SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
MForce is a multi-modal biometric platform that can be deployed through fixed, portable and mobile devices to
deliver a number of benefits to organisations working in remote, expansive or hostile environments.
Using Iris, Finger and Face biometrics integrated with the ability to register DNA details and latent fingerprint
images, MForce can allow rapid and mass enrolment and identification processes to take place. This aids in a
variety of tasks which in the past have been labour and cost intensive and in some ways impractical due to
geographic conditions.
This includes allowing access security to be maintained across large, mobile and complex sites. Payments to be
made to employees such as military personnel or humanitarian workers who may be spread across huge areas and
maintain no fixed position as well as managing their qualifications and assets where relevant.
MForce also integrates a key advancement in latent fingerprint identification; our system implements a ‘lights out’
latent solution which enables untrained personnel to carry out automatic forensic imaging and enrolling of
fingerprints on board the system. This not only saves time and money enabling trained individuals to process
forensic evidence in the field more rapidly but also empowering others to perform latent matching. This is vital in
disaster victim identification following humanitarian or natural disasters where Governmental Organisation and
NGOs may have to aid in the identification and tracking of missing and displaced persons.
CAPABILITIES
Mass Enrolment and Identifications
Access Control
Latent Fingerprint Imaging
Watchlist Database Matching
Payroll
Record Tracing
Disaster Victim Identification (DVI)
Military
Law Enforcement
Humanitarian and Disaster Support
National Security
Boarder Control
Forensic Identification
www.hrsid.com
Rapid identification
Providing actionable intelligence to the operator through fast and
positive identification of individuals
Multi-modal biometric authentication
A complete Finger, Face and Iris identification platform in a single and
modular solution integrated within robust and easy to use devices
Mobility
A complete biometric enrolment, identification and management
system in a mobile and robust format
Enables complicated forensic latent fingerprints to be scanned by untrained
operators
Simple user interface extends across technical and language barriers
Multimodal biometric capability ensures that you can make accurate
identifications at a 1:n level
Suite of editions and modules ensures the system develops as your
operational requirements do
Provides rapid registration and identification in the field
Robust and resilient system providing operation in rugged and remote
environments
Enables the development and matching of watchlists against iris, fingerprints
and latent images
DETECTDETECT
Mobile Enrolment &
Identification
Individuals biometrics are recorded
at the scene of events or vehicle
check points and real-time watch
lists are checked for wanted or
known individuals.
PROTECTPROTECT
Payroll
Biometrics are used to identify
individuals mapping key biometric
and biographic data with current
locations and skills to ensure
payments are made to the right
people where ever they are.
DETECTDETECT
Latent Print Lifting
Latent images are collected from
crime scenes and uploaded to
mobile devices for processing,
analysis and distribution to watch
lists.
PROTECTPROTECTT
Disaster Victim
Identification
Latent images and live biometrics
can be enroled and matched
against existing databases to track
and locate casualties or displaced
persons following disasters.
??
Intelligence
COLLECT
ANALYSE
FUSE
DISTRIBUTE
WATCH
LIST
SAFE
LIST
PROTECTPROTECT
Static Enrolment &
Identification
Military personnel and approved
contractors are enrolled and
identified in a blast-proof cabin.
TEL 0151 254 2888 EMAIL sales@hrsid.com WEB www.hrsid.com
1st Floor, Building 2000, Vortex Court, Enterprise Way,
Wavertree Technology Park, Liverpool L13 1FB
Winners 2010

Contenu connexe

En vedette

防止電腦手
防止電腦手防止電腦手
防止電腦手honan4108
 
II Cc Secretarias - Praticas De Sucesso - Agenda
II Cc Secretarias - Praticas De Sucesso - AgendaII Cc Secretarias - Praticas De Sucesso - Agenda
II Cc Secretarias - Praticas De Sucesso - AgendaGustavo Oliveira
 
Leveraging Technology - Winter 2008 Week 6
Leveraging Technology - Winter 2008 Week 6Leveraging Technology - Winter 2008 Week 6
Leveraging Technology - Winter 2008 Week 6H3 HR Advisors, Inc.
 
Steve Boese - Digital Transformation and the Future of Talent
Steve Boese - Digital Transformation and the Future of TalentSteve Boese - Digital Transformation and the Future of Talent
Steve Boese - Digital Transformation and the Future of TalentH3 HR Advisors, Inc.
 

En vedette (7)

Baking
BakingBaking
Baking
 
防止電腦手
防止電腦手防止電腦手
防止電腦手
 
Sigo En Pie
Sigo En PieSigo En Pie
Sigo En Pie
 
II Cc Secretarias - Praticas De Sucesso - Agenda
II Cc Secretarias - Praticas De Sucesso - AgendaII Cc Secretarias - Praticas De Sucesso - Agenda
II Cc Secretarias - Praticas De Sucesso - Agenda
 
Leveraging Technology - Winter 2008 Week 6
Leveraging Technology - Winter 2008 Week 6Leveraging Technology - Winter 2008 Week 6
Leveraging Technology - Winter 2008 Week 6
 
Steve Boese - Digital Transformation and the Future of Talent
Steve Boese - Digital Transformation and the Future of TalentSteve Boese - Digital Transformation and the Future of Talent
Steve Boese - Digital Transformation and the Future of Talent
 
Angelo Po Gamma
Angelo Po GammaAngelo Po Gamma
Angelo Po Gamma
 

Similaire à Mforce solution

karsof systems biometrics brochure
karsof systems biometrics brochurekarsof systems biometrics brochure
karsof systems biometrics brochureColin Valencia
 
NEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal AgenciesNEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal AgenciesInteractiveNEC
 
