Software installers in Austria (709 found)
Threat Management Group (TMG) is a Certified Service-Disabled, Veteran-Owned Small Business (SDVOSB) incorporated in 2004 and located in the Charleston region of South Carolina. For over a decade, TMG has been supporting Counter Terrorist Operations around the globe and is staffed with former High Threat Executive Protection, Special Operations Forces (SOF), Explosive Ordnance Disposal (EOD), Chemical, Biological, Nuclear, Radiological experts.
TIBCO fuels digital businesses by enabling better decisions and faster, smarter actions through the TIBCO Connected Intelligence Cloud. From APIs and systems to devices and people, TIBCO's security platform interconnects everything, captures data in real time wherever it is required, and augments the intelligence of businesses through analytical insights.
Tiger Technology designs, markets, and supports innovative shared storage solutions that maximise workflow, performance and value. From software-only to fully integrated appliances, the company's open platform fits all business and enterprise needs.
With over 100 years of growth, TouchPoint, Inc. has a strong presence in the technology and manufacturing sectors. TPI seeks to leverage its position and experience by identifying and building equity positions in emerging global companies to build strong returns. TPI strives to build a strategic relationship with the companies it acquires by offering guidance to existing management teams.
TPx Communications is a managed services provider, redefining the way enterprises grow, compete and communicate. Offering a full suite of managed IT, unified communications, network connectivity and security services, TPx has the experience and know-how to solve even the most complicated IT challenges.
TRACIP is the renowned data recovery & digital forensics laboratory in France and IRCGN’s industrial partner for forensic science. They provide digital investigation equipment and training for both government agencies and corporations. Their state customers include law enforcement agencies, cyber defense and military units, government agencies, regulation authorities.
Trackforce acquired Valiant Solutions Inc. and formed a new company called Trackforce Valiant. It specialises in delivering all-in-one security workforce management platform. It eliminates the need to rely on paper reports or subpar systems. The security experts working at Trackforce Valiant have designed a software to aid manned security.
TrackTik is an intuitive security workforce management software that provides actionable insight through integrated field operation and back office solutions. The company provides security operation management software solutions, workforce management solutions, security management software, physical security, incident management, dynamic tracking, security guard management, mobile communications, and healthcare security solutions.
truckBlok protects people and ward off dangers by providing highly efficient solutions in counter-terrorism and threat protection. truckBloc modules provide effective protection against vehicle attacks. Certified according to ISO IWA 14-1 and BSI PAS68.
Trulioo offers the most robust and comprehensive global identity verification solution in the market. Through one single portal/API, Trulioo can assist you with all your AML/KYC identity verification requirements by providing secure access to over 5 billion identities worldwide.
TCSS offers a broad range of services and automated solutions to help customers to assess and reduce their risks. TCSS aims to go beyond the basics of Cyber Security and supports clients to adopt more advanced defences like threat intelligence, IOT security, automated threat hunting and pen testing.
Trusted Objects are experts in cyber security technologies for embedded systems and cloud device management platforms for enterprises. They also provide services such as IP Protection, IoT Security, Cyber Security and Data Protection Solutions.
Founded in 2007, TWG Security has become one of the largest and most trusted security technology integration firms in Eastern Pennsylvania. TWG Security provides innovative security solutions that exceed expectations through enhancing safety, efficiencies, and prosperity in their communities. They also offer end-to-end physical security solutions for companies and organisations of all sizes.
Twilio powers personalised interactions and trusted global communications to connect people all over the world. Millions of developers around the world have used Twilio to unlock the magic of communications to improve any human experience. Twilio has democratised communications channels like voice, text, chat, video, and email by virtualising the world’s communications infrastructure through APIs that are simple enough for any developer to use.
Promoting the ubiquitous deployment of smart wireless systems, ubisys technologies GmbH Düsseldorf, Germany was founded in 2005 as a hardware and software design house specialising in RF and Embedded Systems engineering. ubisys has evolved as a supplier of industrial Wireless Networking solutions and today puts its clear focus on the development and manufacture of innovative and convenient Home & Building Automation products.
