These devices are installed in front of the outer gates and be can hidden underground depending on the device. When a suspicion of a gate storm, the
• Routers, Switches, repeaters and wireless IP devices • Personal Computer • Server • Maintenance, operation and networking • Address
The devices include destruction of papers and documents and CD-ROMs to the degree of damage that can’t be assembled again which has several types,
• Fiber Optics cable (multi-mode or single mode) • Network cable CAT5, CAT5e and CAT6 • Coaxial cable RG59, RG6U and RG11 • Different kind
• Metal detectors. • Inspection equipment for manual metal detectors and weapons. • Devices for inspection of containers and bags. •
Telephony and call recording systems, wired and wireless: -- Which include: -- • Private Automatic Branch Exchange (PABX) with capacities and
These are systems used in sensitive areas that contain bonds, property or premises vulnerable to theft and intrusion. It is intended to alert the
Systems through which the registration of all entry and exit of all staff, personnel and vehicles give them different powers to enter certain places
• Fire alarms with different specifications • Speakers of indoor and outdoor capacities and sizes • Microphones for hand, office and
Cameras housed in several forms of outdoor protection containing cooling fans and/or heater that is resistant to sabotage, explosion and other
Technology Cities Establishment since its beginning has provided service for many customers such are
To provide advanced technical services to our customers in the area of security surveillance systems and communication through providing of an efficient and effective systems.
Building strong and long-term relationships, both with our customers and our partners by developing strategic
action plans for the joint benefit of all parties.