Security Foiling Ltd - Hologram Applicators, Security Die Technologies, Holograms and Hot Stamping Foils


Security Foiling Limited is a design and manufacturing company specialising in security hologram application equipment. Founded in 1987 and based in the UK, our staff has a combined experience of more than sixty years in print and engineering.

Our MicroPOISE™ desktop security hologram application machines are being used in document security projects in more than sixty countries with their use spanning almost ten years. Security Foiling also offers a bespoke product design service for security hologram application projects.

Hologram Applicator: MicroPOISE

The most popular machine in our range includes our innovative SENTRY security access control system. SENTRY allows the use of MicroPOISE to be carefully controlled at all times, helping to prevent organised internal fraud or theft of valuable documents.

SENTRY

Security


Checkpoint Systems

Whether your equipment is deployed domestically or abroad, IsoSoft has the expertise and track record to engineer security industry specific systems that meet the highest standards. Many firms have participated in such projects, but few have the credentials to claim responsibility for architecting and deploying systems that keep our borders and the professionals who guard them safe.

Click Here When a Chicago area imaging equipment developer needed to completely overhaul their cargo security checkpoint systems, they turned to the experts at IsoSoft Solutions to bring their industrial controls and software suite into the 21st century. Visit our Case Studies page or click on the image to the left to learn more.

IsoSoft has engineered security systems for all scales. From manifest and document scanning, parts inspection and machine vision, to CT devices large enough to scan freight containers the size of a train car, IsoSoft has developed software and device controls that meet the demand.

Application Security

With today’s exchange regulations, system security has become an even greater focus of the financial world. IsoSoft Solutions has developed a security framework that ensures that only authorized users can view and manipulate valuable parts of your system, like the data cache.


IsoSoft provides a wide range of security and entitlement experience that can be easily integrated into new or existing platforms as dictated by the needs of the client. Our security APIs integrate seamlessly into the NT security model and work for both NTLM and Kerberos (Active Directory) security models. In addition, our API utilizes SQL Server to implement fully configurable role based permission and entitlement support.


    Our Security platform is comprised of the following modules:

  • NT User and Group management for both Work Group and Domain based systems utilizing NTLM or Kerberos.
  • Role based rules and permissions which integrate seamlessly with NT Group management and policy.
  • Operating System and hardware privilege settings based on Groups and roles.
  • Resource and file system permission and access control based on Groups and roles.

Glasgow Airport security system deemed 'a success'

Glasgow Airport security system deemed 'a success'Bosses at Glasgow Airport have hailed the new multi-million pound security system at the gateway a success.

Thousands of passengers passed through the system without incident on its first day in operation which formed part of BAA's £200 million facelift of the airport

The new system includes ten state-of-the-art Atix X-ray machines, capable of scanning passengers at greater speed and with more accuracy.

As well as helping to speed up the security process for millions of passengers, the initiative also means that domestic travellers are now free to make use of leisure and retail facilities previously only available to international flyers.

Amanda McMillan, managing director of Glasgow Airport, said: "Security is our number one priority, and we have invested heavily to build one of the largest security search areas in the UK, using the latest X-ray technology to speed passengers safely through the airport.

"Once through security, passengers can move freely throughout the main terminal."

According to the Civil Aviation Authority, 241 million passengers passed through UK airports in 2007, an increase of 2.4 per cent from 2006.

The FLEXGUARD Security System is a complete line of anti-theft security hardware for laptop computers, desk top computers, remote controls, projectors and audio-visual equipment.



All Purpose Cable Locks
Secure any equipment with the FLEXGUARD all purpose cable locks. Protect your computers for as little as $10.28 each!

New Machines Dynaudio Esotec System 222
New Car GPS, Audio, Security Equipment - New Machines
Dynaudio Esotec System 222 $720Denmark isn't just home to tasty pastries and Hans Christian Anderson. It (through Danish company Dynaudio) has also spawned a new line of high-end loudspeakers. The System 222 addresses the demands of the physical environment of the car with significant upgrades to its Esotec drivers to optimize both on- and off-axis performance using materials suited to withstand even the harshest of conditions.630.238.4200 / www.dynaudiousa.com View Related Article
New Machines Steg K Competition Amplifier New Machines Steg K Competition Amplifier New Machines Magellan Crossovergps New Machines Vealink Dimension New Machines Vealink Screen New Machines Dynaudio Esotec System 222 New Machines Peripheral Electronics Pxdp3
New Machines Auto Page Rs622



Fine Designed Machine-security SystemKIMMA takes quite a few effective measures included in the design of inner structures in order to prevent machines from burglary, intentional or unintentional fierce hitting, damage and other machine vandalism on the delivery door. The elaborately designed multi-securing functions proved themselves efficient in anti-burglary. Customer service keypad, which is separated from administrator’s management keypad, performs well in water-proofing, anti-hitting, etc.