Uncanny Vision Solutions is a startup based out of Bangalore, India, which us focused in developing optimised computer vision solutions for the embedded market. Computer vision has been an area of research for a few decades now, but is now finding use in many emerging real-world application because of the availability of more computational power in processors and the increasing maturity of the computer vision algorithms.
Since 2005, Universal Robots has worked to make a difference in their customers' lives in ways that matter most to them. The company's advanced tools and easy-to-use robot arms are used by companies and organisations of all sizes to help and address market volatility. Their cobot solutions deliver the flexibility and financial return that manufacturers need to compete and win in any market condition.
Uponor is rethinking water for future generations. Their offering, including safe drinking water delivery, energy-efficient radiant heating and cooling and reliable infrastructure, enables a more sustainable living environment.
Upstream Security Ltd. helps corporations mitigate connectivity risks and ensure the safety and security of smart mobility solutions protecting connected and autonomous vehicles, SAE levels 0-5, on the roads today and twenty years from now, from remote cyber attacks generated over the public internet or private mobile APN as well as from fleet-wide attacks targeting multiple vehicles at the same time.
USAV bonds ProAV affiliates into an elite industry team. With integrators through the U.S. and Canada, partnerships with top ProAV manufacturers and service providers, and alignment with leading industry associations, the USAV advantage is unparalleled. USAV Integrators provide clients with the benefit of a nationwide network of ProAV specialists and personal relationships with local AV experts.
Utility, Inc. provides mobile resource management technology and services that allow utilities and first responder organisations to effectively command, control and support mobile field operations. The company’s solutions deliver real-time access to virtually any mobile asset, providing a unified operating picture for safely locating, tracking and managing all aspects of mobile field operations.
UVeye sets the future standard of vehicle inspection globally. They provide high-end solutions for automatic external inspection of vehicles, using advanced technologies that include proprietary hardware combined with machine learning and computer-vision algorithms. UVeye’s first line of products, deployed all over the world in the Homeland Security and Defense (HLS) market, enables customers to automatically scan, detect and identify threats.
Based in Montreal, Canada, Valsoft Corporation's focus is to acquire and grow vertical software businesses that provide mission-critical solutions in their respective niche or market. They specialise in building and acquiring vertical market software companies that provide mission critical solutions in their respective industry or niche.
Vantage England and Wales, formerly AS Communications, provide local precision agriculture expertise on the full suite of Trimble solutions, making precision technology work seamlessly across complex farming operations. They offer market renowned precision farming solutions to enhance farm efficiency and profitability.
Vantage Robotics makes the first and only drone to receive a broad waiver from the FAA for commercial operations over people. Their product is used by CNN, Tribune Media, C-Span, multiple law enforcement agencies, and hundreds of other customers.
Vector Flow is dedicated to using machine learning and automation to deliver improved operational efficiencies – and effectiveness – across the entire physical security domain. Their advanced cloud-enabled and on-premises platform converts raw security data from multiple sources into intelligent insights to drive operational performance and business results.
VECTOR Informatik is a globally renowned provider of tools, software components, hardware and services to simplify the development of automotive electronics. They also offer Development of Distributed Systems, ECU Software, ECU Testing, Automotive Ethernet, Automotive Cyber Security, Embedded Software and Systems.
Vedard is China professional export retail supplier of fire alarm systems and burglar alarm security systems. They provide free technical support and video guide to help set up and program professional fire alarm systems. They cooperate with security fire alarm system installers and security engineers and provide free security solutions for specified security projects.
Veertec (VEER) is an advanced video analytics platform integrated with top video management software (VMS) for IP network-based video surveillance, making cities safer and smarter. Transforming any video stream to a searchable content, VEER is designed to detect, recognise, and classify in real-time: objects, products, human behaviors, human appearances, or emotions, between others.
Browse security companies
- Region
- Western Europe
Related white papers
How to overcome the storage challenges of adopting surveillance AI
How to get buy-in from IT departments on IP video installations
Wavestore and the Linux advantage
Palm vein recognition
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadOPTEX REDSCAN mini series protects The Londoner Hotel
Hofbräuhaus in Munich relies on eCLIQ
What Alcatel-Lucent OmniVista Network Advisor can do for network infrastructure