Access control manufacturers in California (262 found)
Permiso provides Cloud Identity Detection and Response and weaves events from different systems together to give the user a full story of what the identity of interest has been up to in the cloud.
Pfister is a renowned manufacturer of washroom equipment, faucets and plumbing fixtures for over 100 years now.
The Physical Security Interoperability Alliance is a global consortium of over 65 physical security manufacturers and systems integrators focused on promoting interoperability of IP-enabled security devices across all segments of the security industry. The company's currently five active working groups: IP video, video analytics, recording and content management, area control and systems.
Pivotal offers a platform, tools, and methodology, for companies to unleash innovation and reduce time-to-market. Pivotal Cloud Foundry enables developers to spend more time writing code, and operators to improve security and uptime. The company provides solutions for the automotive, financial services, industrial, media, retail, government, technology, and telecommunications industries.
Prey is a provider of anti-theft solutions for tracking and protecting mobile devices that can manage and secure all of an organisation’s mobile devices from the same place. Installed on more than 8 million devices worldwide, Prey’s cross-platform, open-source security solution consolidates mobile device management on a single account, no matter how many different device manufacturers or operating systems need to be tracked.
Processing Point is the leader of cloud-based information systems for small to mid-size businesses. From cutting-edge cloud based time and attendance, to the latest in point of sale and mobile payments technology, Processing Point invests heavily in new technology in order to bring products and services that save clients time and money while performing mission-critical business tasks.
Proofpoint provides the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, and social media.
Founded in 2016,Proxy's mission is to digitise identity and make it universally accessible, secure and private. Proxy revolutionises how people access the workplace and opens the door to smarter workplace experiences tailored to each individual.
Pulse Electronics is worldwide leader in electronic component design and manufacturing. The company offers a complete line of interface transformers, Copperhead transreceivers and transformers as well as Ethernet interface to support almost any type of military or aerospace design application.
Pulse Secure, LLC is a provider of access and mobile security solutions to enterprises and service providers in the USA. Enterprises from every vertical and of all sizes utilise the company’s Pulse virtual private network (VPN), network access control and mobile security products to enable end user mobility securely and seamlessly in their organisations.
Pure Storage helps innovators build a better world with data. Pure's data solutions enable SaaS companies, cloud service providers, and enterprise and public sector customers to deliver real-time, secure data to power their mission-critical production, DevOps, and modern analytics environments in a multi-cloud environment. Pure Storage enables customers to quickly adopt next-gen technologies, including AI to help maximise the value of their data.
Founded in 2010 and headquartered in San Jose, Calif., Qolsys (Quality of Life Systems) is a technology manufacturer developing Android based innovative solutions for the security and home control industry. Qolsys is dedicated to improving the quality of life through innovation and technology by introducing the next generation life safety, security and home control platform.
Qualcomm Technologies provides end-to-end solutions which help users to manage their automated devices. Qualcomm provides smart homes solutions, secure home solutions, health care solutions, IoT security solutions, and more.
Radiant Logic, the identity data experts, helps organisations turn identity data into a strategic asset that drives automated governance, enhanced security, and operational efficiency. RadiantOne Identity Data Platform removes complexity as a roadblock to identity-first strategies by creating an authoritative data source for real-time, context-aware controls.
RagingWire Data Centers designs, builds and operates mission critical data centers that deliver 100% availability, high-density power, flexible configurations, carrier neutral connectivity and superior customer service. RagingWire provides facility security, access control, monitoring and surveillance.
Real-Time Innovations (RTI) is an Industrial Internet of Things (IIoT) connectivity company that provides the RTI Connext databus software for sharing information in real time. The software finds applications in medical devices, autonomous planes, traffic control, robotics, and defence. RTI is also a vendor of products based on the Object Management Group (OMG) Data Distribution Service (DDS) standard.
RedSeal—through its cloud security solution and professional services —helps government agencies and Global 2000 companies measurably reduce their cyber risk by showing them what’s in all their network environments and where resources are exposed to the internet.