More airports using virtual strip-search machines to observe naked bodies


scanner

A computer monitor viewed by a Transportation Security Administration TSA officer reveals details of the body of a fully-clothed employee of L3 Communications Security and Detection Systems as she is scanned inside a ProVision whole body imaging machine at Los Angeles International Airport.

CCTV Security System

We offer world class CCTV security systems which are known for their various functions. The CCTV security sytems offered by us meet the requirements of all premises whether they are small or big. Our security include CCD cameras of diffrent types and features which are as following:


CCD Cameras:

  • Economy Camera
  • Dome Camera
  • Cube Camera
  • Ball Camera
  • Main Deluxe Camera
  • C/CS-Mount Camera Auto-IRIS / zoom lens compatibility
  • Metal Deluxe Camera
  • Pan & Pan / Tilt Scanner
  • Mounts & Housing

Features:
  • Full function Remote Control
  • Random Camera selection through Numeric Keys on the Remote Key Pad
  • Individual Dwell Time setting for all Cameras from 01 to 99 seconds for Auto Mode
  • Changeover from Auto to Manual or Manual to Auto through single Key Operation
  • Manual Key for On / Off, Channel up and Auto mode in case of Remote Failure
  • Memory Retention of last Data in case of Power Failure
  • Crystal Clear Picture
  • Silent / One Way Audio / Two Way Audio Models available
  • Individual Volumes Settings for all Cameras
  • All Models available for 4 / 8 16 / 24 / 32 / 64 / 96 Camera

Web Camera Security System Turn your WebCam into a Security Camera. No extra equipment needed. Just set the timer and leave the room. The camera will detect the first thing that moves and start recording. Can be set to record in...


The X-Ray projects



September 31, 2006 was the date of the conclusion of Dear-Mama project. From January to September 2006, major milestones where achieved. The Dear-Mama consortium decided to build a second X-ray machine dedicated to bone radiology (Dear-Mama-II) which can be seen in fig.1. This X-ray machine is the first of it is kind as a prototype based on pixel CdTe detector coupled to photon counting front end electronics (Medipix-II chip). Simply it is a unique X-ray machine. It was commissioned and was ready and operational by March 2006 and its first results can be seen in figure 2. When compared to another system, AGFA CR75.0, the Dear-Mama-II machine shows that it is superior in spatial resolution and it dose reduction. In Figure 3 one can see the image of a Lamb cutlet and the corresponding contrast histogram. In Figure 4 one can see the image of the phantom from both systems. With this image one can judge, with the naked eye, which image is better when it comes to spatial resolution. Add to this that the Dear-Mama-II image was taken with 6-times less radiation dose than that of Agfa-CR-75.0. We have also found that at 110keV, using chest phantom, the efficiency of Dear-Mama-II machines is 11 times better that that of the Agfa CR75.0 when it comes to radiation dose reduction. Since the images of Dear-Mama-II machine are presented without contrast enhancement image processing, it is clear that there is still a good margin to reduce the radiation dose, while maintaining the same quality of the image, by a factor around 50. This is a significant reduction in radiation dose especially when it comes to routine check-up such as chest radiology or men above 60 years old. These tests were carried out at UDIAT (Hospital Parc Tauli) with two teams; one from HÔPITAL D’ ENFANTS ARMAND TROUSSEAU led by Prof. J.P. Montagne, and the other is from Hospital of Vienna University led by Prof. F. Kainberger.





Concerning the Dear-Mama-I machine, which is dedicated to Mammography, it was commissioned in summer 2005, and the clinical trials, using phantom and specimen, were carried out during the 2006. The evaluation of Dear-Mama machine for Mammography was carried out by expert team from Hospital Parc Tauli, led by MD. M. Sentis. It was done using phantom, and lumpectomy specimens. In Fig. 5 one can see a nurse fixing a lumpectomy specimen to the Dear-Mama-I detector using the compressing pad. And the result can bee seen in Fig.6 in which the micro calcifications are clearly visible. The conclusion is that Dear-Mama-I results, without the use of Contrast Enhancement Image processing, are comparable to Selenia X-ray machine which is considered the best in the market. We have very good confidence that there is ample room to improve the results of Dear-Mama-I machine to by-pass Selenia, both in spatial resolution and in image contrast. We expect that this improvements will be done by the X-ray Imatek SL enterprise.



