SlideShare a Scribd company logo
1 of 2
Download to read offline
Applications:
•	 Loss Prevention • Employee Safety
FocusScan enables targeted screening of
individuals, providing a detailed view of
any objects hidden under clothing. It is an
intuitive handheld, mobile platform that
leverages ISCON’s patented thermo
conductive infrared technology to
enhance safety and control loss.
Deterrence Solutions from ISCON
WHY ISCON?
FocusScan delivers high-resolution images
that allow users to enhance safety and reduce
loss while minimizing privacy concerns and
eliminating radiation exposure. It records
images securely for post-event investigative
purposes.
An intuitive touchscreen interface streamlines
usability, while the handheld platform also
features an embedded metal detector for
enhanced detection.
FocusScan is the first-ever IR-based handheld
imaging technology purpose-built for use in
loss prevention, security enhancement and
asset protection. Its handheld design allows
security personnel to quickly and easily
identify concealed objects, allowing a more
proactive approach to controlling loss and
increasing security.
TM
•Iscon Imaging, Inc. •155 New Boston St., Suite. P •Woburn, MA 01801 •www.isconimaging.com •+1 (781) 933 4127
FocusScanTM
Data Sheet
Diamonds
in Shirt Pocket
Phone Battery
in Pocket
Patent Pending
Dimensions:
Power Requirements:
Warranty:
Identified Contraband:
Operating Environment:
FocusScanTM
Handheld Imager
Many Challenges And One Solution
•Iscon Imaging, Inc. •155 New Boston St., Suite. P •Woburn, MA 01801 •www.isconimaging.com •+1 (781) 933 4127
Specifications
• Easy to use - point and shoot
•	 Touch screen controls
•	 Effective random spot checking
• No health issues
• Detects all types of materials
• Non-invasive, eliminates the need for
	 “pat-down” searches
• No consumables - low operating costs
Features
Length: 14” (356 mm)
Width: 7” (178 mm)
Height: 10.5” (267 mm)
Weight 4.5 lbs. (2 kg)
Supply Voltage: 100-125
VAC/4A; 200-240VAC/2A,;50-
60Hz
One Year, parts and labor
Explosives, narcotics, wood,
ceramics, metals , tobacco,
pharmaceuticals, rubber,
clothing, and more
Operating Temperature 0-35° C
(32-104°F) Humidity 0-95%,
Non-condensing
Box Cutter in
Rear Pocket
Key in
Pocket
Patent Pending

More Related Content

What's hot

IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
Orion Dating Mobile App Developed By Orion Infosolutions
Orion Dating Mobile App Developed By Orion InfosolutionsOrion Dating Mobile App Developed By Orion Infosolutions
Orion Dating Mobile App Developed By Orion InfosolutionsDC Kumawat
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesAdesh Singh
 
Iris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAEIris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAEArab Federation for Digital Economy
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System Sadan Khan
 
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksMobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksVladimir Jirasek
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
Biometric Authentication final
Biometric Authentication finalBiometric Authentication final
Biometric Authentication finalAshok Kuikel
 
Biometric System Penetration in Resource Constrained Mobile Device
Biometric System Penetration in Resource Constrained Mobile DeviceBiometric System Penetration in Resource Constrained Mobile Device
Biometric System Penetration in Resource Constrained Mobile Deviceijbbjournal
 
Top Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsTop Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsVeridium
 
Beyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
Beyond Touch ID: Mobile Fingerprinting & Advances in BiometricsBeyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
Beyond Touch ID: Mobile Fingerprinting & Advances in BiometricsVeridium
 
Report on Finger print sensor and its application
Report on Finger print sensor and its applicationReport on Finger print sensor and its application
Report on Finger print sensor and its applicationArnab Podder
 

What's hot (20)

Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Orion Dating Mobile App Developed By Orion Infosolutions
Orion Dating Mobile App Developed By Orion InfosolutionsOrion Dating Mobile App Developed By Orion Infosolutions
Orion Dating Mobile App Developed By Orion Infosolutions
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
Iris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAEIris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAE
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System
 
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksMobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risks
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
 
Iris Scan
Iris ScanIris Scan
Iris Scan
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometric Authentication final
Biometric Authentication finalBiometric Authentication final
Biometric Authentication final
 
Biometric System Penetration in Resource Constrained Mobile Device
Biometric System Penetration in Resource Constrained Mobile DeviceBiometric System Penetration in Resource Constrained Mobile Device
Biometric System Penetration in Resource Constrained Mobile Device
 
Top Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsTop Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & Rewards
 
Beyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
Beyond Touch ID: Mobile Fingerprinting & Advances in BiometricsBeyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
Beyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
 
Biometrics by ritesh
Biometrics by riteshBiometrics by ritesh
Biometrics by ritesh
 
Report on Finger print sensor and its application
Report on Finger print sensor and its applicationReport on Finger print sensor and its application
Report on Finger print sensor and its application
 

Similar to Iscon Imaging FocusScan Spec Sheet

Iscon Imaging Teaser Document - November 2016 - Final - 2
Iscon Imaging Teaser Document - November 2016 - Final - 2Iscon Imaging Teaser Document - November 2016 - Final - 2
Iscon Imaging Teaser Document - November 2016 - Final - 2Bill Gately
 
Progressive Web Apps PWAs.pptx
Progressive Web Apps PWAs.pptxProgressive Web Apps PWAs.pptx
Progressive Web Apps PWAs.pptxanupamas0191
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSSoftchoice Corporation
 
_The Latest Advancements in Spy Camera Detection Technology.pptx
_The Latest Advancements in Spy Camera Detection Technology.pptx_The Latest Advancements in Spy Camera Detection Technology.pptx
_The Latest Advancements in Spy Camera Detection Technology.pptxBloomlady
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksMighty Guides, Inc.
 
