Protective barriers installers in Pennsylvania (6 found)
Edgeworth Security is a full-service security consulting firm, specialising in security system integration and Remote Guarding. Edgeworth designs and installs bespoke comprehensive state-of-the-art security systems, tailored to each client’s exact needs. It tackles modern security problems with cutting-edge technology, so clients can have the peace of mind of knowing that their property, business, and people are protected.
From cabling and networks to security and access control, to voice, data, and A/V systems that accommodate today’s mobile and collaborative workforce, Empire’s core competency is being able to understand the technical demands of business and specify the right products to simplify the world.
From cabling and networks to security and access control, to voice, data, and A/V systems that accommodate today’s mobile and collaborative workforce, Empire’s core competency is being able to understand the technical demands of business and specify the right products to simplify the world.
M3T provides physical and logical security, IP-based video surveillance, remote monitoring, access control, automatic gates, intrusion detection, badge systems, intercom systems, key storage, locksmith services, electric locking hardware, power doors, video management and networking solutions for government and commercial organisations in Pennsylvania, Maryland, Delaware, the DC Metro Area, and Northern Virginia.
SecureCore’s emergency preparedness app-based software helps businesses plan ahead and initiate disaster response with onsite management and accessible online disaster plans.
Vizinex RFID is the pioneer in developing and manufacturing high-performance RFID tags that are tailored to the exact requirements of customers. Their experience, design expertise, and flexible manufacturing process, enable Vizinex to solve difficult and differentiated RFID problems. Vizinex investigates and understands clients’ needs to optimise solutions and deliver cost-effective custom and off-the-shelf products.
Browse security companies
- City
- Pittsburgh
Related white papers
Elevating security through multi-sensing solutions and large-scale AI
How to ramp up perimeter security with license plate reader technology
How plate reader technology increases your perimeter security
Upcoming security events in United States of America (USA)
CES 2026
- 6 - 9 Jan, 2026
- Las Vegas, United States of America (USA)
National Retail Federation (NRF) 2026
- 11 - 13 Jan, 2026
- New York City, United States of America (USA)
DISTRIBUTECH International 2026
- 2 - 5 Feb, 2026
- San Diego, United States of America (USA)
MD&M West 2026
- 3 - 5 Feb, 2026
- Anaheim, United States of America (USA)
NDSS Symposium 2026
- 23 - 27 Feb, 2026
- San Diego, United States of America (USA)
Après-Cyber Slopes Summit 2026
- 25 - 27 Feb, 2026
- Park City, United States of America (USA)
Disasters Expo USA 2026
- 4 - 5 Mar, 2026
- Miami, United States of America (USA)
16th Forum on Global Encryption, AI, Cloud & Cyber Export Controls
- 17 - 18 Mar, 2026
- San Francisco, United States of America (USA)
IDA Expo+ 2026
- 14 - 17 Apr, 2026
- Las Vegas, United States of America (USA)
Innovate Cybersecurity Summit 2026
- 19 - 21 Apr, 2026
- Marco Island, United States of America (USA)
12th National Conference On CFIUS
- 22 - 23 Apr, 2026
- Washington, United States of America (USA)
20th Annual Flagship Conference on Economic Sanctions Enforcement and Compliance
- 29 - 30 Apr, 2026
- Washington, United States of America (USA)
Industrial Control Systems (ICS) Cybersecurity Conference 2026
- 16 - 18 Jun, 2026
- Chicago, United States of America (USA)
Global Security Exchange (GSX) 2026
- 14 - 16 Sep, 2026
- Atlanta, United States of America (USA)
PACK EXPO Chicago 2026
- 18 - 21 Oct, 2026
- ILLINOIS, United States of America (USA)
One system, one card
DownloadEnhancing physical access control using a self-service model
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadHow to implement a physical security strategy with privacy in mind
Download