Patent:

Web Camera Security System Turn your WebCam into a Security Camera. No extra equipment needed. Just set the timer and leave the room. The camera will detect the first thing that moves and start recording. Can be set to record in...

Data Center Operations

CNS Operations Console

CNS Operations is staffed 24/365 in a facility which includes redundant A/C, Uninterruptible Power Supply (UPS) with backup diesel generator, FM-200 fire suppression, card-key security system, and off-site data storage for disaster recovery. Operations staff also provides campus-wide off-hour emergency support with access to on-call technical staff.

CNS machine-room

Central-Site Equipment

z/OS System

CNS operates an IBM z800 computer running z/OS (with JES2). Detailed information regarding the hardware configuration on CNS's z/OS system may be found in CNS document D0012, Grant Writer Information.

Server Rack in CNS machine-room

Server Clusters

Server clusters which run major administrative, network, and research systems are housed and monitored onsite.

Languages & Programs

The major production languages include IBM High Level Assembler, C/C++, and COBOL. CICS is our primary transaction processor on z/OS. IBM's DB2 is our primary database management system. VisionBuilder is used for file management and report generation. Other primary software includes statistical packages, libraries of scientific and mathematical routines, and graphics programs.

Automated Tape Library

Data Storage

We have a variety of storage options available, including tape cartridges, online disk space, and indexed CD backups of z/OS output. Please see www.cns.ufl.edu/storage.

Output Options

Output can be on the following: printed pages (line printer, laser printer); terminal listings, files, or displays; disk data sets and files; magnetic tape; large-format HP 5000 PS Color printer; CD-ROM. For line printer output, you may request a variety of paper types, upper- or mixed-case printing, and six or eight lines per inch. Letter-quality laser printer output is also available. For more information, see www.cns.ufl.edu/grantwriter.

Self Service Computing

Many departments, students, instructors, and researchers use CNS systems using a self-service model: you write and run the programs; we provide the systems and programs on which to run them. University Computing Support Organizations (CSO's) serve user groups with specific computing needs. These units use CNS's computer systems and hardware but have their own programmers, consultants, and input/output facilities. Most of these organizations provide programming, consulting, education, and other computing support to their CNS users. To see which CSO is appropriate for you, see www.cns.ufl.edu/supportorgs .

Student Records

From application for admission to registration, graduation and beyond, CNS systems store, process, and protect UF's core mission-critical data. See www.registrar.ufl.edu.

ISIS

ISIS is the Integrated Student Information System. It incorporates registration and other functions and offers additional information systems, such as the academic advising system. See www.admissions.ufl.edu/aboutisis.html.

SASS

Students' academic progress is monitored by a computer program called the Student Academic Support System (SASS). Approximately six weeks into Fall and Spring Semesters, a copy of each student's SASS audit, also known as a Tracking audit, is printed and placed in each student's academic folder. Each student can and should regularly check their own SASS audit report through the Integrated Student Information System (ISIS) at www.isis.ufl.edu .

Student Financial Affairs

CICS at CNS runs data processing, storage, and security for students' and parents' confidential financial data. See www.sfa.ufl.edu.

Data Center Operations

CNS Operations Console

CNS Operations is staffed 24/365 in a facility which includes redundant A/C, Uninterruptible Power Supply (UPS) with backup diesel generator, FM-200 fire suppression, card-key security system, and off-site data storage for disaster recovery. Operations staff also provides campus-wide off-hour emergency support with access to on-call technical staff.

CNS machine-room

Central-Site Equipment

z/OS System

CNS operates an IBM z800 computer running z/OS (with JES2). Detailed information regarding the hardware configuration on CNS's z/OS system may be found in CNS document D0012, Grant Writer Information.

Server Rack in CNS machine-room

Server Clusters

Server clusters which run major administrative, network, and research systems are housed and monitored onsite.

Languages & Programs

The major production languages include IBM High Level Assembler, C/C++, and COBOL. CICS is our primary transaction processor on z/OS. IBM's DB2 is our primary database management system. VisionBuilder is used for file management and report generation. Other primary software includes statistical packages, libraries of scientific and mathematical routines, and graphics programs.

