220 فولت مع قاطع داخلي. - اباريز كهربائية عدد 4 موزعة داخل الغرفة. - ابريز هاتف عدد 1. - لوحة تحكم بالاضاءة و الاجهزة الكهربائية. - جهاز تحذير صوتي. - اضاءة تحذيرية دوارة. - اضاءة داخلية عدد 2 كافية لانارة الغرفة من الداخل. - اضاءة خارجية عدد 3 موزعة بالأمام و الجوانب. - اضاءة طوارئ تعمل في حال انقطاع التيار الكهربائي. - مكيف بقدرة طن واحد (12000 وحدة حرارية). - مروحة شفط جانبية لسحب الغازات و الدخان. - مروحة شفط في برج الرماية لسحب الدخان و الغازات. نظام كاميرات المراقبة: • نظام كميرات مراقبة – عدد (4) كاميرات وشاشة و جهاز تسجيل DVR
  • Bahri Logistics Booklet - Arabic
  • Panasonic Toughbook CF-33
    The Panasonic TOUGHBOOK® 33 is the first fully-rugged 2-in-1 of its kind—redefining rugged flexibility for those who work in demanding conditions. TOUGHBOOK 33 features a groundbreaking 3:2 display, making it easier to handle, while improving readability of the business applications and documents workers use every day. This innovative design also enables backward compatibility with an entire generation of TOUGHBOOK 31 vehicle docks. It's as versatile as your job demands it to be. From a brighter 12" detachable screen with infrared camera for Windows Hello support, to hot-swappable twin batteries and a choice of keyboards—TOUGHBOOK 33 is built for maximum mobility.
  • Pansonic Toughpad FZ-G1
    The FZ-G1 Windows 10 Pro tablet offers a fluid user experience while providing crucial port connectivity and feature-rich options in a compact size. Designed for highly mobile field workers, it’s the thinnest and lightest fully rugged 10.1" tablet running Windows 10 Pro 64-Bit. Powered by an Intel® Core™ i5 vPro™ processor with a MIL-STD-810G and IP65 certified, the FZ-G1 Windows 10 tablet leads the way in rugged mobile computing. Add to that an HD daylight-readable 10-point gloved multi touch + waterproof digitizer pen, and it becomes an essential tool for field workers. With added Thermal camera and IR camera options. Can also support "Windows Hello" for enhanced security.
  • Panasonic Toughbook CF-54
    A semi-rugged 14” laptop, the TOUGHBOOK 54 is the world's thinnest and lightest semi-rugged in its class, but now packs even more of a punch. The TOUGHBOOK 54 is now available with 7th Gen Intel® processors running Windows® 10 Pro and feature a spill-resistant, full magnesium alloy design, storage drive heater and backlit keyboard. The TOUGHBOOK 54 has a wide range of integrated options such as dedicated GPS, 4G LTE mobile broadband with satellite GPS, and dual antenna pass-through. It offers an optional second battery, allowing hot swap battery replacement without the need to shut down or hibernate. The TOUGHBOOK 54 one of the most versatile and advanced semi-rugged notebooks on the market.
  • Panasonic Toughpad FZ-M1
    The Panasonic FZ-M1 is the fully rugged Windows® tablet, built to enable mission-critical mobile worker productivity without compromise. Powered by Windows® 10 Pro, the FZ-M1 features a long life, user-replaceable battery and a daylight-readable, high-sensitivity multi-touch display for use with heavy gloves. With the broadest range of configuration options available in its class, the highly customizable FZ-M1 is the ideal tool for today’s mobile workforce. In addition to the highly configurable options, added models of Thermal Camera, Real Sense Camera, RTK/GPS, as well as several more. Allows the FZ-M1 to be the most comprehensive 7" tablet in the market.
  • Getac X500
    The new X500 ultra-rugged computer remains our flagship model. By combining powerful 7th generation Quad-Core processors with a brilliant 15.6 inches full HD display and endless expansion, the X500 is the most powerful ultra-rugged notebook we’ve ever made.
  • Getac B300
    Our most rugged laptop, the B300 rugged notebook has been called "The Best Rugged Laptop on the Market"With maximum performance, enhanced security, best-in-class battery life and one of the brightest displays in the industry, the 7th generation B300 is the most rugged notebook you can get and the clear choice for working in some of the most extreme environments.
  • Getac T800
    Built for today's mobile workforce, the Getac T800 fully rugged tablet features an 8.1" HD LumiBond® display for better viewing experience, the latest wireless technology, and a thin, ergonomic design which allows it to be held comfortably in one hand. The T800 provides best-in-class battery life to get you through your shift and it's no-compromise rugged features guarantee that it will always be ready.
  • Getac F110
    The award-winning F110 is a true revolution in rugged tablet computing. The F110 combines best-in-class performance, industry-leading security, a large 11.6” widescreen display and a thin and light design that redefines rugged mobility.
  • IEI Rugged Embedded Computer TANK-760-HM86
    Intel® Core™ i5-4400E 2.7 GHz dual-core processor Intel® Celeron® 2000E 2.2 GHz dual-core processor One CFast socket Support three independent video outputs Built-in two 2.5" SATA 6Gb/s HDD bays 9 V~36 V DC input Support IEI iRIS-2400 (IPMI 2.0 compliant)
  • IEI Rugged Panel PC  AFL-15AE-N270
    ● 15"" TFT LCD with resistive touch screen ● System memory up to 2 GB RAM ● Built-in 802.11b/g/n wireless LAN ● Selectable AT/ATX power mode through the switch inside the chassis ● Built-in two speakers ● One CompactFlash® slot ● IP 64 compliant front panel ● IEI One Key Recovery solution allows you to create rapid OS backup and recovery (over 4GB storage capacity is suggested)
  • Be Ready - Virtual Reality Awareness Game
  • Estmrarya Academy - أكاديمية استمرارية
    أول اكاديمية باللغة العربية علي مستوي العالم تقدم محتوي في مجالات استمرارية الأعمال - التعامل مع الطوارئ والكوارث حائزة علي عدة جوائز عالمية كأفضل ابتكار من معهد استمرارية الأعمال بانجلترا
  • Estmrarya Consulting - Services
    Consulting - Advisory - Training - Innovation Business Resilience Business Continuity IT DR Information Security Management IT Service Management
  • Estmrarya Consulting - Business Continuity Training
    Training portfolio
  • Estmrarya Consulting - Be Ready - Learning Management System
    Estmrarya Be Ready - LMS Business Continuity Management Emergency Response Crisis Management Social Media Crisis Management
  • SmartScan

