Products: IT-Security

IT-Security

Mobile TETRA, DECT and GSM terminals

Funkwerk Security Communications GmbH - Archiv -

Mobile TETRA, DECT and GSM terminals were in the focus of Funkwerk group's presentation at CeBIT. For the first time, three business units of the Funkwerk grouphad a...

IT-Security

Forensic extraction device for cell phones, smartphones and PDAs

Cellebrite GmbH -

The Cellebrite UFED Forensic System is the ultimate standalone mobile forensic device, ready for use out in the field or in the lab.The UFED system extracts vital...

IT-Security

VoWiFi handset to support the IEEE 802.11n networking standard

Ascom Deutschland GmbH -

Ascom Wireless Solutions, the leading supplier of on-site wireless communications,announced the release of the Ascom i62, their new generation VoWiFi handset. The new...

IT-Security

HD-capable hard disk calculator

-

With the HDD calculator Dallmeier provides partners and customers with an extremely useful and valuable planning tool, because the hard disk calculator makes it easy to...

IT-Security

Hot-swappable HDD system for rugged use

BWA Technology GmbH -

The BWA-UDOCK1 is a unique, swappable HDD memory system offering all the advantages, which are expected from a hard disk data medium: ultra-high-speed, high memory...

IT-Security

Low Power Cost-Effective CPU Board

ADVANTECH Europe BV (Zweigniederlassung Deutschland) -

Advantech announces the addition of the PCM-3355 PC/104 CPU board with AMD LX800 and LX600 processors at 500 and 366MHz. PCM-3355 has standard dimensions of 96 x 90 mm...

IT-Security

Wireless signal transmission system TRS for doors and gates

MAYSER GmbH & Co. KG -

The Innovation Award is announced by the Stuttgart International Trade Fair together with the German Association for Roller shutter doors, + sun protection and the BVT...

IT-Security

No more passwords: Replacement by fingerprints

ekey biometric systems Deutschland GmbH -

Did you know that 82 percent of the passwords or of the access data are jotted down on post-its and are therefore also available for non-authorized users? An ekey...