Automated Tape Library

Data Storage

We have a variety of storage options available, including tape cartridges, online disk space, and indexed CD backups of z/OS output. Please see www.cns.ufl.edu/storage.

Output Options

Output can be on the following: printed pages (line printer, laser printer); terminal listings, files, or displays; disk data sets and files; magnetic tape; large-format HP 5000 PS Color printer; CD-ROM. For line printer output, you may request a variety of paper types, upper- or mixed-case printing, and six or eight lines per inch. Letter-quality laser printer output is also available. For more information, see www.cns.ufl.edu/grantwriter.

Self Service Computing

Many departments, students, instructors, and researchers use CNS systems using a self-service model: you write and run the programs; we provide the systems and programs on which to run them. University Computing Support Organizations (CSO's) serve user groups with specific computing needs. These units use CNS's computer systems and hardware but have their own programmers, consultants, and input/output facilities. Most of these organizations provide programming, consulting, education, and other computing support to their CNS users. To see which CSO is appropriate for you, see www.cns.ufl.edu/supportorgs .

Student Records

From application for admission to registration, graduation and beyond, CNS systems store, process, and protect UF's core mission-critical data. See www.registrar.ufl.edu.

ISIS

ISIS is the Integrated Student Information System. It incorporates registration and other functions and offers additional information systems, such as the academic advising system. See www.admissions.ufl.edu/aboutisis.html.

SASS

Students' academic progress is monitored by a computer program called the Student Academic Support System (SASS). Approximately six weeks into Fall and Spring Semesters, a copy of each student's SASS audit, also known as a Tracking audit, is printed and placed in each student's academic folder. Each student can and should regularly check their own SASS audit report through the Integrated Student Information System (ISIS) at www.isis.ufl.edu .

Student Financial Affairs

CICS at CNS runs data processing, storage, and security for students' and parents' confidential financial data. See www.sfa.ufl.edu.


Fine Designed Machine-security System:
KIMMA takes quite a few effective measures included in the design of inner structures in order to prevent machines from burglary, intentional or unintentional fierce hitting, damage and other machine vandalism on the delivery door. The elaborately designed multi-securing functions proved themselves efficient in anti-burglary. Customer service keypad, which is separated from administrator’s management keypad, performs well in water-proofing, anti-hitting, etc.
Crydom PCB Mount Solid-State Relays
For your Cmputer SAFETY:!!



Big Power in a Small Package! Crydom PCB Mount Solid-State Relays Reduce Panel Space Requirements While Maintaining Power Capabilities

Crydom, an operation of Custom Sensors & Technologies (CST) and North American Leader in solid state relays, announces the most extensive line of standard and custom PCB mount power solid state relays available to the European and Asian markets. These relays offer ratings from 1 amp to 25 amps (forced air) at line voltages up to 660Vac., which makes them ideal for literally hundreds of commercial and industrial switching applications. Their compact design is also well suited for high-density PCB applications. Moreover, these relays contain no moving parts, which provides for silent operation and life expectancies at full-load current in excess of 50 times most electromechanical relays.
These compact solid state relays are ideal for use in numerous commercial & industrial applications, including: electromechanical relay replacement, pump control systems, gaming equipment, vending machines, security systems, medical equipment, solenoid control, packaging equipment, printing machines, and much more.

Versions are available with either a zero-crossing (resistive loads) or random turn-on (inductive / phase control loads) output. UL Recognition, CSA Certification, VDE Approval, and CE Compliance available on most models.

• Ratings up to 25A (forced air) @ 660V AC
• SCR output for heavy industrial or commercial loads (most versions)
• Available in standard in-line, mini in-line, or dual in-line packages
• Life expectancy in excess of 50x typical electro- mechanical relays at full-load current
• No moving parts eliminates all acoustical noise
• Not sensitive to magnetic fields
• Custom models available upon request
• RoHS Compliant

Property Security System

Prevent theft from Auto vending machine, Game machine, Offertory Locker, Safer or Data Locker, etc.
Specifications:

* Power: 006P 9V battery
* Delay timing: 0 - 10 seconds
* Alarm timing: 10 seconds - 6 minutes
* Activate angle of tilt switch: > ¡Ó 15º
* Power consumption: Standby 20uA, Re-set 2.5mA, Loud alarm 200mA
* Alarm volume: 100 dB

Features:


* User's own Delay time setting
* User's own Alarm time setting
* Re-set switch
* Anti-cut function
* Battery low warning
* Prevent theft from Auto vending machine, Game machine, Offertory Locker, Safer or Data Locker, etc.