Progressive Web Apps PWAs.pptx
Progressive Web Apps PWAs.pptxProgressive Web Apps PWAs.pptx
Progressive Web Apps PWAs.pptxanupamas0191
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3DigitalPersona
 
DAELIBS for Security Service Providers
DAELIBS for Security Service ProvidersDAELIBS for Security Service Providers
DAELIBS for Security Service ProvidersMichael Jones
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationIRJET Journal
 
Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisisPrime Infoserv
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 
Horizon_Brochure
Horizon_BrochureHorizon_Brochure
Horizon_BrochureOmar Tarish
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyVASCO Data Security
 
Connected Platform for Contact Tracing
Connected Platform for Contact TracingConnected Platform for Contact Tracing
Connected Platform for Contact TracingInsight
 
Connected Platform for Contact Tracing
Connected Platform for Contact TracingConnected Platform for Contact Tracing
Connected Platform for Contact TracingInsight
 
Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...
Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...
Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...Tensor Plc .
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)IAMCP Canada
 
karsof systems publication
karsof systems publicationkarsof systems publication
karsof systems publicationColin Valencia
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
karsof systems brochure
karsof systems brochurekarsof systems brochure
karsof systems brochureColin Valencia
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 

Similaire à Mforce solution (20)

karsof systems biometrics brochure
karsof systems biometrics brochurekarsof systems biometrics brochure
karsof systems biometrics brochure
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
NEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal AgenciesNEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal Agencies
 
Progressive Web Apps PWAs.pptx
Progressive Web Apps PWAs.pptxProgressive Web Apps PWAs.pptx
Progressive Web Apps PWAs.pptx
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
DAELIBS for Security Service Providers
DAELIBS for Security Service ProvidersDAELIBS for Security Service Providers
DAELIBS for Security Service Providers
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
Usher overview.2014.02 hi
Usher overview.2014.02 hiUsher overview.2014.02 hi
Usher overview.2014.02 hi
 
Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisis
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
Horizon_Brochure
Horizon_BrochureHorizon_Brochure
Horizon_Brochure
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
Connected Platform for Contact Tracing
Connected Platform for Contact TracingConnected Platform for Contact Tracing
Connected Platform for Contact Tracing
 
Connected Platform for Contact Tracing
Connected Platform for Contact TracingConnected Platform for Contact Tracing
Connected Platform for Contact Tracing
 
Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...
Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...
Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)
 
karsof systems publication
karsof systems publicationkarsof systems publication
karsof systems publication
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
karsof systems brochure
karsof systems brochurekarsof systems brochure
karsof systems brochure
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 

Dernier

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Mforce solution

  • 1.
  • 2. MForce is a multi-modal biometric platform that can be deployed through fixed, portable and mobile devices to deliver a number of benefits to organisations working in remote, expansive or hostile environments. Using Iris, Finger and Face biometrics integrated with the ability to register DNA details and latent fingerprint images, MForce can allow rapid and mass enrolment and identification processes to take place. This aids in a variety of tasks which in the past have been labour and cost intensive and in some ways impractical due to geographic conditions. This includes allowing access security to be maintained across large, mobile and complex sites. Payments to be made to employees such as military personnel or humanitarian workers who may be spread across huge areas and maintain no fixed position as well as managing their qualifications and assets where relevant. MForce also integrates a key advancement in latent fingerprint identification; our system implements a ‘lights out’ latent solution which enables untrained personnel to carry out automatic forensic imaging and enrolling of fingerprints on board the system. This not only saves time and money enabling trained individuals to process forensic evidence in the field more rapidly but also empowering others to perform latent matching. This is vital in disaster victim identification following humanitarian or natural disasters where Governmental Organisation and NGOs may have to aid in the identification and tracking of missing and displaced persons. CAPABILITIES Mass Enrolment and Identifications Access Control Latent Fingerprint Imaging Watchlist Database Matching Payroll Record Tracing Disaster Victim Identification (DVI) Military Law Enforcement Humanitarian and Disaster Support National Security Boarder Control Forensic Identification
  • 3. www.hrsid.com Rapid identification Providing actionable intelligence to the operator through fast and positive identification of individuals Multi-modal biometric authentication A complete Finger, Face and Iris identification platform in a single and modular solution integrated within robust and easy to use devices Mobility A complete biometric enrolment, identification and management system in a mobile and robust format Enables complicated forensic latent fingerprints to be scanned by untrained operators Simple user interface extends across technical and language barriers Multimodal biometric capability ensures that you can make accurate identifications at a 1:n level Suite of editions and modules ensures the system develops as your operational requirements do Provides rapid registration and identification in the field Robust and resilient system providing operation in rugged and remote environments Enables the development and matching of watchlists against iris, fingerprints and latent images DETECTDETECT Mobile Enrolment & Identification Individuals biometrics are recorded at the scene of events or vehicle check points and real-time watch lists are checked for wanted or known individuals. PROTECTPROTECT Payroll Biometrics are used to identify individuals mapping key biometric and biographic data with current locations and skills to ensure payments are made to the right people where ever they are. DETECTDETECT Latent Print Lifting Latent images are collected from crime scenes and uploaded to mobile devices for processing, analysis and distribution to watch lists. PROTECTPROTECTT Disaster Victim Identification Latent images and live biometrics can be enroled and matched against existing databases to track and locate casualties or displaced persons following disasters. ?? Intelligence COLLECT ANALYSE FUSE DISTRIBUTE WATCH LIST SAFE LIST PROTECTPROTECT Static Enrolment & Identification Military personnel and approved contractors are enrolled and identified in a blast-proof cabin.
  • 4. TEL 0151 254 2888 EMAIL sales@hrsid.com WEB www.hrsid.com 1st Floor, Building 2000, Vortex Court, Enterprise Way, Wavertree Technology Park, Liverpool L13 1FB Winners 2010