Software installers (892 found)

Integrate Security (Integrar Seguridad) provides CCTV systems, security cameras, access control systems, intruder detectors, security alarms, surveillance services, escorts, consulting, advisory, investigations and integration of technological for commercial and residential applications

Integrated Systems is an established provider of Information Technology services and software solutions to the government and industry business sector since 1983. They supply modern technology solutions that meet and exceed expectations, while serving with speed, efficiency and expertize.

Integro is a rubber and thermoplastic molder of power distribution and construction lighting equipment serving the Airfield Lighting, Mining, Shipbuilding, Power Utilities and Steel Fabrication markets. Services provided by Integro include airfield lighting equipment, isolation transformers, fixture leads, connector kits, welding equipment, pre-heat system, power distribution, construction lighting equipment, shipbuilding and power utilities.

Interface is a managed service company that connects and protects some of America’s best known commercial, retail and multi-site organizations – as well as residential communities and private homes. The company's services combine Internet access, digital voice, PCI compliance, and IP based alarm monitoring, video surveillance and access control.

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets.

International Protective Service Agency (IPSA) has been providing a full range of security guard services in the NYC area since 1989. They specialize in event security, residential and commercial building security, talent protection, executive protection, and fire safety services.

Intrado is an innovative, cloud-based, global technology partner to clients around the world. Their solutions connect people and organizations at the right time and in the right ways, making those mission-critical connections more relevant, engaging, and actionable - turning Information to Insight

IntSights delivers state-of-the-art, cloud-native external threat detection to further extend the capabilities of their security operations platform, providing customers with end-to-end external and internal threat detection, automation and remediation.

Upgrade home’s alarm system with Invision Technologies’ SecureConnect, and unlock a suite of security solutions and home automation features accessible from any smart device.

Ionic is changing the way mobile apps are built and delivered. From their popular open source mobile SDK to industry-renowned mobile CI/CD and micro frontend solutions, Ionic helps to meet the demand for mobile across businesses.

IoTech Protect, a Michigan, USA-based company, has partnered with several developers of highly needed technologies, including IT and security technology developers, distributors and producers in Europe, Asia, and North America, with more than 20 years of experience supporting the European and North American markets.

iovation, a TransUnion company, provides a real-time service that exposes online fraudsters, along with multi-factor authentication services to detect fraud before it occurs. Their SaaS solution exposes the reputation of devices (computer, tablet or mobile phone) connecting to online businesses. Their product line includes FraudForce, SureScore machine learning, ClearKey and LaunchKey multi-factor authentication solutions.

IQVIA is a global provider of advanced analytics, technology solutions, and clinical research services to the life sciences industry. IQVIA creates intelligent connections across all aspects of healthcare through its analytics, transformative technology, big data resources and extensive domain expertise.

The IronVest security and privacy-first infrastructure and super app leverages its patented biometric fraud prevention technology to ensure only authorized users can access and transact in any account.

ISA's Cybersecurity vision is to help create a world in which everyone is safe from cyber threats. Through its commitment and passion for excellence and trusted brand and people, its mission is to help protect customers so that they can securely and safely support their employees and clients. ISA is a pure-play cybersecurity company, with over three decades of experience delivering cybersecurity end-to-end services.

IT Glue is a Vancouver-based software solutions company that makes sure all of the applications play nicely together. They provide Software-as-a-Service, Documentation Management, IT Asset Management, IT Process Management, IT Service Documentation, Managed Services Documentation, and Password Vault.

ITech Digital Security Solutions designs customized video surveillance solutions based on the unique business challenges to help enterprises reduce risk, enhance safety, and maximize operations. Their solutions integrate video surveillance, POS systems, access control, and other software/systems into one platform according to the business need.

ITG specializes in providing highly Integrated Systems Solutions in a 'Turn Key' mode. It is a nаtіоnаllу-rесоgnіzеd company іn the security industry аnd viewed as оnе of the fastest grоwіng соmmеrсіаl іntеgrаtоrѕ іn the US. Frоm system dеѕіgn, еngіnееrіng, and installation, to servicing electronic ѕесurіtу ѕуѕtеmѕ, ITG Larson, Inc. offers a full rаngе оf ѕеrvісеѕ to clients.

Established in 1968, J.D. Power is globally renowned data solutions, analytics, cyber security and market research firm. Their headquarters is based out of Troy, Michigan in the United States.

Jacobs provides solutions in scientific, technical, professional and construction- and program-management for business, industrial, commercial, government and infrastructure sectors. They provide intelligence, cyber security, weapons systems and mission solutions.

Jamf, the standard in managing and securing Apple at work, extends the legendary Apple experience people love to businesses, schools, and government organizations through its software and the 100,000 members of Jamf Nation, the largest community of Apple IT admins in the world. 71,000 global customers entrust Jamf with more than 30 million Apple devices.

Janam Technologies is a provider of rugged, mobile computers and contactless access solutions. Small, light, and affordable, Janam’s handheld devices deliver powerful computing performance, superior barcode scanning, state-of-the-art NFC, and proven ruggedness. Janam’s solutions enable enterprises of all types and sizes to increase throughput, eliminate fraud, reduce costs and meaningfully improve the customer experience.

Jazz Networks is a renowned cybersecurity solutions firm with offices located in the United States, the United Kingdom and Norway. They provide data infrastructure and protection solutions, network security and cyber-threats and risk mitigation for enterprises globally.

Jet Edge is an integrated large-cabin management operator and maintenance provider and services aircraft owners. Backed by unparalleled award-winning safety programs and overseen by a leadership team with over 500 years of collective aviation experience, Jet Edge delivers excellence in aircraft management, charter management, on-demand charter, aircraft sales, and maintenance.

Jetson Systems is a software development company that specializes in the highest quality Crestron, AMX, Savant, Lutron, and Control4 programming, configuration and design services. Since 2001, they have distinguished themselves through their intense focus on business process and their commitment to making their clients’ lives simpler.

Jolsis is a Mexican company dedicated to systems integration and special equipment for control, automation, information technology, vehicle safety and protection for real estate.

Joyent, Inc. is a team that pioneered public cloud computing (and hybrid cloud), nurtured and grew Node.js into a de facto standard for web, mobile and IoT architectures, and was among the first to embrace and industrialise containers, compute-centric object storage, and what is now coming to be known as serverless computing.

K2 Cyber Security delivers signature-less runtime application protection to secure web applications and container workloads against sophisticated attacks in OWASP Top 10 and provides exploitable vulnerability detection during pre-production. K2’s Platform is deployed on production servers for runtime protection of applications and on pen-testing/pre-production/QA servers for interactive application security testing to identify the location.

Related White Papers

How To Overcome The Storage Challenges Of Adopting Surveillance AI

How To Get Buy-In From IT Departments On IP Video Installations

Wavestore And The Linux Advantage

Featured events