•Command and Control solutions
•Design and built command and control centre
•Emergency response and incident management
•Command and control application
•Secure communications and access.
•Border protection
•Transportation security (Airport, Seaport, Highway, Rail)
•Oil and Gas protection, pipeline security
•Financial institutions, key government buildings, correction facilities, and Defence installations
•VIP protection.
•Protection of Industrial control systems
•Information security
•Social media monitoring
•Digital forensics
•Cyber command
•Biometrics based identification system
•Intelligent light bar solutions for traffic enforcement
•RFID based real time tracking
•Tactical interception of data, voice and satellite
•VHF/UHF direction finders
•Drone jammers
•Emergency response and incident management
•Command and control solutions
•Critical National infrastructure protection
•Border protection
•VIP protection.
•Counter terrorism
•Spectrum monitoring and management
•Persistent surveillance (UAVs & Aerostat)
•UAV/Drone jammers
•Cyber policy, cyber security, cyber command
•Social media monitoring
•Digital forensics
•Technical surveillance (Bug sweeping)
•Criminal electronic monitoring system
•Citywide surveillance, National highway surveillance
•Interpol database integration, facial recognitiond
•Risk and vulnerability assessment
•Persistent and intelligent video surveillance
•Intelligent access and entrance control
•Physical intrusion detectioncs
•Fire detection and alarm
•Wireless communication
•Computer aided dispatch
•PSIM
•Command and control centre
•Ground control system
•High Altitude (1000m), High endurance aerostat
•L3/FLIR EOS
•RADAR & SEC,COM payloads
•Wide range of VTOL & fixed wing UAVs with auto pilot for surveillance and recon activities
•Helium recovery & purification system
•8 HD IP cameras- 3 in the front, three in the back, and one camera on each side.
•These cameras will be capable of reading the plates from all directions.
•The front and back cameras will capture and analyse the vehicle plates from 3 lanes at the same time, where the side cameras will be able to detect the plates parked on both sides of the patrol.
•In the patrol’s dashboard, a rugged LCD will be installed. It will be connected to a rugged PC in the back of the patrol.
•The AMPR software engine will be installed on this rugged PC and will process the footage from all the 8 cameras locally in the patrol. The AMPR software will check CID, traffic and any other required databases through a dedicated server in police operation room every 2 minutes to update its own database of wanted vehicles over 3G/4G network, which means that every patrol will have the full databases stored locally and processed locally, and only the deltas updates will be transferred over 3G.
•Optional 360 degree video surveillance
•The light bar can have also optionally 4 HD IP surveillance cameras capable of recording videos from all directions at the same time and get 360 degree coverage.
•Intercept common (GSM/Satellite) Networks
•All-in-one stand-alone system
•Extends Interception coverage
•Intercepts phone calls, Sims, Faxes and Raw data communications.
•Decrypt A51/A52 encryption
•Supports LAN, WAN, Wi-Fi, ADSL, GSM, UMTS, POTS
•Live monitoring and full recording of all activities
•Processes internet communications
•Covert target location tracking
•System is capable of automatically detecting suicide vests and other person-born threats at distances outside of the blast danger zone.
•The result: threats are rapidly detected and mitigated before they can harm personnel or critical infrastructure.
•Combination of radar and video technology allows the system to automatically detect concealed person-borne threats, such as suicide vets and weapons, in real-time and at stand-off distances.
•Universal dual-band direction finder system for the VHF marine and aviation bands and the VHF/UHF aviation bands.
•SAR direction finder, communication direction finder
•Unsurpassed reception sensitivity in this class to permit detection of extremely weak or distant signals.
•Selective squelch to avoid false alarm.
•Display of bearing with reference direction as true north, magnetic north or relative.
•Completely illuminated control unit
•Optimized signal processing for fast, stable direction finding.
•Excellent localizing precision
•NMEA, RS-485 and RS-232 interfaces for system integration and remote control capability.
•Correction of lag error after changes in direction.
•Optimized for use at land, sea air: robust, compact design , waterproof (IP67).
•Identify the UAV
•Determine the UAV tasks- Commercial/Hobby/Terroristic
•If the UAV is dangerous- communication link interference
•GPS Interference
•Take over UAV control
•Prevent dangerous consequences
•IP based surveillance cameras mounted at strategic locations
•Thermal cameras and infrared lighting for reduced light conditions
•Vandal proof rugged casing
•Surveillance cameras that support slew to cue
•Automatic number plate recognition
•Intelligent video analytics
•Secured fibre and wireless communication for surveillance cameras
•Solar powered and battery back up
•IP based proximity/Biometric access control
•Crash rated rising arm barriers integrated with access control
•Crash rated barriers and bollards
•Turnstile and gates
•Physical and logical fences
•Baggage and personnel scanners
•Under vehicle inspection systems
•Risk and vulnerability assessment
•ICT auditing
•Network security
•Log Analysis
•Security incident and Event management
•Data leakage prevention
•Security operations centre
•C-SIRT
•Cyber security operations centre
•Simultaneous access to all social media networks
•Insights by location
•Smart grouping
•Real time social media streaming
•Automated sentiment
•Trend analysis
•Conversation tracker
•Audience engagement insight
•Qualitative data visualization
•Multi-language support
•Computer forensic acquisition and analysis
•Mobile and PDA forensics
•Cyber Crime first responder kits
•Audio and video analysis forensics
•Voice biometric
•Network forensics
•Password recovery
•CDR, social media and crime
•Pattern analysis
•Steganography
•Email tracking, discovery and analysis
•CD/DVD/Hard Disk recovery
•Open source intelligence, content monitoring and analysis.
•We provide latest counter-surveillance detection equipment that are capable of locating the audio and video devices that are used for eavesdropping.
•We provide professional technical and physical sweeps
•We also provide consultancy services for professional protection of the sites from eavesdropping