Tamoco utilized HID Trusted Tag Services to provide film lovers with the ability to use their Near Field Communications (NFC) enabled smartphone to receive Tribeca Film Festival tickets.
Getting back to the tranquility of nature without the buzzing sounds of small flying objects.
- By Ginger Hill
- May 05, 2014
Banks worldwide are putting biometrics at the front end using fingerprint authentication.
- By Bill Spence
- May 05, 2014
Engaging on Twitter leads to discover of app to help parents keep their children safe via open communication and allowing the child to be an advocate for their own safety.
- By Ginger Hill
- May 01, 2014
The staff at Security Products and Security Today wish all the winners a huge congratulations.
World Vision Mexico Receives the Donation of US $10,000.
9th annual Milestone Systems Milestone Integration Platform Symposium (MIPS) partner conference in the Americas recognizes company for their support of Milestone XProtect and Arcus software.
Founded in 1983, Fort McDowell Casino in Arizona doesn’t take security lightly. Their security system has undergone a number of transitions over the years to aid in protecting 128,000 square foot of slot machines, 18 blackjack tables, 20 poker tables, a 1,800-seat bingo hall and a golf course.
- By Jamie Friedlander
- May 01, 2014
Philosophical and physical shifts in intelligence and management at the edge are remaking corporate networks.
- By Vince Ricco
- May 01, 2014
Ensuring the safety and security of patients and employees is critical to healthcare organizations of any size. For larger facilities, the task can seem monumental, leading many in the industry to turn to IP network surveillance technology to help take control of the process.
- By Greg Peratt
- May 01, 2014
With employees and physicians totaling more than 6,000, Baptist Health Care Network is the largest, non-governmental employer in northwest Florida.
- By Ben Scaglione
- May 01, 2014
“Banks Heap Suits on Target over Breach,” read a recent headline of a Wall Street Journal story. By that time, seven financial institutions had already filed class action suits against the retail giant alleging it did not sufficiently protect its customer’s data.
- By David Rizzo
- May 01, 2014
When UCF began planning an upgrade to their security solution—standalone,
battery-operated access control that did not provide the level of security
needed and a variety of small, analog video systems dispersed throughout multiple
campuses
- By Brent Doherty
- May 01, 2014
As access control systems have become more prevalent in business environments, companies are looking to leverage this technology to deliver additional solutions at less expensive costs.
- By Gerald McHugh
- May 01, 2014
Museums are complicated for security professionals. They must be open and welcoming to the public, but they often have quiet nooks and crannies where patrons sit and ponder the art and human endeavor on display.
- By Vicki Contavespi
- May 01, 2014
As the sophistication of the security industry evolves daily, companies are honing their partner loyalty programs to assist integrators in all aspects of the industry.
- By Ginger Hill
- May 01, 2014
When most people consider cybersecurity, they think about protecting the information that resides on their computers—sensitive emails, folders or files.
- By Mauricio Chacon
- May 01, 2014
While an alarm system can’t protect your customers from everything, it is a proven measure of deterrence. Homes with alarm systems are three times less likely to get burglarized than homes without them.
- By Rob Phillips
- May 01, 2014
Datacenter traffic is predicted to triple by 2017 with the cloud as the biggest traffic source, according to a recent Cisco Global Cloud Index study.
- By Charles P. Williams
- May 01, 2014
There is no telling what an appetite for success and a passion for technology will produce. One thing for certain, the desire to give the customer the best security solution possible will likely bear a long-term, winning combination.
- By Ralph C. Jensen
- May 01, 2014
ISC West is a premier venue for technology and what’s new in the industry. Three products stand out in my mind. The first is a consumer product from FLIR that was introduced during the Consumer Electronics Show in January.
- By Ralph C. Jensen
- May 01, 2014
Paris has the Eiffel Tower; New York has the Empire State building; Sydney has its Opera House; Rome has the Coliseum; and London has the London Eye, a well-known symbol for an extraordinary city.
- By Chris Maras
- May 01, 2014
While most organizations have developed highly sophisticated, comprehensive emergency plans, they are often lacking the communication vehicle to meaningfully convey them and make them accessible to a wide audience before, during and after an event. Mobile devices provide a simple, efficient and secure channel to proactively get the most up-to-date plans and best practices into the right hands and mitigate overall risk.
- By Christopher Britton
- Apr 30, 2014
Developer and manufacturer of long-range industrial wireless Ethernet radios embraces 10 years of business success.
Shocking results of a two-year security study of a healthcare network revealed via weak passwords, lack of authentication and embedded web servers.
- By Ginger Hill
- Apr 29, 2014
Identity management company innovates with a REST API for directories - now available for download.
Heartbleed scanner identifies over 1,700 vulnerable mobile apps.
When pursuing malware prevention solutions for your customers, it is key to look at solutions that not only prevent the malware, but also focus on removing the malware. Customers will continue to browse to specific sites and access infected content, whether they know they are doing it or not. Because of this, it’s critical to have both a solution that can continue to remove malicious content as well as alert users to potentially suspicious web sites.
- By Eileen Turner
- Apr 25, 2014
196 page catalog is easily accessible via smart phone, computer or tablet and includes all five NACE brand product lines.
Security cameras yanked from exterior of businesses with rope; are the suspects setting these businesses up for something worse? (Video included)
- By Ginger Hill
- Apr 24, 2014