Eyes in the Sky_ Unraveling the Technology Behind Modern Security Cameras.docx
Eyes in the Sky_ Unraveling the Technology Behind Modern Security Cameras.docxEyes in the Sky_ Unraveling the Technology Behind Modern Security Cameras.docx
Eyes in the Sky_ Unraveling the Technology Behind Modern Security Cameras.docxehrhardtaidan
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Readerlissapenas123
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Javier Gonzalez
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint TechnologyQualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint TechnologyFIDO Alliance
 
Omniperception Capability Overview
Omniperception Capability OverviewOmniperception Capability Overview
Omniperception Capability OverviewCraig Howie
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copyevsrao
 
Walk Through Metal Detectors Your Ultimate Weapon in the Fight Against Unauth...
Walk Through Metal Detectors Your Ultimate Weapon in the Fight Against Unauth...Walk Through Metal Detectors Your Ultimate Weapon in the Fight Against Unauth...
Walk Through Metal Detectors Your Ultimate Weapon in the Fight Against Unauth...SecurityDetectionSol
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityMarketingArrowECS_CZ
 

Similar to Iscon Imaging FocusScan Spec Sheet (20)

Iscon Imaging Teaser Document - November 2016 - Final - 2
Iscon Imaging Teaser Document - November 2016 - Final - 2Iscon Imaging Teaser Document - November 2016 - Final - 2
Iscon Imaging Teaser Document - November 2016 - Final - 2
 
Progressive Web Apps PWAs.pptx
Progressive Web Apps PWAs.pptxProgressive Web Apps PWAs.pptx
Progressive Web Apps PWAs.pptx
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMS
 
_The Latest Advancements in Spy Camera Detection Technology.pptx
_The Latest Advancements in Spy Camera Detection Technology.pptx_The Latest Advancements in Spy Camera Detection Technology.pptx
_The Latest Advancements in Spy Camera Detection Technology.pptx
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
 
Eyes in the Sky_ Unraveling the Technology Behind Modern Security Cameras.docx
Eyes in the Sky_ Unraveling the Technology Behind Modern Security Cameras.docxEyes in the Sky_ Unraveling the Technology Behind Modern Security Cameras.docx
Eyes in the Sky_ Unraveling the Technology Behind Modern Security Cameras.docx
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Reader
 
Whitepaper perimeter protection
Whitepaper perimeter protectionWhitepaper perimeter protection
Whitepaper perimeter protection
 
Mmw
MmwMmw
Mmw
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint TechnologyQualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
 
Omniperception Capability Overview
Omniperception Capability OverviewOmniperception Capability Overview
Omniperception Capability Overview
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copy
 
Walk Through Metal Detectors Your Ultimate Weapon in the Fight Against Unauth...
Walk Through Metal Detectors Your Ultimate Weapon in the Fight Against Unauth...Walk Through Metal Detectors Your Ultimate Weapon in the Fight Against Unauth...
Walk Through Metal Detectors Your Ultimate Weapon in the Fight Against Unauth...
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 
Bank security
Bank securityBank security
Bank security
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 

Iscon Imaging FocusScan Spec Sheet

  • 1. Applications: • Loss Prevention • Employee Safety FocusScan enables targeted screening of individuals, providing a detailed view of any objects hidden under clothing. It is an intuitive handheld, mobile platform that leverages ISCON’s patented thermo conductive infrared technology to enhance safety and control loss. Deterrence Solutions from ISCON WHY ISCON? FocusScan delivers high-resolution images that allow users to enhance safety and reduce loss while minimizing privacy concerns and eliminating radiation exposure. It records images securely for post-event investigative purposes. An intuitive touchscreen interface streamlines usability, while the handheld platform also features an embedded metal detector for enhanced detection. FocusScan is the first-ever IR-based handheld imaging technology purpose-built for use in loss prevention, security enhancement and asset protection. Its handheld design allows security personnel to quickly and easily identify concealed objects, allowing a more proactive approach to controlling loss and increasing security. TM •Iscon Imaging, Inc. •155 New Boston St., Suite. P •Woburn, MA 01801 •www.isconimaging.com •+1 (781) 933 4127 FocusScanTM Data Sheet Diamonds in Shirt Pocket Phone Battery in Pocket Patent Pending
  • 2. Dimensions: Power Requirements: Warranty: Identified Contraband: Operating Environment: FocusScanTM Handheld Imager Many Challenges And One Solution •Iscon Imaging, Inc. •155 New Boston St., Suite. P •Woburn, MA 01801 •www.isconimaging.com •+1 (781) 933 4127 Specifications • Easy to use - point and shoot • Touch screen controls • Effective random spot checking • No health issues • Detects all types of materials • Non-invasive, eliminates the need for “pat-down” searches • No consumables - low operating costs Features Length: 14” (356 mm) Width: 7” (178 mm) Height: 10.5” (267 mm) Weight 4.5 lbs. (2 kg) Supply Voltage: 100-125 VAC/4A; 200-240VAC/2A,;50- 60Hz One Year, parts and labor Explosives, narcotics, wood, ceramics, metals , tobacco, pharmaceuticals, rubber, clothing, and more Operating Temperature 0-35° C (32-104°F) Humidity 0-95%, Non-condensing Box Cutter in Rear Pocket Key in Pocket Patent Pending