    SmartScan

    WJN / The Kernel

    SmartScan is an easy-to-use and handy solution being a real godsend to assess protection maturity and manage information security in enterprises of any scale. Its troubleshooting functionality addresses any and all vulnerabilities left behind by code errors, incorrect security settings, weak passwords, unauthorized installation of software or hardware, delays in critical updates, and security policy breaches.
  • Elcomsoft Password Recovery Bundle
    All password recovery tools in a single value pack. Unlock documents, decrypt archives, break into encrypted containers with an all-in-one password recovery bundle. - Breaks passwords to several hundred formats - Works 20 to 200 times faster with hardware acceleration using conventional video cards for GPU acceleration+ - Distributed attacks with excellent scalability on up to 10,000 computers - Includes all relevant password recovery tools in a single discounted package Supports: all versions of Microsoft Office, OpenOffice, NFS Encrypted File System, Windows and macOS passwords, macOS Keychain, ZIP/RAR/RAR5, PDF, BitLocker/PGP/TrueCrypt and many more. Instantly extracts passwords from instant messengers, email clients, Web browsers and many other products. Several hundred formats supported.
  • Elcomsoft Mobile Forensic Bundle
    The complete mobile forensic kit in a single pack. Perform physical, logical and over-the-air acquisition of smartphones and tablets, break mobile backup passwords and decrypt encrypted backups, view and analyze information stored in mobile devices. - Tools for logical, physical and over-the-air acquisition of mobile devices - Over-the-air acquisition of iOS devices, Microsoft and Google accounts - iCloud acquisition with or without the password - Breaks passwords to mobile backups with GPU acceleration - Access to deleted evidence and forensically sound extraction Tools for logical, physical and over-the-air acquisition of mobile devices Over-the-air acquisition of iOS devices, Microsoft and Google accounts iCloud acquisition with or without the password Breaks passwords to mobile backups with GPU acceleration. Access to deleted evidence and forensically sound extraction
  • Elcomsoft Phone Breaker
    Perform logical and over-the-air acquisition of iOS, Windows Phone 8/8.1, Windows 10 Mobile and BlackBerry 10 devices, break into encrypted backups, obtain and analyze information from Apple iCloud. - Break passwords and decrypt iOS backups with GPU acceleration - Decrypt iCloud Keychain and iMessages from iCloud - Decrypt FileVault 2 volumes with iCloud escrow keys - Download iCloud backups and synced data with or without Apple ID password Supports: local iOS backups (iTunes); iCloud and iCloud Drive backups; iCloud synced data (call logs, photos, browsing history etc.); BlackBerry 10 backups; Microsoft Account (with valid authentication credentials); Windows Phone 8, 8.1, Windows 10 Mobile backups; iCloud authentication tokens.
  • ElcomSoft Distributed Password Recovery
    Break complex passwords, recover strong encryption keys and unlock documents in a production environment. - Break passwords to more than 300 types of data - Heterogeneous GPU acceleration with multiple different video cards per computer - Works 20 to 200 times faster with hardware acceleration - Linear scalability with low bandwidth requirements and zero overhead on up to 10,000 computers - Remote deployment and console management Supports: all versions of Microsoft Office, OpenOffice, ZIP/RAR/RAR5, PDF, BitLocker/PGP/TrueCrypt. Over 500 formats supported.
  • Guard Tour Monitoring System
222 Results