Software services in Illinois (46 found)
With a 110-year heritage, the National Insurance Crime Bureau (NICB) is the nation's premier not-for-profit organisation dedicated exclusively to fighting insurance fraud and crime. NICB was formed in 1992 from a merger between the National Automobile Theft Bureau (NATB) and the Insurance Crime Prevention Institute (ICPI), both of which were not-for-profit organisations.
NobleTec LLC is committed to representing breakthrough and industry-leading hardware, software, and IT services.
OneSpan leverage identity, security, and compliance DNA as a core platform differentiator to empower enterprises to deliver the optimal level of security, world-class user experience, and human touch in digital interactions and agreements with their customers.
Founded in 1969, PASS Security designs installs and maintains large, commercial business and enterprise-scale integrated security systems for city municipalities, schools and universities, hospitals, marine operations, police departments, and more, as well as residential new home construction.
Racom Business will work as an extension of the team to manage the entire process of procuring and implementing business telecom and IT solutions. Racom Business will be the single point of contact for all IT and Telecom needs, including dedicated support at every step of the cycle.
REMPREX can take the organisation into the future through a wide array of services that leverage data insights, human-assisted technology, and decades of first-hand experience in intermodal operations. They provide Remote Operations, Remote Monitoring, Business Intelligence, Managed IT Services, Automated Gate Systems, Automotive Operations, and Remote Checkpoint Operations.
RFID Sherpas are a team of retail consultants with expertise in store operations, process reengineering, change management, supply chain, solution architecture, procurement and project management. Their clients are retailers and global brands. They support projects in North America, Europe and beyond, with much of their work featuring an omni-channel component.
Screencastify is the simplest video platform for creating visual communication.
Sentry Enterprises is a manufacturer of converged biometric identification solutions that mitigate risk across the client’s enterprise. They provide cyber security, biometrics, secure data, and smart card.
SoloInsight Inc. is an innovative electronics engineering and IT company working in the fields of research and development of diverse intelligent pattern recognition technologies and products. As a technology provider with core expertise in computer vision, SoloInsight provides the development of technologies and solutions related to the human recognition that targets the workforce management and security industry.
UbiStor can streamline workflows, mitigate risk, and offer improved flexibility. They provide Data Protection, Backup, Virtual Disaster Recovery, Hosting Solutions, Tiered Recovery & Hosting Experts and much more.
Umbrella Technologies is a security consulting & system integration firm focusing on video surveillance systems, access control and mass notification solutions. Umbrella Technologies creates innovative products within the security industry including HD cameras, video management software, and business intelligence analytics.
VASCO is a global leader in delivering trust and business productivity solutions to the digital market. VASCO develops next generation technologies that enable more than 10,000 customers in 100 countries in financial, enterprise, government, health care and other segments to achieve their digital agenda, deliver an enhanced customer experience and meet regulatory requirements.
YASH Technologies is a consulting-led transformation partner with a proven track record of helping customers address their current and prospective digital transformation challenges.
Zerv’s patented technology creates a secure mobile connection between any access reader and mobile device. Once installed, the software seamlessly integrates the security and authentication of access system to a secure cloud application to improves its security, access control and its management of access. Their technology migrates security and authentication to a software model that is adaptable to future security and access feature upgrades.
Browse security companies
Related white papers
How to overcome the storage challenges of adopting surveillance AI
How to get buy-in from IT departments on IP video installations
Wavestore and the Linux advantage
Upcoming security events in United States of America (USA)
SANS Cyber Threat Intelligence Summit & Training 2025
- 27 - 3 Jan, 2025
- Virginia, United States of America (USA)
SPIE Photonics West 2025
- 28 - 30 Jan, 2025
- San Francisco, United States of America (USA)
UAV Technology USA 2025
- 3 - 4 Feb, 2025
- Arlington, United States of America (USA)
Zero Trust World 2025 (ZTW25)
- 19 - 21 Feb, 2025
- Orlando, United States of America (USA)
Disasters Expo USA 2025
- 5 - 6 Mar, 2025
- Miami Beach, United States of America (USA)
Aprés-Cyber Slopes Summit 2025
- 6 - 7 Mar, 2025
- Dr Park City, United States of America (USA)
20th International Conference on Cyber Warfare and Security
- 28 - 29 Mar, 2025
- Williamsburg, United States of America (USA)
ISC West 2025
- 31 - 4 Mar, 2025
- Las Vegas, United States of America (USA)
Innovate Cybersecurity Summit – Nashville 2025
- 6 - 8 Apr, 2025
- Nashville, United States of America (USA)
RSA Conference 2025
- 28 - 1 Apr, 2025
- San Francisco, United States of America (USA)
46th IEEE Symposium on Security and Privacy
- 12 - 15 May, 2025
- San Francisco, United States of America (USA)
Community Risk Reduction Leadership Conference 2025
- 13 - 15 May, 2025
- Glendale, United States of America (USA)
SIA GovSummit 2025
- 20 - 21 May, 2025
- Washington, DC, United States of America (USA)
Security LeadHER 2025
- 9 - 10 Jun, 2025
- Detroit, United States of America (USA)
Prevention Strategies Conference 2025
- 23 - 24 Jun, 2025
- Las Vegas, United States of America (USA)
The key to unlocking K12 school safety grants
Download5 surprising findings from OT vulnerability assessments
DownloadPhysical access control
DownloadHoneywell GARD USB threat report 2024
DownloadPalm vein recognition
DownloadEnhanced security with S617 video door station
Remote Guarding Video Series Part 1: Overview and Basics.
Remote Guarding Video Series Part 5: Future and Technology