With over 15 years of hands-on, loss prevention (LP) experience in the retail sector, St. Clair will oversee sales activities of USS LP solutions including electronic article surveillance (EAS) and closed-circuit television (CCTV) products, systems and service in the Southeastern United States.
For the first time since the 9/11 terror attacks, airline passengers will be allowed to have small knives and some previously prohibited sports equipment as carry-on items.
New Director of North American Sales for Vector Security, David Williams brings a sense of strong leadership.
We are in the heart of tax season, and unfortunately, numerous tax scams are running rampant. Here are some tips to help ensure that your tax information is kept safe and out of the hands of potential scammers.
The increasing demands put on networks by mobile devices and bring-your-own-device programs, virtualization and private clouds, and the transition to IPv6 have created greater complexity and risk for IT teams to manage.
Security-Net, a provider of security integration services, held its annual shareholders meeting in late January at the Newport Beach Marriott Hotel and Spa in Newport Beach, Calif., marking the organization’s 20th anniversary.
IP video surveillance delivers unmatched image quality and usability to aid in protecting patients and staff.
GovSec has everything you need to keep up-to-date on the latest trends, improve your job skills and make budget-conscious, spending decisions.
HC-3 provides seamless interoperability for VMware Horizon View, Samsung, Teradici and Imprivata OneSign on Pivot3's vSTAC VDI appliances.
This year, TREXPO is joining forces with GovSec– the Government Security Conference and Expo – to bring together leaders in law enforcement, military, security and federal agencies in a single location.
According to Tim ‘TK’ Keanini, chief research officer for nCircle, the public perception of the country with the most-advanced, nation-state, cyber attack capabilities has clearly been shaped by recent media coverage.
University selected NLSS Gateway to help take a proactive stance with security operations.
Roy Spence, marketing maven, to inspire and enlighten on the importance of what businesses stand for and about the purpose that drives us.
HID Global's dedication to building a stronger, Latin American presence reinforces the company's genuine commitment to customer satisfaction as well as to delivering a more comprehensive portfolio of secure identity solutions.
Border checkpoints can’t afford to cut technologies or staff to reduce their footprint because doing so could allow dangerous materials, contraband or even outright threats to enter the country unchecked.
- By Andrew Goldsmith
- Mar 04, 2013
Airports have broken the analog barrier. No longer are airport directors and security executives arguing the merits of analog vs. IP. Here is what airport leaders have been saying and, more importantly, doing.
- By Anthony Incorvati
- Mar 01, 2013
SentryCon 2013, the 18th Annual Dealer Conference, will be held in Mobile, Alabama, April 17th-18th.
IndigoVision is delighted to announce the addition of Sean Thompson as Canadian Sales Director.
The Bais Yaakov School for Girls (BYLA), has been a proactive leader in the arena of school access security, taking some serious, ongoing steps to harden security on their campus.
The fast-growing company for the security, datacom, telecom and electrical wiring markets has strengthened its distribution support.
The effectiveness of access control really comes down to local decisions made at each door. However, enterprise systems are deployed and managed on a global scale, which presents a challenge of how to manage all those local access control decisions efficiently and effectively.
Selecting an enterprise security system is a little bit like buying a car. When buying a car, you choose the make and model of the vehicle, you choose tires made by a well-known manufacturer and recommended for the vehicle, and an audio system probably by a manufacturer outside the automotive industry. This way, you can get the best-of-breed approach.
- By Ralph C. Jensen
- Mar 01, 2013
As prices fall and capabilities increase, new applications are emerging that leverage the advantages offered by thermal technology for securing outdoor assets. The result is a market tipping point for thermal cameras and an opportunity to use the best detection technology available for costs that meet or beat less-effective approaches.
- By John Romanowich
- Mar 01, 2013
Building owners have found that integrating an elevator destination control system with its security management system enhances these benefits for tenants because they can use their credential for both access control and elevator access, but careful planning is a must to ensure cost effectiveness.
- By Kim Rahfaldt
- Mar 01, 2013
PoE is redefining how security professionals design and deploy systems. Rather than using the standard type of power supplies, integrators are increasingly employing PoE network switches or incorporating PoE midspan devices that inject power into an Ethernet cable after it leaves the switch and before it reaches the network device.
- By Ronnie Pennington
- Mar 01, 2013
On June 1, 2012, the California Department of Parks and Recreation (CDPR), in connection with various partner agencies, began a six-month construction project to restore wetland function within Malibu Lagoon State Park.
- By Ian Johnston
- Mar 01, 2013
System design and equipment choices designed to protect key assets have never been more diverse. IP-based systems offer many advantages for capturing and transmitting high-quality HD images via the Internet or a LAN connection for remote monitoring.
- By Chuck Westfall
- Mar 01, 2013
Today’s biometrics systems are moving identity authentication toward real time, accurate and secure, individual ID based on unique biometric characteristics, including iris patterns, fingerprint minutiae, facial structure or voice.
- By Milind Borkar
- Mar 01, 2013
RMON provides its administrator the capability to monitor, analyze and troubleshoot a multitude of security threats from a distance. Keywords: from a distance— what’s the point of security if you have to put yourself in harm’s way?
- By Joseph Goudlock
- Mar 01, 2013
The PEC works by singling out any pedestrians attempting access without proper credentials.
- By Mike McGovern
- Mar 01, 2013