Technical References

Our goal is to use available security technologies from leading security companies and minimize custom development. The following is the list of major technologies used by this solution: