Encom Blog

  • HP-Laser Jet Printers

    hp_computers

    hp-mono-printer-300

    HP LaserJet Pro M130nw
    Black & White Wireless Multifunction Printer

    Keep things simple with HP’s smallest LaserJet MFP – powered by JetIntelligence Toner cartridges. Print professional documents from a range of mobile devices, plus scan, copy, and help save energy with a wireless MFP designed for efficiency.

    • Mono Printer - Perfect for 1 to 5 users
    • Print, copy, scan
    • A4; A5; A6; B5 (JIS)
    • Hi-Speed USB 2.0 port (device); Built-in Fast Ethernet 10/100Base-TX network port; Wireless
    • Up to 10,000 pages

    hp-colour-printer-300

    HP LaserJet Pro MFP M181fw
    Color, Wireless Multifunction printer with Fax

    Get vibrant colour, wireless versatility, easy mobile printing, and fast print speeds to drive efficiency – for a great value.

    • Colour Printer - Perfect for 1 to 5 users
    • Print, Copy, Scan, Fax
    • Paper Size - A4
    • Connectivity - dual band Wi-Fi®, AirPrint, Network, USB
    • 35-sheet Automatic Document Feeder
    • Easy to use control panel

  • Toshiba Laptops

    toshiba-750

    SATELLITE PRO A50-D-12X

    Satellite_Pro_A50-C-300

    • Windows 10 Pro 64-bit
    • 7th generation Intel® Core™ i5-7200U processor
    • 39.6cm (15.6”) , Toshiba HD non-reflective High Brightness display with LED backlighting and 16 : 9 aspect ratio
    • Solid State Drive 128 GB
    • Graphite Black
    • 4,096 MB, DDR4 RAM (2133MHz)
    • Intel® HD Graphics 620
    • maximum life : up to 9h15min (MobileMark™ 2014 running Windows 10) MobileMark is a trademark of Business Applications Performance Corporation.
    • weight : starting at 2 kg
    • W x L x H : 379 x 258 x 23.95 mm

    SATELLITE PRO R50-C-15W

    satelite-A40

    • Windows 10 Pro 64-bit
    • 6th Generation Intel® Core™ i3-6006U Processor
    • 39.6cm (15.6”) , Toshiba HD non-reflective High Brightness display with LED backlighting and 16 : 9 aspect ratio
    • Hard disk 500 GB
    • Graphite Black
    • 4,096 (1x) MB, DDR3L RAM (1,600 MHz)
    • Intel® HD Graphics 520
    • maximum life : up to 8h00min (Mobile Mark™ 2014)
    • weight : starting at 2.1 kg
    • W x D x H : 379 x 258 x 23.95 mm

    Call Us: 01 4545 465

  • Jabra Headset - Evolve 80

    Professional headset with active noise cancelation. Stay focused even in very noisy environments. Control your calls through a dedicated control unit. Professional headset with active noise cancelation. Stay focused even in very noisy environments. Control your calls through a dedicated control unit.

    The best headset for concentration in the open office

    • More concentration, greater productivity
    • Stay in the zone and avoid interruptions
    • Find inspiration in sound
    • Made for Voice and Music
      • World-class speakers are built for both voice and music. Switch easily between conversations and listening to your favorite tracks.
    • Active noise cancellation
      • Eliminate unwanted low-frequency background noise at the touch of a button. This lets you stay focused even in noisy office environments.
    • Passive Noise Cancellation
      • Simply wear the headset to eliminate high-frequency noise, such as human voices - all thanks to the specially designed ear cushions. We call this “passive noise cancellation.”
    • Easy call management
      • In-line call controller gives you easy access with large buttons and LED indicators. Pick up or end calls, control volume, or simply mute the line.
    • Busy light
      • The special “busy light” turns red to let people know when you’re on the phone. You can also turn it on manually when you don’t want to be disturbed.
    • Discreet Boom Arm
      • When you’re not on a call, you can tuck the boom arm away into the headband to keep it out of the way.
    • Works with All Mobile Devices
      • The 3.5mm jack lets you connect to a PC, smartphone, tablet, or any other personal device.
    • Listen-in
      • Listen-in function lets you hear your surroundings without taking your headset off. Simply press a button when you need to “listen in.”

    Call Us:01 4545 465

  • Lenovo ThinkPad T470s

    lenovo-750

    Business-Ready. And Then Some.

    Light and thin, the ThinkPad T470s is designed to boost productivity, wherever your business takes you. Powered by a high-performance processor and operating system, this rugged laptop boasts an

    • All-day battery life.
    • Plenty of storage.
    • Oodles of RAM.
    • 14" FHD display.
    • Stereo speakers.
    • Hi-res webcam.

    All of this, plus the legendary ThinkPad reliability and support.

    Performance You Can Count On

    With the responsiveness and efficiency of 7th generation Intel® Core™ processors, the Lenovo ThinkPad T470s lets you switch effortlessly between your favorite apps—increasing your productivity, creativity, or entertainment levels along the way.

    Super Fast SSD Storage

    Unlike a regular mechanical hard drive, a Solid-State Drive (SSD) has no moving parts and performs faster—including booting up (nearly 3X quicker), opening files (as much as 30% faster), and transferring files (around 200 MB/s, compared to 50-120 MB/s). As well as being quieter, it’s also more reliable, more rugged, and more secure.

    Tested for Battle, Built for Success

    Every ThinkPad laptop undergoes 12 stringent military tests and over 200 quality checks. So, you can rest easy knowing that your T470s is more than capable of surviving the bumps and bruises of everyday life.

    User-Friendly, Business-Friendly

    Easy to set up and roll out, the T470s is also quick to service, upgrade, and secure. From an everyday user to an IT technician, this business laptop is designed to make life (and work) easier for everyone.

    Less is the New More

    The T470s is available with Microsoft Windows 10 Pro Signature Edition. Now, you can say goodbye to unwanted trial ware, apps, or distractions. And hello to a faster laptop, from startup to shut down and everything in-between.

    Forgot Your Password? Just Smile

    With Windows Hello’s advanced facial recognition and fingerprint technology, there’s no need to worry about remembering your password. Simply smile at the infrared camera or touch the fingerprint reader to log in, quickly and securely.

    Get Closer to the Action

    By configuring your T470s with an optional touchscreen, you can interact more with your work—and have more fun during your downtime.

    Make Light Work of Long Days

    With its two batteries and Power Bridge technology, the T470s gives you greater flexibility and up to 10.5 hours of power on a single charge. That's more than enough juice to help you burn the midnight oil or binge watch your favorite shows.

    For On-the-Go Productivity and Entertainment

    Weighing around 1.3 kg and under 19 mm thin, the T470s gives you portability, without sacrificing performance. Its 14" FHD display delivers sharp, vibrant visualsperfect for working on the go or kicking back to enjoy a movie.

    Stay Connected, Even When You’re Not

    With super-fast LTE-A (4G) connectivity, the T470s gives you prompt access to all your cloud data and apps—even if you are out of WiFi range.

    Look Sharp, Sound Sharper

    The T470s has an HD web camera and dual array microphones (with background noise reduction) as standard—ideal for whether you're on a call in a busy open plan office or a bustling coffee shop.

    Clearer Desk, Clearer Thinking

    Ultra-fast and very secure, the ThinkPad WiGig Dock (optional) can connect effortlessly, wirelessly, and instantly to your T470s and all its peripherals, such as a monitor or backup storage device. Simply place your laptop within six feet of the dock and it will do the rest. As well as reducing desktop clutter, this easy-to-use dock can even power all your other devices.

    Rest Easy Wherever Life Takes You

    The T470s comes with a worldwide warranty as standard, enabling you to seek expert assistance and help in 160 countries across the globe.

    Enhanced, Smoother Interaction

    By constantly listening to our customers, we have been able to refine the T470’s TrackPad and TrackPoint. With an improved design that lessens jumps or gaps when scrolling, these pointing devices offer a smoother, cleaner, and more accurate experience. Together with the award-winning ergonomic ThinkPad keyboard, the T470s will soon help you make light work of hard work.

    Prepare to Be Thunderstruck

    The T470s includes Intel® Thunderbolt™ 3—the technology that brings lightning-fast Thunderbolt to USB-C at speeds up to 40 Gbps. Connect a cable from your USB-C port to a Thunderbolt 3-enabled device, and get four times the data and twice the video bandwidth of any other port type, while also supplying power. So you get Thunderbolt, USB-C, and DisplayPort. Plus, you can even output to two 4K displays with the Thunderbolt Dock.

  • Iiyama Display Monitors

    iiyama-Display-40-350

    Iiyama ProLite
    X4071UHSU-B1

    Stylish 40” screen with 4K resolution and USB hub

    • The ProLite X4071UHSU-B1 is an impressive 4K (3840 x 2160) monitor, offering a gigantic viewable area with 4 times more information and work space than a Full HD screen.
    • Due to the high DPI (dots per inch) the monitor displays an incredibly sharp and crisp image.
    • The VA panel technology offers exceptional colour performance, high contrast (5000:1) and wide viewing angles.
    • PIP and PBP features allow users to easily create their own work space by displaying and manipulating multiple applications.
    • USB 3.0 HUB, integrated speakers, headphone socket and hook, ensure compatibility across various devices and media platforms for a real multimedia experience.
    • The ProLite X4071UHSU-B1 suits a massive range of applications including desktop publishing, CAD/CAM drawing, gaming, photographic and web design.

    GOLD-PHOENIX

    Iiyama G-MASTER
    GB2888UHSU-B1 Gold Phoenix

    28” G-MASTER 4K monitor supporting FreeSync™ technology

    • The 28" G-MASTER GB2888UHSU known as Gold Phoenix, features 4K (3840 x 2160) resolution, offering a gigantic viewable area with 4 times more information and workspace than a Full HD screen.
    • Due to the high DPI (dots per inch) the monitor displays an incredibly sharp and crisp image.
    • Featuring 1ms response time and FreeSync™ technology, it ends choppy gameplay ensuring fluid and accurate transition between images.
    • With the Black Tuner functionality the brightness and the dark shades can be adjusted, giving greater viewing performance in shadowed areas.
    • USB 3.0 HUB, integrated speakers and a headphone socket ensure compatibility with any Desktop PC or Notebook.
    • The GB2888UHSU is perfect for gamers and demanding users who settle only for the best specifications.

    Call Us: 01 4545 465

  • Intel Core X Series CPU

    intel-i9-750

    The Intel® Core™ i9 Extreme Edition Processor

    The dawn of a new breed of extreme desktop processors is here, elevating everything you do to new heights. Powered by a massive 18 cores and 36 threads, this processor enables extreme single-threaded performance with the updated Intel® Turbo Boost Max Technology 3.0. This technology now identifies the two best performing cores to provide increased single and dual-core performance. The new Extreme Edition boasts 44 PCIe lanes and support for multiple discrete graphics cards, Thunderbolt™ technology, and high-speed storage like Intel® Optane™ technology. And of course, it is fully unlocked for extreme performance.

    The ultimate platform with unprecedented scalability. The ultimate platform with unprecedented scalability.

    Intel® Core™ X-Series Processor Family

    Something for every enthusiast! The new Intel® Core™ X-series processor family is designed to scale to your performance needs by delivering options between 4 to 18 cores for extreme performance, the latest technological advancements, and headroom for the future. This platform comes ready to install Intel® Optane™ memory and Intel® Optane™ SSDs for amazing system responsiveness. Support for immersive 4K visuals, four channel DDR4 2666 memory, Thunderbolt™ 3 delivering a 40Gb/s bi-directional port for almost any peripheral you want to connect and up to 8 SATA ports for a RAID storage array makes this the ultimate desktop platform.

    Game, Stream, Record

    Enter the realm of extreme performance where game play is so life-like it is difficult to tell where reality ends and the game begins. Surrounded by multiple high-res displays and premium audio sound, you are totally immersed in the action of your AAA game title or the latest virtual reality thriller. Play extreme, live extreme, game extreme on a computer with an unlocked Intel® Core™ X-series processor. And because modern gaming extends beyond just gameplay, you want to simultaneously share your gameplay with the community and the world. Record all the action capturing that once in a life-time maneuver that brought you to victory, and convert your game play into a sharable format to immediately post on your social media page. That is extreme mega tasking and the power of the Intel® Core™ X-series processor.

    intel-core-x-300

    Unleash Your Ultimate Creative Genius Now with an Intel® Core™ X-Series Processor

    Your creativity is limitless, and once you are in the flow of ideas, you need a system that will keep up. You need the uncompromising performance in a PC powered by the Intel® Core™ X-series processor. The Intel® Core™ X-series processor family with 8, 12 or even 18 cores delivers amazing performance when multiple real-time workloads are stacked. Spend more time creating while your Intel® Core™ X-series processor powered system simultaneously handles uploading massive 4K files, rendering effects and other compute intensive workloads in the background. And with the updated Intel® Turbo Boost Max Technology 3.0, you have the control to give priority to the apps that need the power of the two best performing cores. Quad channel memory also delivers improved responsiveness and decreases start up time when you are working with large files and content creation applications. With an Intel® Core™ X-series processor you can focus on creating with the confidence that your results will be as remarkable as you imagined.

    Quad-Core Newcomers to the Family

    The new family of Intel® Core™ X-series processors introduces two quad core processors for broader expandability of the platform. The Intel® Core™ i5-7640X and Intel® Core™ i7-7740X enable customers to invest in a more powerful enthusiast platform that provides more headroom and scalability up the X-series stack when they are ready. These two processors will start with a slightly higher base frequency and provide all of the ingredients, like higher memory speed and larger socket, for better overclocking performance compared to their mainstream counterparts.

    Intel® X299 Chipset and Intel® Core™ X-Series Processors for the Ultimate Platform

    The Intel® X299 chipset paired with the Intel® Core™ X-series processors provide a world class platform for gaming, content creation, and over-clocking. Whether it is responsiveness, expandability or performance you crave, this platform has you covered. Integrated USB 3.0 makes moving files to your tablet and smartphone blazing fast. The platform also provides RAID support on PCI Express and Serial ATA storage devices, fast data transfers with support for PCIe 3.0 storage devices and finally, Intel® Optane™ memory support. Want to push the envelope with overclocking? The Intel® X299 chipset and Intel® Core™ X-series processor family bring new unlocked base clock capabilities. Unlock your individual cores and memory frequencies to amazing levels while having the flexibility to keep other areas within specification. With support for Intel® Extreme Memory Profile (Intel® XMP), Intel® Extreme Tuning Utility (Intel® XTU), and the Intel® Performance Tuning Protection Package Plan the capabilities of the Intel® X299 chipset and new Intel® Core™ X-series processors are a threat to every overclocking world record.

    Intel-corex-750

    Call Us:01 4545 465

  • Fujitsu LIFEBOOK U937

    Fujitsu Notebook LIFEBOOK U937 is the lightest laptop on the market. This full featured notebook is setting new standards, weighing less that 1Kg and with a casing made from magnesium, ensuring a strong, professional and unimaginably lightweight portable PC. Fujitsu Notebook LIFEBOOK U937 is the lightest laptop on the market. This full featured notebook is setting new standards, weighing less that 1Kg and with a casing made from magnesium, ensuring a strong, professional and unimaginably lightweight portable PC.

    A Lightweight powerful business companion with Intel’s 7th generation Core processors and options of up to 20GB of memory, 512GB of SSD and an ‘all-day’ battery life of up to 11 hours!

    • Be ultra-mobile: The LIFEBOOK U937 is light enough to carry anywhere and keeps working as long as you do
      • Lightest notebook in FUJITSU range: 15.5mm starting at 920g.
      • Fantastic viewing: Anti-glare FHD 13.3 inch display with optional glare touch.
      • Tough as nails: robust magnesium housing.
      • Work ALL DAY without power socket full-day battery run-time.
    • Perform to the max: with performance at this level there is no need for a separate desktop PC.
      • Blazing performance despite slimline design PCle SSDs to process data faster.
      • Up to 7th generation Intel Core i7 vPro Processor.
      • Full set of interfaces with full sized HDMI & LAN connector and USB type-C port replicator to have the same performance back at the office.
    • Stay Secure: The LIFEBOOK U937 keeps your company data secure wherever you are. Choose either:
      • Embedded Palm Secure technology: super secure contactless biometric authentication.
      • Fingerprint sensor.
      • Also features Smart Card reader and TPM 2.0

    Call Us:01 4545 465

  • New iPad Pro

    Apple has launched a new iPad Pro: an entirely new size of iPad with a 10.5-inch screen. It comes in silver, space grey, gold and rose gold with 64GB Wi-Fi model, and 64GB Wi-Fi + Cellular model. Apple has launched a new iPad Pro: an entirely new size of iPad with a 10.5-inch screen. It comes in silver, space grey, gold and rose gold with 64GB Wi-Fi model, and 64GB Wi-Fi + Cellular model.

    iPad Pro. Everything you want modern computing to be. Now even better! No matter the task, the new iPad Pro is up to it — and then some. It offers far more power than most PC laptops, yet is delightfully simple to use. The redesigned Retina display is as stunning to look at as it is to touch. And it all comes together with iOS, the world’s most advanced mobile operating system.

    apple-300-1

    • The most advanced display on the planet: iPad has always offered the ultimate Multi-Touch experience. The redesigned Retina display on iPad Pro sets a whole new standard. It’s not just brighter and less reflective — with ProMotion technology, it’s also far more responsive. So whether you’re scrolling through pages in Safari or playing an intense 3D game, everything feels utterly smooth, fast and immersive.
      • A new 10.5‑inch display: The new 10.5-inch iPad Pro comes with a screen nearly 20 per cent larger than the 9.7-inch model, so you get more room to do more. It also delivers a full-size onscreen keyboard. Yet it’s just as portable as ever.
      • apple5-300

      • ProMotion: You’ve never seen or felt anything like it: The new iPad Pro Retina display features ProMotion technology, with support for a 120Hz refresh rate. So films and videos look spectacular, while games play smoothly without distracting artefacts. Fast, it turns out, is incredibly beautiful. And however you use the display — with your finger or Apple Pencil — everything will feel more responsive.
      • Enhanced brightness, with a wide P3 colour gamut, custom-designed anti-reflective coating and a new dock making multi-tasking easier.

      apple1-300

    • More powerful than most PC laptops.The A10X Fusion chip with 64‑bit architecture and six cores puts incredible power in your hands. So you can edit a 4K video on the go. Render an elaborate 3D model. Or create and mark up complex documents and presentations. Easily. All on a device that still delivers all‑day battery life.
    • Apple Pencil: Now even sharper.The increased refresh rate of the new iPad Pro display makes Apple Pencil feel even more responsive and natural. No other digital pencil lets you write, mark up and draw with such pixel-perfect precision. iOS 11 makes Apple Pencil even more useful.
      • Instant Notes: When inspiration strikes, write.
      • Instant Markup: Sign documents, annotate PDFs or draw on a screenshot.
      • Inline Drawing: Easily sketch, draw or write directly alongside text in Notes and Mail.
      • Searchable Handwriting: Easily search for handwritten text and characters.
    • iOS 11: A monumental leap for iPad. iOS 11 brings iPad to life like never before. New features and capabilities let you get more done, more quickly and easily, making it a phenomenally powerful and personal experience.
    • apple8-300

      • Dock: The all-new Dock makes it easier to access your favourite and recently used apps and files.
      • Files: The new Files app brings all your files together no matter where they are.
      • Drag and Drop:Drag and Drop gives you a new way to move things around. It’s beautifully designed for Multi-Touch.
      • App Switcher: The redesigned App Switcher makes changing apps as quick as a swipe.
      • Multitasking: Multitasking is more powerful and intuitive than ever.
      • Apple Pencil: iOS 11 makes Apple Pencil even more useful. Easily sketch, draw or write directly alongside text in Notes.
      • Augmented Reality: iOS is now the world’s largest augmented reality platform. Games and apps now offer fantastically immersive and fluid experiences that go far beyond the screen.
    • Apps: The power of iPad. Times 1.3 million: iPad is a powerful way to work, play and learn. With over a million apps designed to take advantage of its large Multi-Touch display and powerful chip, it can transform the way you do the things you love.
    • Design: Less than half a kilo...A ton of capability: even though it’s packed with amazing performance, an advanced display, two cameras, ultra-fast wireless and all-day battery life, iPad Pro is still sleek and compact. So you can go just about anywhere and do just about anything.

    Find the iPad that’s right for you. Contact Encom now for information on the new IPad, its accessories and what it can do for you.

    apple4-700

    Call Us:01 4545 465

  • The Era of Windows Mixed Reality

    Windows-Mixed-Reality-700

    Windows Mixed Reality is an amazing new experience combining the thrill of virtual reality with a phenomenal sense of presence.

    Now, you can travel the world. Get inside the games you love. Even move across time and space. With quick, easy set-up you’ll jump from wonder to wow—and be exploring a wide selection of games, 360 degree videos, and over 20,000 2D apps—in just minutes.*

    Windows Mixed Reality: easy setup, affordable gear, a range of hardware choices, and immersive experiences

    • Easy setup
      • Existing high-end VR headsets with external cameras are cumbersome to set up. For more people to experience VR one of the barriers that needed to be removed was the need for external markers. That is why the Windows Mixed Reality headsets will be the first to deliver VR experiences with built-in sensors to track your physical position without requiring you to purchase and install external sensors in your room. You don’t need to spend hours to set up a single room in your house with a large play space, just plug and play. This also means these experiences are portable – whether you are traveling for work or visiting friends and family, just pack your PC and headset and you can share the magic of mixed reality.
    • Affordable gear
      • A variety of Windows Mixed Reality headsets and motion controllers will be available from HP, Lenovo, Dell, and Acer. Headset and motion controller bundles will be compatible with existing and new PC models. Along with its partners, Microsoft are committed to making mixed reality affordable.
    • Range of hardware choices
      • When it comes to deciding which hardware is right for you, customers value choice in brand, industrial design, and features. That is why Windows Mixed Reality is created as a platform for you to enjoy experiences across multiple devices that meet your mobility and performance needs.

    PCs that will be compatible with Windows Mixed Reality: Customers can choose the PC that’s right for them – Windows Mixed Reality PCs and Windows Mixed Reality Ultra PCs. Here is some context on what makes the two experiences different:

    • Windows Mixed Reality PCs: will consist of desktops and laptops with integrated graphics. When plugged into these devices, immersive headsets will run at 60 frames per second.
    • Windows Mixed Reality Ultra PCs: will consist of desktops and laptops with discrete graphics. When plugged into these devices, immersive headsets will run at 90 frames per second.

    Both configurations will support today’s immersive video and gaming experiences such as traveling to a new country, exploring space, swimming with dolphins, or shooting zombies. Use your Windows Mixed Reality motion controllers to enjoy a world of discovery and imagination.

    • Immersive experiences
      Microsoft are working with an incredible set of partners to bring the most immersive experiences to the Windows Store, working with 343 Industries to bring future Halo experiences into mixed reality.

    Call Us:01 4545 465

  • What kind of panoramic camera is right for you?

    Panoramic cameras-

    Panoramic cameras are fixed cameras that provide wide-area coverage – between 180º and 360º – with a single camera. You can use them to monitor activity and detect incidents in large areas, track the flow of people, and improve area management. And because just one camera plays the role of many, your installation and system costs are kept lower.

    But what kind of panoramic camera is right for you?

    AXIS M3007-P Network Camera Single-sensor fixed mini dome with 360°/180° view. AXIS M3007-P Network Camera
    Single-sensor fixed mini dome with 360°/180° view.
    (See video below).
    • Single-sensor cameras tend to be smaller, which means they’re easy to place. They’re well suited for indoor monitoring of retail stores, hotels, schools and offices, and for outdoor installations at hotels, gas stations, boutiques, restaurants, schools and offices. One important benefit provided by single-sensor cameras is the elimination of blind spots when monitoring smaller areas.
    • Multisensor cameras offer higher pixel density, which provides better image quality or wider coverage. They’re appropriate for sizable indoor areas at railway stations, metro stations and airports, for example, and for outdoor areas such as squares, stadiums, university campuses, school yards and outdoor parking lots. They’re also ideal for perimeter surveillance around critical infrastructure, public or governmental buildings, banks and health care centers.
    • Multidirectional cameras offer the greatest flexibility since they can monitor multiple directions simultaneously. Their camera heads can be positioned independently from each other, making them ideal for wide areas both indoors and outdoors, for outer corners of buildings, and intersections of hallways or roads.
    AXIS M3007-PV Network Camera Single-sensor fixed mini dome with 360°/180° view. AXIS M3007-PV Network Camera
    Single-sensor fixed mini dome with 360°/180° view.
    AXIS M3027-PVE Network Camera Single sensor, outdoor-ready fixed mini-dome with 360°/180° view. AXIS M3027-PVE Network Camera
    Single sensor, outdoor-ready fixed mini-dome with 360°/180° view.
    AXIS M3037-PVE Network Camera Single-sensor, outdoor-ready, day/night fixed mini dome with 360°/180° view, microphone and speaker. AXIS M3037-PVE Network Camera
    Single-sensor, outdoor-ready, day/night fixed mini dome with 360°/180° view, microphone and speaker.
    AXIS P3707-PE Network Camera Multidirectional, 360° multisensor camera. AXIS P3707-PE Network Camera
    Multidirectional, 360° multisensor camera.
    AXIS Q3708-PVE Network Camera Multisensor 180° view in challenging light conditions. AXIS Q3708-PVE Network Camera
    Multisensor 180° view in challenging light conditions.
    AXIS Q3709-PVE Network Camera Multisensor 180° view in 4K. AXIS Q3709-PVE Network Camera
    Multisensor 180° view in 4K.

  • Axis Perimeter Defender: High-security, scalable perimeter protection

    AXIS Perimeter Defender is a flexible, scalable video analytics application for perimeter surveillance and protection. It’s designed for demanding large-scale installations.

    AXIS Perimeter Defender  includes several types of intrusion detection and loitering. It enables detection of multiple events occurring simultaneously in different places. AXIS Perimeter Defender includes several types of intrusion detection and loitering. It enables detection of multiple events occurring simultaneously in different places.
    • AXIS Perimeter Defender gives you an edge where security starts – at the perimeter of your facilities. It’s ideal for reinforcing physical access control for high-security facilities such as chemical plants, power plants and prisons and for critical infrastructure.
    • AXIS Perimeter Defender provides accurate detection capabilities with support for multiple detection scenarios. This includes several types of intrusion detection and loitering. It enables detection of multiple events occurring simultaneously in different places. It analyses detected events, dismisses non-threatening ones and notifies security staff of potentially critical situations.
    • AXIS Perimeter Defender can be integrated into as many cameras as you want, here and now, and add more cameras as your needs grow. As AXIS Perimeter Defender analyzes video-footage data on the cameras themselves, it does not require a central server for processing.
    • Installing and setting up AXIS Perimeter Defender is fast, simple and cost-effective. You can deploy and configure it simultaneously on multiple cameras. AXIS Perimeter Defender supports a range of alarm outputs and integrates with your video management systems, providing you with immediate feedback on potential security incidents. And it has all the features needed for easy implementation, including intuitive system-design tools and automatic calibration. Support and upgrades are included in the license.

    AXIS Perimeter Defender wins best new product in the Video Analytics  category from the Security Industry Association Awards AXIS Perimeter Defender wins best new product in the Video Analytics category from the Security Industry Association Awards

    AXIS Perimeter Defender detects four different types of events:

    • Intrusion: When one or more people or vehicles enter a predetermined zone
    • Zone crossing: When a person or vehicle passes through two predetermined zones in a predetermined order and direction.
    • Loitering: When a person or a vehicle remains in a predetermined zone for more than a certain number of seconds.
    • Conditional zone crossing: When a person or a vehicle enters a predetermined zone without starting in or passing through one or more predetermined zones.

    AXIS Perimeter Defender can also detect multiple events occurring simultaneously in different places within the range of a single camera.

    Call Us: 01 4545 465

  • Dedrone-high level perimeter security

    Early detection of drones and possible drone threats is an important component of perimeter security. Encom partnering with Dedrone are implementing counter-drone technology for customers that require the highest levels of perimeter security. Dedrone drone detection software platform is a cost-effective way to protect your most precious assets. Early detection of drones and possible drone threats is an important component of perimeter security . Encom Partnering with Dedrone are implementing counter-drone technology for customers that require the highest levels of perimeter security. Dedrone drone detection software platform is a cost-effective way to protect your most precious assets.

    Dedrone is an automatic Anti-Drone Solution offering a future-proof software platform that mitigates all drone threats.

    Dedrone provides an automatic, integrated, and self-contained platform that delivers drone classification and countermeasures to secure against drone threats and their operators 24/7. DroneTracker is the only modular system on the market that can be:

    • Customized to address site-specific threats.
    • Adapted for easy integration to an existing security program.
    • Accommodate unique building structures, landscapes, and other exterior conditions.

    Dedrone solutions are suitable for use in a wide variety of areas:

    • Stadiums: When airspace is unprotected, rogue drones can interrupt play, threaten the safety of spectators and infrastructure, and pose unique legal implications for athletes and performers.
    • Prisons:It remains important to prevent the dropping of contraband into the inner courtyards at anytime during the day or night. Objects dropped and gathered by inmates pose a serious threat to other inmates and prison employees.
    • Government: A no-fly-zone cannot keep people with criminal intentions from flying their drones in restricted area. Upgrading traditional security concepts to implement counter-drone technology is essential for the latest security threats.”
    • Air Traffic: Drones pose a serious risk when flown near airports. A drone crash in to an aircraft will cause damage to both vehicles.
    • Utilities: Sensor-based drone detection software helps monitor drone traffic and identify authorized drones from unauthorized. The risk of the wrong drone near an oil or gas storage facility could be deadly and cause billions of dollars in infrastructure and environmental damages. Dedrone has the most advanced and proven drone detection software in the world.
    • Data Centers: Drone protection for data centers is no longer theory – it’s a practice in place today since any drone user is capable of causing millions in damages. Drones threaten the physical security of data centers, and consequently, their cybersecurity.
    • Industry: Drones threaten the security of enterprises in multiple ways. They are inexpensive, quiet and reach places that were previously not accessible or difficult to reach. Threats can include loss of industrial secrets, unwanted publicity, failure of computers, internet, or GPS, danger to the health and safety of employees or destruction of property.
    • VIP: Effective protection against paparazzi and other unauthorized drones.

    For a complete Perimeter Security Solution read about Axis Perimeter Defender: High-security, scalable perimeter protection.

    Call Us:01 4545 465

  • Smartphones - Keys for Access Control

    Using smartphones as keys for access control Using smartphones as keys for access control offer a cost-effective, simpler way for companies to manage identification credentials

    Mobile devices are everywhere. The number of mobile phone users alone is expected to reach over 4.7 billion in 2017. Two out of every three business people today are using mobile devices like smartphones for an ever more diverse set of applications.

    20 percent of organizations expect to adapt use of smartphones as an option to traditional physical access cards by 2020.
    “Predicts 2017: Identity and Access Management” Gartner,

    High expected growth for usage of smartphones as digital access control keys is expected because:

    • Mobile technology is already widely used for identification, authentication, authorization and accountability in computer information systems.
    • Using mobile devices as keys aligns perfectly with the mobile-first preferences of today’s workforces. Using mobile devices as keys not only delivers a convenient user-experience. It also helps boost operational efficiency and satisfaction of today’s mobile-enabled workforces.
    • It represents a more cost-effective, simpler way for companies to manage identification credentials as it eliminates numerous manual tasks related to handling, printing, distributing and disposing of physical identity badges.



    HID Global’s Mobile Access and AXIS A1001 Network Door Controller and AXIS Entry Manager


    Axis have launched its integration of HID Global’s Mobile Access with its AXIS A1001 Network Door Controller and AXIS Entry Manager software. The Axis and HID mobile access control solution meets business demands to support mobile-enabled workforces. The solution enables mobile devices such as smartphones to function as credentials, allowing people to gain access to secured buildings, rooms and areas.

    By integrating HID Global’s Mobile Access with its software and door controller, Axis has created a solution which combines the convenience expected in a mobile-first world with the levels of security demanded by businesses and their employees.

    The HID and Axis mobile access offering is the first IP-based, end-to-end solution. It encompasses everything necessary for small-, medium- or enterprise-sized organizations to deploy mobile access control. The solution includes:

    • AXIS A1001 Network Door Controller, which makes yes/no decisions about who may enter, in which areas and at what times.
    • AXIS Entry Manager access control software, which is integrated with HID Mobile Access® Portal and used to set up the systems, add new users and manage mobile IDs.
    • Bluetooth enabled readers from HID Global®.
    • HID Mobile Access® Portal.
    • HID Mobile Access® App, which is available through the Apple® App Store and Google® Play.
  • Improve your Cyber Security

    Concern about cyber crime via IP camera networks is real and there is no single solution for staying safe. Effective cyber security is about assessing risks and consequences and taking appropriate steps. It’s about products, people, technology and ongoing processes. And about partnering with Suppliers and Technology experts that offer support to you at every level. Encom partnering with Axis and Milestone offer this possibility. Concern about cyber crime via IP camera networks is real and there is no single solution for staying safe. Effective cyber security is about assessing risks and consequences and taking appropriate steps. It’s about products, people, technology and ongoing processes. And about partnering with Suppliers and Technology experts that offer support to you at every level. Partnering with Encom, Axis and Milestone offer your business this possibility.

    With the frequency of cyber attacks making headline news, no wonder cybersecurity is top of mind. Cybersecurity threats to businesses are at an all-time high, escalating in frequency and level of sophistication.
    In this article we will examine:

    • How to spot the symptoms of poor cyber health
    • Tactics for protecting your data and network
    • Reasons your video surveillance system would be valuable to a cyber criminal
    • Building an internal company culture concerned about cybersecurity
    • Resources to help make improvements or maintain the current system
    vjfna/lgnrea/ 42% of individuals say end user failure to follow policies or carelessness were to blame when asked for an example of human error during a security breach.

    Spotting the symptoms of poor network health


    Cybersecurity for your Network Camera installation and your IT go hand in hand. At Encom we have 25 years experience helping business to look after and integrate both areas to provide the best possible security solution.

    If you have a strong, hardened network paired with policies, processes, and people all proactively monitoring and responding to cyber threats – and aligned with your organization’s stated cybersecurity goals – then you are in great shape! For the rest of us - read on.

    • Your IT and security teams are not aligned:
      It is important to get IT and Security teams to have aligned policies and processes with clear password management, ownership and responsibility to review security measures, have advance encryption methods applied to video streams and have hardware and software aligned with IT policies.
    • Your network users are not following policies and procedures:
      Have you policies and procedures in place that are documented and easy to understand? Are new and existing employees properly trained?
    • Your installation and maintenance plans are not clearly documented:
      Physical installation and maintenance can cause problems if your installer does not understand cybersecurity. Security, IT, facilities and maintenance departments need to be aligned on a documented installation and maintenance plan.
    • Your technology vendors aren’t talking to you about cybersecurity:
      Does the equipment you choose fit into your IT policy or are you trying to work your policy around your vendors? Are they talking about cybersecurity and best practices guides, performing tests and evaluating their product risks.

    10 best practices for a healthy network


    Creating and maintaining a secure network is a team effort and requires support from many different departments. You can’t do it alone. Once a plan is in place, communicate it through the organization and keep it top-of-mind when selecting and installing new devices on the network. Creating and maintaining a secure network is a team effort and requires support from many different departments. You can’t do it alone. Once a plan is in place, communicate it through the organization and keep it top-of-mind when selecting and installing new devices on the network.

    Along with your IT, security and facilities management teams, you can work to mitigate many of the common risks associated network’s cybersecurity.

    • Use strong, unique passwords:
      Set strong, unique passwords with a minimum of eight characters. Don't rely on the default settings of IP based devices. Ensure good password management, change passwords on a regular basis or use certificates in lieu of passwords.
    • Deploy and install devices in the recommended way:
      Where possible, cameras should be installed where they’re out of reach to a potential attacker. Unused services should be disabled and only trusted applications should be installed.
    • Define clear roles and ownership:
      Have clear rules and procedures established for which employees have particular access rights. Assign responsibility for reviewing security measures to ensure best practices. To reduce exposure, any device that accesses video should not be allowed to access cameras directly, unless it is required by the solution. Clients should only access video through a Video Management System (VMS) or a media proxy.
    • Use the latest applicable firmware:
      Bugs or flaws in operating systems found on workstations, servers, cameras, printers, and other network devices can put your organization at risk. Install patches and security updates and have a well-documented maintenance plan.
    • Perform a risk analysis:
      A cyber threat analysis will define how much you can lose and how much you should spend on protection. Make an analysis of potential threats as well as the possible damage and costs if the system is attacked. Include both internal and external threats.
    • Gain knowledge on system protection and possible threats:
      Take a closer look at the exact systems that run on your network. Work with your entire supply chain of vendors to understand any possible threats to your network in using your selected devices.
    • Change your devices’ factory default settings:
      Do not rely on any device’s default settings. Change the passwords and the default administrative account IDs. Enable and configure the device protection services and always disable any services you will not be using.
    • Use encrypted connections:
      Encrypted connections should be used on all networks, even local or ‘internal’ ones.
    • Secure the network:
      Understand your firewalls and filters. Taking the time to secure your network from the backbone helps to support all your other efforts to implement cybersecurity best practices.
    • Maintain your systems and processes:
      Monitor all devices on a regular basis and enable system notification when applicable and supported. You should also check access logs regularly to detect any attempts for unauthorized access.Once the plan is executed, it will need to be reviewed and assessed regularly. When it comes to the fast-paced world of technology, new updates, features and best practices are created all the time. Be sure to document your maintenance procedures to ensure existing and future colleagues understand your processes.

