KeyOptions News & Blog

KeyOptions announces Pete Smith is joining the International Virolens Consortium to support the adva...

07/09/2021
Read more

Are tourist testing requirements for COVID-19 driven by need or by current testing capabilities? ...

06/09/2021
Read more

KeyOptions announces the appointment of Dr. Kerry Mills as Chair of the ‘International Virolens Rese...

02/09/2021
Read more

GAVIN MILTON-WHITE ATTENDS VIRTUAL SIGNING CEREMONY OF THE PARTNERSHIP AGREEMENT BETWEEN IBM AND KEY...

02/09/2021
Read more
IVRC PNG Logo Colour (1).png

INTERNATIONAL VIROLENS RESEARCH CONSORTIUM - IVRC Background When a communicable disease ou...

31/08/2021
Read more

BUSINESS INTELLIGENCE TO MAXIMIZE RETURN ON CAPITAL - At the heart of our 'In-Motion' serie...

31/08/2021
Read more

KeyOptions achieves Silver Partner Status with IBM! We are extremely proud to announce that KeyOpt...

31/08/2021
Read more

Real-Time Asset and People Analytics from KeyOptions - ''the future is not in the mass of ...

31/08/2021
Read more

Security for a changing cyber world

Security

Blacklight TsCM & Tactical systems

Government

Mobile devices aren’t like the other systems on your network, so shouldn’t be treated like they are. Smartphones, tablets, wearable computers, laptops and other mobile devices are great tools, but they’re not the same as desktops and servers. They connect to networks beyond your perimeter security. They run unknown applications, they move through your facilities with ease. Frequently you have no idea who is using them or for what purpose. That’s why KeyOptions’ Mobile Device Security Platforms provides full-scope detection, locationing and monitoring of mobile devices so you can confidently manage and mitigate the risks presented by rogue applications and careless or potentially malicious users. In selected environments with specialised equipment we can “capture” a device and monitor and control its activity.

Security

Enter a new generation of mobile security tools, the KeyOptions provides a location-based mobile security platform. Rather than replacing existing systems, these platforms fill in the gaps by adding a mobile detection and precision locationing layer to mobile management, policy enforcement and network security. Mobile locationing security platforms have two components: hardware, in the form of a sensor network, and software that does the heavy lifting of identifying devices, mapping their location, and communicating with other security systems based on where and who those devices are assigned.

Police & Criminal Justice

Working with Law Enforcement agencies and government police forces, we provide technology to assist with a whole host of policing scenarios from the detection of missing persons through to the monitoring of a dwelling or property where the activities of those occupants require discrete and passive monitoring. With the ability to ‘rewind’ to any time within the deployed area, investigators are able to forensically examine an extensive audit trail of data. We also provide the technology for new generation TSCM (Technical Surveillance Counter Measures) for phone identification and interception, taking Law Enforcement capabilities to a new level. Please contact us for a confidential discussion.

Military

KeyOptions works with a number of military agencies worldwide, solving challenging and unique challenges in high risk, high threat areas. Please contact us for a confidential discussion.

We use cookies
Cookie preferences
Below you may find information about the purposes for which we and our partners use cookies and process data. You can exercise your preferences for processing, and/or see details on our partners' websites.
Analytical cookies Disable all
Functional cookies
Other cookies
We use cookies to personalize content , to provide social media features and to analyze our traffic. Learn more about our cookie policy.
Change preferences Accept all
Cookies