Security Solutions

Project management and IT, Technology and Security program management (non-exhaustive list): Cybersecurity, Cryptology & PKI Biometrics in all its applications...

Access and connectivity Use of CVS such as Github, Bitbucket, Gitlab and other common source code controls for access to...

Bandwidth is a premium especially after going dark. Priority of message sent is an operational requirement. Compression: Multiple compression algorithms...

Secure and automated software solutions transforming the economic, operational and deployment models of edge computing networks. Existing LANs (Brownfield) Hardware...

Night vision solutions with a new range of cameras with truly unique features enabling color viewing and recording at night...