Products and Solutions

Hackers use Google AI to take over smartphones

ESET discovers first Android malware to use generative AI Cybercriminals have crossed a technological threshold: for the first time, Android malware is using generative AI on the fly to embed itself in infected devices and take control of them. Researchers at European...

eProtocole: Digital safety protocols for logistics and transport

The right document – in the right place, at the right time Safety protocols are a key element of occupational safety in logistics and industrial environments. Clear rules must apply, especially during transport operations – from factory premises and loading and...

Compact first aid station for businesses

Cederroth brings the ‘world's smallest emergency centre’ to the workplace Rapid assistance in an emergency is a key component of occupational safety concepts. Whether in production facilities, workshops, warehouses or office buildings – every minute counts when...

IZYPEO® QHSE: Digital control for quality, safety and the environment

The demands placed on companies in the areas of quality, hygiene, safety and the environment (QHSE) are constantly growing. Regulatory requirements, international standards, increasing liability risks and growing transparency requirements call for structured processes...

DATI from Sysnav: Precise protection for lone workers

Reliable localisation – even in complex environments and dead zones Lone workers in industry, logistics, energy supply or infrastructure are exposed to particular risks. Whether working at height, in enclosed areas or in potentially dangerous zones – in an emergency,...

Precise RFID identification for transport and logistics

New antennas, validated performance and expanded integration options for demanding ITS and intralogistics applications The demands placed on modern transport and logistics infrastructures are constantly increasing. Operators must cope with growing traffic flows,...

Wi-Fi 6E as the basis for networked retail

In modern retail, the number of networked devices is constantly increasing. Mobile data collection devices, sensors, self-service solutions and customer end devices all access wireless networks simultaneously. According to COSYS Ident GmbH, traditional Wi-Fi...

Security Essen 2022