Main Product:

RF Signal Detector, spy camera detector, bug detector, mobile phone detector, audio jammer, cellular jammer, mobiel phone blocker, GPS jammer, video jammer, Bluetooth jammer, RF signal jammer, porperty security system, loss warning system


Security Cameras and Systems: Security systems are technologies that enhance the security (and possibly safety) of transit customers, personnel, equipment, and facilities. Technologies include radio communications, silent alarms, covert microphones, closed circuit television (CCTV) cameras (also known as video surveillance), AVL and other equipment that assist transit agencies in monitoring and responding to situations on board vehicles, along the routes, and at transit facilities.

In this Oct. 28, 2005 file photo, a Diebold voting machine demo is shown in Columbus, Ohio. Diebold Inc. , maker of banking machines, business security systems and voting equipment, said Wednesday, April 25, 2007 that it swung to a loss of $5.9 million in the first quarter, due largely to restructuring charges from a plant closing in France. The company also said it still is trying to evaluate a long-term strategic plan for its Diebold Election Systems voting machine business, which had a revenue decline of about $23 million in the quarter ending March 31.

n this Oct. 28, 2005 file photo, a Diebold voting machine demo is shown in Columbus, Ohio. Diebold Inc. , maker of banking machines, business security systems and voting equipment, said Wednesday, April 25, 2007 that it swung to a loss of $5.9 million in the first quarter, due largely to restructuring charges from a plant closing in France. The company also said it still is trying to evaluate a long-term strategic plan for its Diebold Election Systems voting machine business, which had a revenue decline of about $23 million in the quarter ending March 31.


DESS
- The first standard Anti-Theft device in the ATV Industry.
The new Digital Encoded Security System ensures that the motor will not start without a key - only the original key.
DESS stands for Digitally Encoded Security System it basically is a fingerprint to your machine. The ignition key contains an electronic circuit that gives it a unique electronic serial number. This and only this key can start and be used on your machine. Now can a criminal bypass the ignition key and get your machine started I am sure, anything is possible but this system does make it more difficult.


Security Foiling Ltd - Hologram Applicators, Security Die Technologies, Holograms and Hot Stamping Foils
Security Foiling Ltd

Security Foiling Limited is a design and manufacturing company specialising in security hologram application equipment. Founded in 1987 and based in the UK, our staff has a combined experience of more than sixty years in print and engineering.

Our MicroPOISE™ desktop security hologram application machines are being used in document security projects in more than sixty countries with their use spanning almost ten years. Security Foiling also offers a bespoke product design service for security hologram application projects.
Hologram Applicator: MicroPOISE

The most popular machine in our range includes our innovative SENTRY security access control system. SENTRY allows the use of MicroPOISE to be carefully controlled at all times, helping to prevent organised internal fraud or theft of valuable documents.

DAY LIFE

a Diebold voting machine demo is shown in Columbus, Ohio. Diebold Inc. , maker of banking machines, business security systems and voting equipment, said Wednesday, April 25, 2007 that it swung to a loss of $5.9 million in the first quarter, due largely to restructuring charges from a plant closing in France. The company also said it still is trying to evaluate a long-term strategic plan for its Diebold Election Systems voting machine business, which had a revenue decline of about $23 million in the quarter ending March 31.


The E12
Ideal for large houses and commercial premises. Wireless and wired alarm panel with keyboard display and GSM SMS/GPRS communicator. 12 fully programable wireless zones each with individual anti tamper. 12 fully programable wired zones each with individual anto reset fuse protection, anti tamper and protected power supply. Can be divided into 2 paritions. Capability of reporting all activities and statuses to up tp 5 cell phone numbers via SMS/GPRS. Automatic daily test reported via SMS/GPRS. Full control of functions via SMS/GPRS. Optional dial in voice listen in facility. Away mode is all programmed zones on, both internal and external sirens activated, LED and SMS identification of zone. Sleep (stay) mode is all programed zones on, buzzer will activate for 1 minute then sirens, LED identification of zon. Monitor mode is all programed zones on buzzer will beep 6 times on each activation, LED identification of zone. Off mode, all zones off, anti tamper still activate. Programmable entry and exist delay. Full visual, SMS and audible confirmation of all alarm activities including sensor supervision, low battery detection and anti tamper. Includes outputs for sirens,buzzers and optional telemetry for armed response radios (on/ off, alarm. panic, mains). Panel battery backup for up to 3 days. Connect up to 48 sensors and 12 key ring remote controls and keypads with 12 user codes. Sensor range 30 to 50 meters low power and up to 150 meters high power. Wireless sensors have up to a 4 year battery life. Remote arming and disarming as well as panic and silent panic by using using the keypad, SMS or 3 button key ring remote control.

