Average Ratings 0 Ratings
Average Ratings 1 Rating
Description
Maintaining an accurate record of weapons is essential for ensuring the safety of personnel. RFID weapon tracking systems significantly aid in documenting who handles the weapons and when this occurs. The RFID Armory Management System incorporates state-of-the-art database technology alongside RFID solutions to bolster the security, accountability, and operational efficiency of armories. This system effectively monitors and inventories weapons, ammunition, and related equipment throughout their lifecycle, including issuance, return, and storage phases. It preserves a detailed chain of custody for every asset in the database, covering everything from initial acquisition to eventual disposition, while also regulating personnel access to these assets. Discreet RFID chips embedded in each item work in tandem with antennas positioned at armory exchange points to automatically log transactions as items are issued or returned. Each exchange window is equipped with a touchscreen monitor to facilitate seamless tracking and secure transactions, ensuring that the process is both accurate and efficient. The integration of these technologies not only enhances security but also streamlines armory operations significantly.
Description
A two-factor authentication system transforms any USB drive into a security token for your computer, enabling secure access to Windows. It also supports RFID, OTP, and U2F tokens by substituting the traditional Windows login password. This innovation eliminates the vulnerabilities associated with weak password-based logins by utilizing a hardware security key, which can be a USB flash drive, Google Authenticator OTP, FIDO U2F, or industrial RFID access cards. Although the computer remains password-protected, users no longer need to manually input their passwords upon logging in, unlocking, or authorizing changes. Rohos adheres to NIST-approved data security protocols and employs encryption, ensuring that the password is not stored on the authentication device in a readable format. Additionally, the USB key comes with copy protection to prevent unauthorized duplication, and all information on the key is safeguarded with AES-256 bit encryption. This robust approach not only enhances security but also streamlines user experience, making it easier to manage access without compromising safety.
API Access
Has API
API Access
Has API
Integrations
No details available.
Integrations
No details available.
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$32 one-time payment
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Southwest Solutions
Founded
1969
Country
United States
Website
www.southwestsolutions.com/divisions/military/rfid-armory-management-system-weapons-ammunition-equipment/
Vendor Details
Company Name
Tesline-Service
Website
www.rohos.com
Product Features
Product Features
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection