We offer a range of IT security services be it physical or infrastructure security you require.

Our Offerings

  1. Firewalls – monitor and control incoming and outgoing network traffic on your network.
  2. Antivirus – we implement the best and most affordable virus protection for your company on a month to month or yearly subscription.
  3. Vulnerability Assesments – we run th audit in order to determins security risks in you company.
  4. Biometrics – monitor and control incoming and outgoing staff and guests on your premises
  5. CCTV – we implement and support surveillance system comprising of cameras, recorders and displays for monitoring activities in a store or company.

We offer vulnerability assessment and penetration testing:

  • Web application pentest and OWASP assessment
  • External vulnerability assessment
  • Internal vulnerability assessment

The tests include:

  • Automated infrastructure vulnerability scanning (internal and external). 
  • Manual web application testing using web interception proxies.
  • Social Engineering exercise to test user awareness.
  • Open-source intelligence (OSINT) analysis for data breaches and possible end-user exposure.   
  • Summary (management) and detailed reporting, including remediation recommendations.

Access via your face

Facial recognition systems can be used to identify people in photos, videos, or in real-time. Facial recognition is a category of biometric security.

Access via your fingerprint

In general terms, biometrics involves the verification of a person’s identification by using an unique characteristic that is inherently attached to each individual. This can either be physiological, for example fingerprints or facial features, or behavioral, for example dynamic signatures or voice samples. In contrast to identification tokens for instance keys or smart cards, biometric characteristics cannot be lost or stolen and thus cannot be used by non-legitimate persons.

Biometrics entails an enrollment phase and a verification or identification phase. During the enrollment phase, reference data of a respective user is created, which serves as a basic description of the user specific biometric features. During subsequent usage of the biometric system, this initially acquired reference data (in our case, a description of the user’s fingerprint) will be used for comparison with the newly acquired featured set.

There is also another form of authentication called Identification, where the user need no assert an identity. The biometric device compares processed samples of the user against the specified population of templates and decides which template is matched most closely. Depending on match possibilities, the user’s identification could be concluded to be that corresponding to the template with the closest match.

We supply and install the following biometric readers.

  • 10,000 fingerprints (20,000 templates)
  • MINEX certified and compliant
  • Finger / PIN / Card
  • IP65, IP67 class
  • Deadbolt, EM lock, door strike, automatic door
  • LED Multiple colors
  • 1.77” color TFT LCD and multi-tone buzzer
  • Ethernet 10/100 Mbps, auto MDI/MDI-X
  • Operationg temp -20°C ~ 50°C
  • 500,000 fingerprints (1,000,000 templates)
  • MINEX certified and compliant
  • Finger / PIN
  • IP65 class
  • Deadbolt, EM lock, door strike, automatic door
  • LED Multiple colors
  • 2.8” color TFT LCD and multi-tone buzzer
  • Ethernet 10/100 Mbps, auto MDI/MDI-X
  • Operationg temp -20°C ~ 50°C

  • 30,000 Face (900,000 templates)
  • Live Face Detection supported
  • Deadbolt, EM lock, door strike, automatic door
  • LED 800 x 480 pixels
  • 4” color TFT LCD and multi-tone buzzer
  • Ethernet 10/100 Mbps, auto MDI/MDI-X
  • Operationg temp -20°C ~ 50°C

Get Trusted IT Solutions Now!


Please verify.
Validation complete :)
Validation failed :(
 
Thank you for making contact with IT Trust! We will be in contact as soon as possible!