The E6
Wireless alarm panel complete with GSM SMS communicator with 6 normal zones plus monitor zone, 24 hour anti tamper zone and panic (siren) and silent panic. 4 additional programable wired or wireless inputs for sensors or devices. 3 outputs controllable via SMS (switch on lights, pumps, air conditioners etc). Capable of reporting all activities and ststus to up to 5 cell phone numbers via SMS. Automatic daily test reported via SMS. Dial in voice listen in facility. Includes outputs for sirens, buzzers and optional telemetry for armed response radios (on/ off, alarm, panic, mains). Panel battery back up for up to 7 days. Wireless sensors have up to a 4 year battery life. Connect up to 12 wireless sensors (passive infra red or door guards) and 5 key ring remote controls. Sensor radio range 30 to 50 meters low power and up to 150 meters high power. Remote arming and disarming as well as panic and silent panic by using SMS or the 3 button key ring remote control. Full visual, SMS and audible confirmation of all alarm activities including sensor supervision, low battery detection and anti tamper.


Products

The 4x2
Monitor and control security systems, machines and pumps etc. 4 x digital inputs 0 to 12 VDC with 2 Messages one for Hi and one for low. 2 x relay outputs which can be pulsed or latched via SMS. Arm security systems via SMS, dropped call or timer. One output relay can be operated from a 7 day 4 event per day timer. Both relays can be operated via SMS. Small size, only 65x120x25mm complete with GSM aerial. Easy to install, to hide and works in low cell signal areas. Ideal for connection to alarm panels and will not affect alarm electronics. Reports all messages via SMS to up to 6 cell phone numbers. Individual messages can be programed to individual cell numbers. Health test can be programed to individual cell numbers. Various status request's via SMS. Enables the user to monitor and control signals from any country with GSM. Low standby and transmit current, which can operate from 8 VDC to 24 VDC.


Rojone’s EziTrak security system helps recover stolen machines
... system from Rojone, recently helped a small hire firm in Yorkshire to recover its machine after being stolen.The hire company has always taken machine and site security seriously and so appreciated the benefits of the EziTrak system when they ...

Property Security System
Product ID: PSS

Property Security System Click here for details.Prevent theft from Auto vending machine, Game machine, Offertory Locker, Safer or Data Locker, etc.


Specifications:

Power: 006P 9V battery
Delay timing: 0 - 10 seconds
Alarm timing: 10 seconds - 6 minutes
Activate angle of tilt switch: > ¡Ó 15º
Power consumption: Standby 20uA, Re-set 2.5mA, Loud alarm 200mA
Alarm volume: 100 dB
Features:

User's own Delay time setting
User's own Alarm time setting
Re-set switch
Anti-cut function
Battery low warning
Prevent theft from Auto vending machine, Game machine, Offertory Locker, Safer or Data Locker, etc.


Main Product:
RF Signal Detector, spy camera detector, bug detector, mobile phone detector, audio jammer, cellular jammer, mobiel phone blocker, GPS jammer, video jammer, Bluetooth jammer, RF signal jammer, porperty security system, loss warning system

Machine Security System

Machine Security System
An Equipment Theft Deterrent System

"Why bother to track your equipment after it's been stolen… Protect it from being stolen with MSS"

You can protect all of your Cat and competitive equipment against theft with Machine Security System (MSS).This Caterpillar®designed system guards against theft by disabling machine operation and starting system when a potential thief is attempting to steal your equipment. Only your MSS key will allow the machine to be operated. MSS is Cat designed and provides superior protection when compared to aftermarket systems.

Customer Benefits


Protects from theft

Integrated into machine electrical system

12 and 24 volt system operation

Available as field retrofit kit and as an attachment on new machines

Easily installed on Cat and competitive equipment

Potential insurance savings