Simply employing the most basic of information security rules will make you and your business more safe and secure.
he alarms act as a personal security device and emit a loud noise when triggered.
- By Sydny Shepard
- Dec 05, 2018
The names, email addresses and passwords of 100 million users of Quora have been made vulnerable.
- By Sydny Shepard
- Dec 05, 2018
The document says the Secret Service contacted three other vendors, but none were able to “provide the expertise in manufacturing lapel emblems with any type of security technology features.”
- By Jessica Davis
- Dec 04, 2018
"The company has not finished identifying duplicate information in the database, but believes it contains information on up to approximately 500 million guests who made a reservation at a Starwood property," Marriott said in a statement.
- By Jessica Davis
- Dec 04, 2018
Around the world, the shipping and logistics industry has experienced immense operational growth and development.
- By Marc Murphy
- Dec 01, 2018
What technology and industry trends should you keep an eye out for to stay ahead of the pack? In short, complex analytics are growing hotter which is made possible by the trend towards GPU co-processing.
- By Brian Carle
- Dec 01, 2018
Smart city initiatives are growing across the globe, as leaders look to increase security and intelligence across metropolitan environments.
- By Brandon Reich
- Dec 01, 2018
Hardware Security Modules, or HSMs, protect against insider and external threats by delivering confidentiality for encryption keys in a physically hardened appliance.
- By Anand Kashyap
- Dec 01, 2018
Hopemate is a small IT service provider located in the Greater Vancouver, Canada, area that brings IT support to small businesses in its community.
- By Richard Jonker
- Dec 01, 2018
Technological advancements are resulting in trends and movements that improve the quality of life and business.
- By Abhishek Iyer
- Dec 01, 2018
It’s no secret Americans like to shop online. A marketing survey showed 40 percent of U.S. internet users made purchases several times a month in 2017.
- By Dana Pruiett
- Dec 01, 2018
After spending close to 20 years in the security industry, it is always a good exercise to see what projections came through the last year and which ones we foresee in the coming years.
- By Fredrik Nilsson
- Dec 01, 2018
Since North American Video (NAV) was founded in 1995, the systems integrator has continued to build an outstanding reputation in the physical security market.
- By Ralph C. Jensen
- Dec 01, 2018
In the dealer/integrator business, recurring monthly revenue (RMR) is like finding a gold mine with several profitable veins that can be mined. RMR is an attractive means for a secondary revenue stream.
- By Ralph C. Jensen
- Dec 01, 2018
No one will argue that the network has been one of the greatest evolutions in time. Think of it, everything that you used to do by hand, you can now do via computer. Well, almost everything.
- By Ralph C. Jensen
- Dec 01, 2018
In the professional security market, the model for revenue is changing. Systems integrators are looking for revenue beyond basic sales and maintenance—especially customer-oriented addons to generate recurring monthly revenues (RMR).
- By Bud Broomhead
- Dec 01, 2018
Thanks to wireless lock technologies, cloud-based software, and smartphone/tablet integration, it is now possible to deploy a secure, manageable, and cost-effective security solution without the need for complicated and expensive infrastructure.
- By Peter Boriskin
- Dec 01, 2018
Video surveillance has dramatically changed in recent decades. Open, IP-based network technology has largely replaced the closed, proprietary world that long dominated the security industry.
- By Jeff Whitney
- Dec 01, 2018
Before installing a networked, open-platform, VMS solution, the Port of Antwerp had a standalone DVR system with no networking capabilities and no open platform support, meaning only a limited number of camera brands were supported.
- By Courtney Dillon Pedersen
- Dec 01, 2018
When it comes to access control, it all boils down to companies trying to determine whether you are who you say you are, and whether you are authorized to access certain information. As we all know, both those are tall orders to fill.
- By Jeff Capone
- Dec 01, 2018
Radar may not be the first technology that comes to mind when discussing perimeter protection, but that is all beginning to change.
- By Gadi Bar-Ner
- Dec 01, 2018
My, how times are changing the way we do business… in the publishing industry. Without going back to the details of yesteryear, the manner in which a publication is produced has changed from cut and paste, to the digital version of today.
- By Ralph C. Jensen
- Dec 01, 2018
We live in a world where computer hacking, data breaches, identity theft, and stolen records of all sizes have become worldwide events that can happen at any time.
- By Ruben Lugo
- Dec 01, 2018
The coffee chain says hackers might have accessed customer info through a data breach.
- By Sydny Shepard
- Nov 30, 2018
Legacy endpoint prevention and protection solutions are limited when faced with advanced and sophisticated threats
- By Liviu Arsene
- Nov 30, 2018
The cameras are expected to cost about $30,000 and will be installed in about three months.
- By Sydny Shepard
- Nov 30, 2018