Contact Us |Site Map

Home » Product Directory »

Member Since
Total 31890 products in
Show: 30 items
Smart Home Security

Smart Home Security 2016-12-28 06:15:48

Smart home application allows people remote control the equipment of home such as lights, door locks, air conditions, refrigerators or IP cameras through the smartphone and internet. It seems like ...

Robot Security

Robot Security 2016-12-28 06:15:55

Robots have become an indispensable part of automated production because of the rise of IoT. More and more manufacturing industries use robots to replace people for producing. The automated produc ...

Healthcare Security

Healthcare Security 2016-12-28 06:15:42

As the development of Internet of Things (IoT), Telecare service has been implemented in our life. Telecare service can transmit the real-time status of people who need healthcare. Through the inf ...

POS System Security

POS System Security 2016-12-28 06:15:30

Point of Sales (POS) Security The information security event of POS system attacking is not uncommon. Hackers steal customers' personal info or credit card information through invading the syst ...

mPOS Security

mPOS Security 2016-12-28 06:14:49

Mobile POS Security The development of mobile device has promoted the birth of mPOS (mobile Point-of-Sale). POS can be used on mobile devices such as smart phones and tablets. Most POS system w ...

POS Security

POS Security 2016-12-28 06:14:42

Medical POS Security POS system of Mobile Nurse Station allows doctors and nurses can connect the database of hospital's server via wireless to acquire the patient records anytime anywhere. And ...

Industry 4.0

Industry 4.0 2016-12-28 10:27:26

As the development of Internet of Things (IoT), POS system must be more powerful, more connected, smarter and richer to suit Industry 4.0. In the process of manufacturing, the supply chain, produc ...

Personal Authentication

Personal Authentication 2016-12-28 06:14:08

Identity Authentication From social software (ex. Facebook and Twitter) to search engines (ex. Google and Yahoo), from online shopping (ex. Amazon and Taobao) to cloud storage (ex. Dropbox, Goo ...

Personal Information Security

Personal Information Security 2016-12-28 10:08:59

Identifying Information Protection As the expansion of the scope of informatization, whether in our work or daily life we usually store our personal information such as name, birthday, job or ...

Asset Security

Asset Security 2016-12-28 06:14:22

Device Management & Control Whether in our work or daily life, desktops, laptops, smart phones or tablets are indispensable tool. Most business confidential documents or personal privacy ar ...

Personal Data Protection

Personal Data Protection 2016-12-28 06:13:41

No matter the data store in computers, smart phones or cloud, there are always many security vulnerabilities. If you store your privacy in these places, there is risk to be stolen. Only rely on an ...

Mobile Signature

Mobile Signature 2016-12-28 06:13:23

In the mobility age, limited by e-sign on desktops has been gradually inadequate. Because some managers who have signing authority will not always stay in front of desk, the signing process often ...

Secure Mobile Payments

Secure Mobile Payments 2016-12-28 06:13:17

Mobile Payment Mobile payment application allows smart phones become a payment tool. We don't need to always carry credit card or cash to make payment. The virtual payment tool makes life more ...

Mobile Banking Security

Mobile Banking Security 2016-12-28 06:13:10

Mobile Banking The mobile devices such as smart phones and tablet pc allows users log in online bank to check account, transfer and make payment, anytime anywhere. But, mobile devices are not a ...

Fingerprint Mobile Security

Fingerprint Mobile Security 2016-12-28 06:13:04

Biometrics refers to metrics related to human characteristics such as fingerprint, facial contour, voice or iris, etc. Through these characteristics to identify the people's identity. Most Apps of ...

Identity Authentication

Identity Authentication 2016-12-28 06:12:23

Through the establishment of Certification Authority (CA), we can strengthen the secure level for the E-Applications of enterprises or organizations such as E-Sign, E-Supply Chain, E-Consumption o ...

Enterprise Data Protection

Enterprise Data Protection 2016-12-28 06:12:40

The enterprises' confidential documents might be leakage due to different ways such as hackers or stolen by employees. For protecting the confidential documents, enterprises need a comprehensive i ...

Behavior Management

Behavior Management 2016-12-28 06:12:55

Behavior Management & Control Employees' unintentional negligence or malicious stealing might makes the confidential data loss or leakage. How to efficiently manage and control employees to ...

Asset Management Control

Asset Management Control 2016-12-28 06:12:08

Asset Management & Control In the age of informatization, IT asset (ex. system database and files, etc) and entity asset (ex. computers and communication equipment, etc) are the most import ...

Secure Mobility

Secure Mobility 2016-12-29 10:51:27

Mobile access from smartphones and tablets is the way work increasingly gets done for both corporations and criminals. Sensitive information, including cardholder data, usernames and passwords, pe ...

Privileged Management

Privileged Management 2016-12-29 10:51:16

Privileged Management solutions enable you to secure, control and audit privileged accounts by providing appropriate access through automated, policy-based workflows. The solutions cover the ent ...

Identity Access

Identity Access 2016-12-29 10:51:03

Identity & Access Keeping your network secure by ensuring that the right people and only the right people have access to just the right resources is the job of Identity and Access Managem ...

Data Protection Encryption

Data Protection Encryption 2016-12-29 10:50:51

Data Protection & Encryption Sensitive data is constantly at risk of loss, theft, and exposure. The rapid proliferation of mobile devices with large storage capacities and often internet ...

Secure Communication

Secure Communication 2016-12-28 06:10:27

In the wake of coming out of smart phones, phone call is not the only way people communicate by cell phone. We also communicate by Apps, transmit voice and image through internet. Due to the commu ...

Personal Information Protection

Personal Information Protection 2016-12-28 06:10:20

Mobile Apps such as Facebook, WeChat or Youtube has become the most important life tools and information source for most people. Sometimes, these Apps pop up the message of authorization request w ...

Mobile Data Protection

Mobile Data Protection 2016-12-28 06:10:36

Smart phone has become an indispensable electronic product in daily life for most people. More and more privacy, digital property and personal data, etc. are stored in the phone. Therefore, if you ...

Mobile Payment Security

Mobile Payment Security 2016-12-28 06:10:11

Authentication、Signature、Payment Mobile payment or mobile signature is the trend of mobility applications. More and more users are getting used to pay, transfer or digital signature by smart ph ...

Linesman Flag

Linesman Flag 2017-02-22 09:11:32

The flag is made of fluorescent waterproof fabric and it will not roll in the rod when raining. It is with compact design and easy to carry. Especially the sponge grip, it's easier to use and mor ...

Linesman Flags

Linesman Flags 2017-02-22 09:11:20

Any size, color, design, materail are available. Comfortable and soft hand feeling and good quality Quick Response to Your Enquiry Punctual delivery Low price and high quality ...

Sports Travel Bag

Sports Travel Bag 2017-02-22 09:11:05

This fabric is a elegant, first class quality, graceful color. Color varitey: available in many colors, accroding your requirements. Material: big shoe compartment capacity polyester sports duff ...

<< 261 262 263 264 265 266 267 268 269 270 >>