Safes, Seals and Security Containers

The SecurityInfoWatch.com Safes, Seals and Security Containers product category is a collection of news, product listings and other resources for security professionals researching Safes, Seals and Security Containers used for securing cash and other valuables. It covers cash boxes, secure equipment lockers and various other forms of secure storage.
(Image courtesy GE Lighting)
Cync Smart Thermostat
Cync Smart Thermostat
Cync Smart Thermostat
Cync Smart Thermostat
Cync Smart Thermostat
Residential Technologies

New and noteworthy smart home products from CES 2022

Jan. 7, 2022
Industry stalwarts and newcomers continue to push the boundaries of innovation in today’s connected homes
Branchserv Header 1
Branchserv Header 1
Branchserv Header 1
Branchserv Header 1
Branchserv Header 1
Integrators

Convergint to acquire BranchServ and CustomVault

CustomVault designs and installs complex, high-security modular vault solutions
Sargent Greenleaf Iseries Keypad
Sargent Greenleaf Iseries Keypad
Sargent Greenleaf Iseries Keypad
Sargent Greenleaf Iseries Keypad
Sargent Greenleaf Iseries Keypad
Safes

Sargent & Greenleaf’s I-Series Keypad for Safe Security

Replaces standard safe lock keypads with ease of installation and enhanced features for total control and flexibility
HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays. Collectors just tap their phone to a holder to authenticate their collectible through the HID Cloud Authentication service.
HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays. Collectors just tap their phone to a holder to authenticate their collectible through the HID Cloud Authentication service.
HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays. Collectors just tap their phone to a holder to authenticate their collectible through the HID Cloud Authentication service.
HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays. Collectors just tap their phone to a holder to authenticate their collectible through the HID Cloud Authentication service.
HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays. Collectors just tap their phone to a holder to authenticate their collectible through the HID Cloud Authentication service.
Access & Identity

HID Global helps fight against counterfeiters of rare coins and banknotes

Dec. 15, 2020
Collectors Universe Uses HID Trusted Tag Services to validate the authenticity, grade and condition for millions of collectibles around the world
The Identity-ATM uses IB’s Kojak to collect the fingerprint biometric. The system then creates a digital identity using blockchain, linking that single real-world human being to their “Single Digital Twin” with multiple biometric records and forensic protocols as proof. This new approach to identity management makes it impossible for synthetic identities and duplicates to exist.
The Identity-ATM uses IB’s Kojak to collect the fingerprint biometric. The system then creates a digital identity using blockchain, linking that single real-world human being to their “Single Digital Twin” with multiple biometric records and forensic protocols as proof. This new approach to identity management makes it impossible for synthetic identities and duplicates to exist.
The Identity-ATM uses IB’s Kojak to collect the fingerprint biometric. The system then creates a digital identity using blockchain, linking that single real-world human being to their “Single Digital Twin” with multiple biometric records and forensic protocols as proof. This new approach to identity management makes it impossible for synthetic identities and duplicates to exist.
The Identity-ATM uses IB’s Kojak to collect the fingerprint biometric. The system then creates a digital identity using blockchain, linking that single real-world human being to their “Single Digital Twin” with multiple biometric records and forensic protocols as proof. This new approach to identity management makes it impossible for synthetic identities and duplicates to exist.
The Identity-ATM uses IB’s Kojak to collect the fingerprint biometric. The system then creates a digital identity using blockchain, linking that single real-world human being to their “Single Digital Twin” with multiple biometric records and forensic protocols as proof. This new approach to identity management makes it impossible for synthetic identities and duplicates to exist.
Fingerprint Recognition Solutions

IB’s “Kojak” provides the biometric fingerprint capability for DAL-Global and Aertight Systems’ new Identity-ATM kiosk

March 9, 2020
Integrated Biometrics first consumer-facing kiosk to combine enterprise-grade biometric scanning with blockchain technology
Codelocks Kl1100 Image
Codelocks Kl1100 Image
Codelocks Kl1100 Image
Codelocks Kl1100 Image
Codelocks Kl1100 Image
Locks

Codelocks KL1100 locker lock

Aug. 15, 2019
ISC West 2020 Booth #33107
Access Control Mobile Sdk
Access Control Mobile Sdk
Access Control Mobile Sdk
Access Control Mobile Sdk
Access Control Mobile Sdk
Reader Units

Parabit’s Multi Media Reader with BLE Beacon Technology (MMR-BT)

Aug. 15, 2019
Provide contactless access to ATM lobbies and tellerless bank branches