Just imagine unlocking your phone, buying apps and giving other apps permission to use your phone's fingerprint scanner for authentication.
- By Ginger Hill
- Jun 02, 2014
City uses modern tools to crack down on bike thievery enabling police officers to make on-the-spot arrests.
- By Ginger Hill
- Jun 02, 2014
Identification, emergency response, security solutions and on-site service provider expands Ohio customer base.
Analysis of Supply Chain – Information Sharing & Analysis Center Annual Report
- By Jack DeMao
- Jun 02, 2014
For the past three decades, video surveillance has proven itself beneficial in helping businesses reduce costs, stop losses and increase productivity. However, these systems either require additional manpower to monitor video feeds live, or are only used to review recorded video, after the fact.
Globally, air cargo security costs are estimated to be $8.5 billion annually as the focus on physical security best practices has increased dramatically since 9/11. In fact, in 2006, the vulnerability of air cargo security was exposed when a terrorist plot was foiled in Yemen.
- By Manish Dalal
- Jun 01, 2014
Located about 20 miles northwest of Newark, Livingston Public Schools serve almost 5,800 students with an instructional staff of 524 in its K-12 system.
- By April Noblitt
- Jun 01, 2014
When the new St. Luke’s Magic Valley Medical Center opened in 2011, it came complete with a top-of-the-line fire detection system that had been the focus of intense planning— and not just from engineers and designers.
- By Beth Welch
- Jun 01, 2014
When a successful European toy manufacturer outgrew its facilities, it built a new, three-facility campus that included an office along with manufacturing and warehouse space.
- By Susan Stanley
- Jun 01, 2014
Many hospitals are finding it necessary to increase the number of access controlled openings in their facilities.
- By Ann Geissler Timme
- Jun 01, 2014
Video analytics aren’t just tools for marketing and merchandising; these intelligent algorithms can also spot atypical customer behavior that might suggest potential loss activity when viewed by the Loss Prevention department.
- By Jackie Andersen
- Jun 01, 2014
It is a well-known fact that video surveillance cameras can help detect trespassers; however, if no one is looking at the surveillance or if the human element has not been notified of a breach, trespassing can leap to new heights.
- By Ralph C. Jensen
- Jun 01, 2014
Operating in the United Kingdom and America for over 30 years, surveillance technology company Dedicated Micros continues to innovate on a regular basis.
- By Jamie Friedlander
- Jun 01, 2014
It all started in Boston—a young, motivated inventor trying to meet the particular customer demand of a new electric strike design that could handle a 1-inch deadbolt.
- By Wendy Bowman
- Jun 01, 2014
Charges flied in Pennsylvania, marking the first time criminal charges have been filed against known state actors for hacking.
- By Ralph C. Jensen
- May 30, 2014
Streamlining the process to ensure a smooth transition whether a full-scale migration or just moving small amounts of data.
- By Sara Gates
- May 30, 2014
From strategic relationships manager to national account manager, Wood embraces her new position.
Addressing ways to increase security of workplace and business processes.
Biometrics distribution channel expanded in Europe with MTRIX, distributor with a focus on IT security and authentication solutions.
With almost 1600 students, sports teams, a music programs and acting troupe, loudspeakers are a must for this school, especially in case of an emergency.
A warm and humble good-bye given to Samsung, but no to the security industry as a whole.
- By Ralph C. Jensen
- May 28, 2014
Features a top latching mechanism that interlocks the door to the frame, and a clean design with just ¾” projection when inset in the door.
IQinVision donates half the project cameras, investing in critical science needs.
Families innocently display information that can give criminals as edge into committing the perfect crime.
- By Ginger Hill
- May 28, 2014
Wheat farmer pulls pipe bomb from bag, illustrating that government building security measures are failing. (Video Included)
- By Ginger Hill
- May 27, 2014
ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of fiber optic, wireless and copper transmission and networking equipment, has introduced the NetWave® NW8 wireless Ethernet link that is designed to support redundant ring and “Drop-and-Insert” functionality on a wireless network.
Typical of many cities and towns across the country who are facing challenges balancing the safety and security needs of its resident with the costs involved in providing a workable security solution, a small upstate New York town was facing the challenge of bringing back CCTV video, access control information an intrusion data from a sports recreation facility located about three quarters of a mile from the security center located in the town hall.
- By Skip Haight
- May 27, 2014
Too soon to determine if directives are the real reason for sources to clam up.
The dedication and hard work of 1,500 NFTA employees, along with law enforcement officials and security workers, ensure safety and security of passengers on busses, trains, paratransit vehicles and trolleys.
- By Ralph C. Jensen
- May 24, 2014
Understanding the difference and likenesses between data privacy, information security and confidentiality provides a rich tool set to protect information as long as the proper protection paradigm is applied.
- By Michelle Dennedy , Jonathan Fox , Thomas Finneran
- May 23, 2014