Access control services in Maryland (39 found)
Regal Technologies provides payment processing services for internet payments, credit and debit cards, demand draft check clearing, and ACH transfers. The company deals with solutions for bank wire processing while also offering programming and consultation services while ensuring data integrity and security.
Since starting the company in 1988, we have assisted clients in nearly every state meet their security needs. Our company offers an expertise encompassing design, manufacturing, installation and maintenance of a variety of security subsystems. Areas of technical expertise include: access control, video surveillance, data transmission, ID badge systems, intrusion detection, intercom/sound systems, and gate entry systems.
Sepio is disrupting the cyber-security industry by uncovering hidden hardware attacks. They provide complete mitigation for malicious hardware attacks before they can cause any harm, Their solutions include hardware finger printing, behavior analytics and discover of rogue/ghost devices.
Skyline Technology Solutions has built a strong reputation of delivering business intelligent IT Solutions and outstanding customer service. Skyline has been creating Networking, Security, Infrastructure, and Intelligent Transit solutions for commercial, federal, state and local clients, since 2004.
Sonatype is a renowned company in software supply chain automation technology with more than 350 employees, over 1,200 enterprise customers, and is trusted by more than 10 million software developers. Their Nexus platform enables DevOps teams and developers to automatically integrate security at every stage of the modern development pipeline by combining in-depth component intelligence with real-time remediation guidance.
Tenable, Inc. is a Cyber Exposure company. Over 27,000 organisations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus, Tenable extended its expertise in vulnerabilities to deliver Tenable.io, the software to see and secure any digital asset on any computing platform.
Trustwire offers strong end-to-end encryption while keeping it simple to use. Trustwire uses the industrial-strength AES 256-bit and RSA 4096-bit encryption to protect users files and messages. They use end-to-end encryption to ensure that only the owner of files can decrypt and read the contents. In fact, it is so secure that not even Trustwire has the technical ability to decrypt user files.
Untethered Labs provides wearable wireless technology to the enterprise security and access control markets. With wide applications in IT security, healthcare, law enforcement, and large businesses, its solution, GateKeeper, is the first line of defence for protection against unauthorised use of computers in the workplace.
Since 2001, Vintage Security has had a mission to provide the best possible security monitoring service and solutions to our customers. It is one of the largest full-service integrators in the Washington D.C., Maryland, and Northern Virginia areas with over 15,000 customers. Vintage Security is an area leader in the residential and commercial security and networking industries. Its helps home and business owners with various services.
Browse security companies
Related white papers
Palm vein recognition
Physical access control
The 2024 state of physical access trend report
Upcoming security events in United States of America (USA)
ISC East Las Vegas 2024
- 19 - 21 Nov, 2024
- New York, United States of America (USA)
ISC East 2024
- 19 - 21 Nov, 2024
- New York, United States of America (USA)
SIA Honors 2024
- 20 - 20 Nov, 2024
- New York City, United States of America (USA)
Counter UAS Technology USA 2024
- 2 - 4 Dec, 2024
- Arlington, United States of America (USA)
Technology Summit International 2024
- 4 - 6 Dec, 2024
- Oklahoma City, United States of America (USA)
Gartner Identity & Access Management Summit 2024 - Grapevine, Texas
- 9 - 11 Dec, 2024
- Grapevine, United States of America (USA)
UAV Technology USA 2025
- 3 - 4 Feb, 2025
- Arlington, United States of America (USA)
Zero Trust World 2025 (ZTW25)
- 19 - 21 Feb, 2025
- Orlando, United States of America (USA)
ISC West 2025
- 24 - 26 Mar, 2025
- Las Vegas, United States of America (USA)
20th International Conference on Cyber Warfare and Security
- 28 - 29 Mar, 2025
- Williamsburg, United States of America (USA)
Innovate Cybersecurity Summit – Nashville 2025
- 6 - 8 Apr, 2025
- Nashville, United States of America (USA)
Community Risk Reduction Leadership Conference 2025
- 13 - 15 May, 2025
- Glendale, United States of America (USA)
SIA GovSummit 2025
- 20 - 21 May, 2025
- Washington, DC, United States of America (USA)
Security LeadHER 2025
- 9 - 10 Jun, 2025
- Detroit, United States of America (USA)
Prevention Strategies Conference 2025
- 23 - 24 Jun, 2025
- Las Vegas, United States of America (USA)
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
DownloadOPTEX REDSCAN mini series protects The Londoner Hotel
Hofbräuhaus in Munich relies on eCLIQ
What Alcatel-Lucent OmniVista Network Advisor can do for network infrastructure