    To download the Axis E-book about Cybersecurity click here.

    To take the Online Cybersecurity Course click here.

    For more information on any of our products phone us now.

    Call Us:01 4545 465

  • Cyber-attack and Ransomware - What you need to know !

    ransomware-700

    Read More about Symantec Endpoint Protection Read More about Symantec Endpoint Protection

    After last weeks Cyber-attack the 'experts' are now telling us that these attacks are not over yet. Below is a list of things you can do to reduce the risk to business systems and personal computers. Training and educating staff, ensuring updated Content Scanning and Antivirus software is installed and having the latest hardware with in-built security will all help to minimize your exposure to problems.

    What can I do to protect myself from ransomware?

    User Education

    One of the primary vectors of these threats is “Spear Phishing” attempts, where an unsolicited e-mail will come from an unknown sender with an attachment that is then executed. Educating your users as to proper handling of unknown or suspicious files is crucial.

    Employ content scanning and filtering on your mail servers.

    Inbound e-mails should be scanned for known threats and should block any attachment types that could pose a threat.

    Maintain a current patch level for any operating systems and applications that have known vulnerabilities.


    Exploit kits hosted on compromised websites are commonly used to spread malware. Regular patching of vulnerable software is necessary to help prevent infection.

    Install and configure Host Intrusion Prevention

    • IDS or IPS systems can detect and prevent the communication attempts that the malware uses to create the public and private encryption keys required to encrypt the data.
    • The Symantec Endpoint Protection (SEP) client IPS system blocks this type of communication traffic by default.

    Install, configure and maintain an endpoint security solution

    • With the endpoint being the final line of defense from any threat, a multi-faceted security solution should be employed. This solution should have protections for not just file based threats (traditional AV), but should also include download protection, browser protection, heuristic technologies, firewall and a community sourced file reputation scoring system.
    • Symantec Endpoint Protection 12.1 (SEP 12) users can leverage the supplied “High Security” Virus and Spyware Protection policy that was generated automatically during installation of SEP 12 to provide protection for ransomware threats.
    • For additional protection from new ransomware variants, the “High Security” policy can be edited and the Download Protection feature can be modified to act on files that have not been proven to be good by the Symantec user base. The options that would need to be altered are located in the “Download Protection” – “Download Insight” - “Also detect files as malicious based on their use in the Symantec Community” section. Enabling the two check boxes next to “Files with:” and “Files known by users for:” and using the default values of 5 and 2 respectively will force the SEP 12 client to treat any file that have not been reported to Symantec by more than 5 users or have been reported for less than 2 days to be treated as unproven files.
    • The handling of these files is set on the “Actions” tab under “Unproven files” and the setting of “Specify actions for unproven files:” should be set to “Quarantine risk”.
    • People using another endpoint AntiVirus solution should refer to their vendor for information on how to configure their real-time scanning options to be in-line wherever possible with “High Security” Virus and Spyware policy and the prevalence of any files as determined by their user base.

    Block your end users from being able to execute the malware

    • SEP users can leverage the Symantec supplied example Application and Device Control policies to prevent files from being run in the root and/or subfolders of the users %AppData% directory variable to prevent the downloaded threat from being launched. The policy prevents launch attempts of files that have been extracted from compression formats that the threat has been spreading in, blocks Auto-Run, access to script files and the execution of files from removable volumes.
    • Software restriction policies enforced via GPO can be created and configured to accomplish the similar tasks.

    Limit end user access to mapped drives

    The current ransomware threats are capable of browsing and encrypting data on any mapped drives that the end user has access to. Restricting the user permissions for the share or the underlying file system of a mapped drive will provide limits to what the threat has the ability to encrypt.

    Deploy and maintain a comprehensive backup solution.

    The fastest way to regain access to your critical files is to have a backup of your data. Backups of data should take place not only for files housed on a server, but also for files that reside localy on a workstation. If a dedicated peice of backup software is not an option, simply copying your important files to some sort of removable media and then removing that media from the system will provide a safeguard for your data being impacted by these types of threats.


    My data’s been encrypted by Ransomware, what now?

    • Do not pay the ransom! Paying the ransom may seem like a realistic response, but it is only encouraging and funding these attackers. Even if the ransom were paid, what guarantees do you have that you will actually regain access to your files? Remember that these are the same aggressors that are holding your files hostage in the first place. Paying the ransom can actually increase the likelyhood that you will be directly targeted for additional extortion attempts.
    • Remove the impacted system from the network and remove the threat.
    • With a multitude of variants it is unrealistic to list the exact steps, but most security vendors have detailed write-ups for the threats that include removal instructions. Removal is best done with the system off the networks to prevent any potential spread of the threat.
    • Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.

    Can I regain access to my files without paying the ransom or restoring from backup?

    • The answer is most likely no. There are earlier variants of these threats that simply hid the ransomed files, left copies of the original files with the Volume Shadow Copy service or left copies of the private encryption keys locally or in memory. It is certainly worth the effort of researching the details of the variant you encountered to see if there are options for you, but for the majority of instances, these options are no longer the case as the threat writers have updated their methods using the funds from earlier rounds of extortion.

    Can I “Brute-Force” my way into my encrypted files?

    • No, the current threats employ an RSA-2048 bit encryption key. Brute-forcing the key is simply not possible currently.

    For more information on any of our software please call our team and we will be happy to talk you through the most suitable options for you.

    Call Us:01 4545 465

Items 1 to 15 of 129 total

Page:
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. ...
  7. 9