The merger in April 2010 between NEC Electronics and Renesas Technology has given birth to Renesas Electronics. Renesas Electronics is a semiconductor manufacturer. Renesas Board ID device facilitates new functions and processes for M2M security. It also offers significant benefits for business, industry, hospitals, government, consumers and other M2M markets.
Resilient Network Systems, Inc. is a venture-backed identity and access management infrastructure company. The mission of the company is to enable secure, bi-directional information sharing capabilities in regulated industries. Their network-based software delivers adaptive access management by transforming policies into workflows that adjust in real-time to ensure access rules are met for each user’s specific situation.
Revelstoke SOAR is the first low-code, high-speed Security Orchestration, Automation, and Response Platform built on a Unified Data Layer. Their next-gen SOAR gives SOC teams the power to work smarter, faster, and more effectively than ever before.
RGB Spectrum provides innovative solutions for the display, recording, and transmission of computer and video signals. Since its founding in 1987, RGB Spectrum has established itself as a leading designer and manufacturer of cutting-edge video/graphics processors and decision support systems. RGBS Spectrum offers multiviewers, video wall processors, matrix switchers, codecs, recorders, and integrated solutions for control room management.
Ring is a homes and business security products manufacturer in the USA. The Ring Video Doorbell blends convenience, monitoring, and security all into one sleek, simple to use smart doorbell.
Ring Inc. is a renowned provider of smart lighting, video doorbells, stick up cams and security cameras, alarm systems and electronic security equipment internationally.
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Ruckus Networks, an ARRIS company, provides wired and wireless networking equipment and software. The company provides solutions for physical security, network and data security. Their product range consists of software like Cloudpath Enrollment System, Ruckus IoT Suite and ICX Switches. Ruckus also provides training to their customers and partners on technology basics as well as wired and wireless product and solutions.
SafeBreach’s mission is to change the way the industry deals with security and risk, and enable companies to use the security technologies they have invested in to the fullest.
Salesforce is the Customer Success Platform. Their social and mobile cloud technologies—including their flagship sales and CRM applications—help companies connect with customers, partners, and employees in entirely new ways.
Salt Security delivers an API Threat Protection solution focused on securing the ubiquitous APIs connecting everything from web and mobile applications to microservices and IoT devices. These are the APIs that one develops and own and are at the core of connecting the applications and data.
Browse security companies
Related white papers
Palm vein recognition
Physical access control
The 2024 state of physical access trend report
Upcoming security events in United States of America (USA)
CES 2025
- 7 - 10 Jan, 2025
- Las Vegas, United States of America (USA)
SANS Cyber Threat Intelligence Summit & Training 2025
- 27 - 3 Jan, 2025
- Virginia, United States of America (USA)
SPIE Photonics West 2025
- 28 - 30 Jan, 2025
- San Francisco, United States of America (USA)
UAV Technology USA 2025
- 3 - 4 Feb, 2025
- Arlington, United States of America (USA)
Zero Trust World 2025 (ZTW25)
- 19 - 21 Feb, 2025
- Orlando, United States of America (USA)
Aprés-Cyber Slopes Summit 2025
- 6 - 7 Mar, 2025
- Dr Park City, United States of America (USA)
20th International Conference on Cyber Warfare and Security
- 28 - 29 Mar, 2025
- Williamsburg, United States of America (USA)
ISC West 2025
- 31 - 4 Mar, 2025
- Las Vegas, United States of America (USA)
Innovate Cybersecurity Summit – Nashville 2025
- 6 - 8 Apr, 2025
- Nashville, United States of America (USA)
Community Risk Reduction Leadership Conference 2025
- 13 - 15 May, 2025
- Glendale, United States of America (USA)
SIA GovSummit 2025
- 20 - 21 May, 2025
- Washington, DC, United States of America (USA)
Security LeadHER 2025
- 9 - 10 Jun, 2025
- Detroit, United States of America (USA)
Prevention Strategies Conference 2025
- 23 - 24 Jun, 2025
- Las Vegas, United States of America (USA)
ISC East 2025
- 18 - 20 Nov, 2025
- New York, United States of America (USA)
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
DownloadEnhanced security with S617 video door station
Remote Guarding Video Series Part 1: Overview and Basics.
Remote Guarding Video Series Part 5: Future and Technology