Leaders in standoff threat detection equipment is to discuss benefits of their equipment at EASC09
 Portendo spoke at the EASC 2009 about the benefits and advantages of threat detection equipment

Portendo, leaders in standoff threat detection equipment, discussed the benefits and advantages of their range of threat detection equipment for the homeland security, military and commercial security industries, at EASC09 - The European Atlantic Stakeholder Conference, in Stockholm, Sweden.

Portendos' technology based on "Raman Spectroscopy", fingerprints a wide range of compounds through their specific chemical signatures, and provides trace detection and distinction of most explosive compounds wherever they may be hidden, be that in vehicles, containers or baggage.

The Portendo P.Eye-S is based on technology originating from the Swedish FOI (Swedish Defence Research Agency). By targeting the surface of a suspicious object the P.Eye-S can detect traces of explosives of less than 100 micrograms. The resulting information is simple to read and enables the security professional to interpret the information quickly, efficiently and safely, negating the need for costly training of staff, down time of the venue, or threat to personnel.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...