Technology and Equipment Portfolio

Best-in-class technology for when you are out in the field

Dell Latitude 7230 Rugged Tablet

Tested for every condition

  • Drop-tested from up to 4 feet.
  • Temperatures up to 63°C/145°F are no sweat.
  • Works in -29ºC/-20ºF weather.
  • IP-65 rated for maximum protection against dust, dirt, and water ingress.

Axon 3 Bodycam

Key Features

  • Multi-Mic audio.
  • Ironclad Security.
  • Reduced Motion Blur.

CJIS Level 4 Security Awareness

Our engineers have attained Criminal Justice Information Services (CJIS) Level 4 Security Awareness Certification.

The purpose of this certification is to make all users with authorized access to Criminal Justice systems and data-aware of their individual responsibilities and expected behavior.

Security Awareness Training Level 4 is designed for all information technology personnel including system administrators, network administrators, etc.

Managed Backup and Disaster Recovery

Cloud-Based Disaster Recovery offers many advantages over traditional methods.

Local Backup

We backup your systems and data to a local backup device using either your existing backup software or our software.

Duplication and redundancy are removed from your backup data, compressed, if enabled encrypted, and stored on your local backup device.

Cloud Backup

Your backup is replicated to our cloud where it is compressed; duplication and redundancy are removed; and is encrypted if enabled; all before being transmitted to our secure facility.

Disaster Recovery

When you declare a disaster, we recover your most critical systems from your cloud backup and provide access for your users. Your backup service is fully tested annually to ensure that you can recover when you need to.

Cyber Recovery Services

Dell Cyber Recovery – Market-leading protection against Ransomware attacks


Physical and logical separation of data within an air-gapped vault.


Preserve data integrity and confidentiality with layers of security and controls.


Machine learning and analytics help ensure recoverability.

How PowerProtect Cyber Recover Works