3D Crime Scene Reconstruction
We can get any Law Enforcement Agency exact indoor and outdoor measurements in three dimensions: Simply using our Laser Scanners. S3F-S350 is our latest ultra- laser scanner enable to capture fast, straightforward and accurate measurements of complex objects and buildings at any crime scene. A 8 mega-pixel, HDR-camera captures detailed imagery easily while providing a natural color overlay to the scan data in extreme lighting conditions. Our short-range Laser Scanner SS3-3D X 30 is specially designed to fit the need of interior scanning applications and captures data up to 30 meter.
All scanner types we use offer the possibility to perform scanning even in bright sunlight. Remote scanning as well as almost limitless scan data sharing solution making it truly mobile. Some of our Scanner model are designed specially for outdoor applications due to its small size, light weight, extra long range, extended scanning possibilities even in direct sunlight and easy positioning with an integrated GPS receiver. HDR imaging and HD photo resolution ensure true-to-detail scan results with high data quality.
Camera Placement Survey & Analysis
Camera Placement is an art and a science. Security cameras are used for three basic purposes: Surveillance, Deterrence and Investigation. The images that you collect with your security cameras will most often be used to review a crime or accident so that you can understand what really happened. But the cameras themselves also have a deterrent value since people who know they are being watched are usually on their best behavior. In order to realize maximum investigative and deterrent value from your cameras, you need to carefully choose not just the type of camera but also where you place them. The objective is to capture as clear and as wide, clear and focused image as possible. Some cameras may be to identify a face and others may be to review or respond to a crime. These are also areas where security cameras may be mounted relatively high so that they can see down into broad areas – such as the hawk-eye camera.
Camera Selection and surveys are undertaken by our experienced technical staff to ensure that there is accurate identification of what camera and sensors will be installed on a site and for what the purpose of each of the sensors is being used.
Network & Information Security Management
In the field of computer security, security information and event management (SIEM) software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by network hardware and applications. The underlying principle of a SIEM system is that relevant data about an enterprise’s security is produced in multiple locations and being able to look at all the data from a single point of view makes it easier to spot trends and see patterns that are out of the ordinary. SIEM combines SIM (security information management) and SEM (security event management) functions into one security management system.
A SIEM system collects logs and other security-related documentation for analysis. Most SIEM systems work by deploying multiple collection agents in a hierarchical manner to gather security-related events from end-user devices, servers, network equipment -- and even specialized security equipment like firewalls, antivirus or intrusion prevention systems. The collectors forward events to a centralized management console, which performs inspections and flags anomalies. To allow the system to identify anomalous events, it’s important that the SIEM administrator first creates a profile of the system under normal event conditions.