Intrusion detection installers in San Jose (7 found)
Cepton Technologies, Inc. was founded in 2016 with the mission of developing industry-leading 3D sensing solutions for automotive, industrial and mapping applications. Cepton's patented Micro Motion Technology (MMT) delivers unrivaled performance and resolution at a low cost to enable advanced perception for smart machines.
Excelero enables customers to build distributed, high-performance server SAN with standard hardware for applications at any scale. The company has created a Software-Defined Block Storage solution that meets performance and scalability requirements of the largest web-scale and enterprise applications.
Netronix Integration is built on the premise of the customer comes first approach by leveraging over 25 years of experience by two industry veterans. They provide services on System Integration, Access Control, Video Surveillance, Intrusion Detection among others.
Panasas, the data engine for innovation, provides purpose-built data solutions for high-performance and AI applications in manufacturing, life sciences, energy, media, financial services and government. The company’s flagship PanFS® parallel file system and ActiveStor® solutions uniquely combine ease of management.
Securiti is the pioneer of the Data Command Centre, a centralised platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls, and orchestration across hybrid multi-cloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance.
Titan’s Patrol Services combines boots on the ground with a high-tech approach to security and reporting. With Patrol Services, well-trained, experienced security professionals will thoroughly inspect your property at various times, either on foot or in a patrol car, to monitor for suspicious activity.
Trellix is a global company redefining the future of cybersecurity. The company’s open and native extended detection and response (XDR) platform helps organisations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations.
Related white papers
Elevating security through multi-sensing solutions and large-scale AI
How to ramp up perimeter security with license plate reader technology
How plate reader technology increases your perimeter security
Upcoming security events in United States of America (USA)
CES 2026
- 6 - 9 Jan, 2026
- Las Vegas, United States of America (USA)
National Retail Federation (NRF) 2026
- 11 - 13 Jan, 2026
- New York City, United States of America (USA)
DISTRIBUTECH International 2026
- 2 - 5 Feb, 2026
- San Diego, United States of America (USA)
MD&M West 2026
- 3 - 5 Feb, 2026
- Anaheim, United States of America (USA)
NDSS Symposium 2026
- 23 - 27 Feb, 2026
- San Diego, United States of America (USA)
Après-Cyber Slopes Summit 2026
- 25 - 27 Feb, 2026
- Park City, United States of America (USA)
Disasters Expo USA 2026
- 4 - 5 Mar, 2026
- Miami, United States of America (USA)
16th Forum on Global Encryption, AI, Cloud & Cyber Export Controls
- 17 - 18 Mar, 2026
- San Francisco, United States of America (USA)
IDA Expo+ 2026
- 14 - 17 Apr, 2026
- Las Vegas, United States of America (USA)
Innovate Cybersecurity Summit 2026
- 19 - 21 Apr, 2026
- Marco Island, United States of America (USA)
12th National Conference On CFIUS
- 22 - 23 Apr, 2026
- Washington, United States of America (USA)
20th Annual Flagship Conference on Economic Sanctions Enforcement and Compliance
- 29 - 30 Apr, 2026
- Washington, United States of America (USA)
Industrial Control Systems (ICS) Cybersecurity Conference 2026
- 16 - 18 Jun, 2026
- Chicago, United States of America (USA)
Global Security Exchange (GSX) 2026
- 14 - 16 Sep, 2026
- Atlanta, United States of America (USA)
PACK EXPO Chicago 2026
- 18 - 21 Oct, 2026
- ILLINOIS, United States of America (USA)
One system, one card
DownloadEnhancing physical access control using a self-service model
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadHow to implement a physical security strategy with privacy in mind
Download
