Preventative measures used to protect information from phishing and being compromised or attacked. It requires an understanding of potential information threats, such as viruses and other malicious code. Cybersecurity strategies include identity, risk, and incident management.

Front/Back Office Software

  • Customer Relationship Management (CRM)
  • Sales force automation
  • Customer support
  • Advanced Micro Devices (AMD) field service
  • Enterprise Resource Planning (ERP)
  • Inventory control
  • Manufacturing and all of the supply chain activities associated with procuring goods, services and raw materials.


Technologies that measure and analyze human body characteristics through:

  • Fingerprints
  • Eye retinas and irises
  • Voice patterns
  • Facial patterns
  • Hand measurements

License Plate Readers

Technology that uses optical character recognition on images to read vehicle registration plates. Automatic number plate recognition can be used to store the images captured by cameras as well as license plate text and photographs of drivers.

Facial Recognition

Computer application for automatically identifying or verifying a person from a digital image or a video frame. Unlike fingerprinting and voice recognition, facial recognition software yields nearly instant results. Facial recognition software is primarily used as a protective security measure and verifies personnel activities such as attendance, computer access or traffic in secure work environments.