In Sunnyvale, CA, Bitzer Mobile Inc. launched Bitzer Enterprise Application Mobility (BEAM) 2.2 for tablets and smart phones, which provides the capability for Bring Your Own Device (BYOD) and Corporate Owned Personally Enabled (COPE) environments.
As accessible as ATMs are, there are several key tips to keep in mind to ensure you and your bank account's safety and security.
- By Tyler Thurston
- Oct 12, 2012
GovSec West, CPM East and the Education Security Conference wrapped up Thursday at the Gaylord Texan resort in Dallas.
One does not necessarily think “security” at the mention of former Dallas Cowboys fullback Daryl “Moose” Johnston’s name (unless, of course, it’s the special type of security he provided by blocking for Emmitt Smith during the mid-1990s when the team won three Super Bowls in four seasons and Smith was on his way to becoming the all-time NFL rushing leader), but the insights on leadership and team building the former No. 48 imparted Wednesday to an audience of security professionals attending the morning keynote reception for day two of GovSec West 2012 were right on target in keeping with the convention’s theme of “Teamwork.”
- By Ronnie Rittenberry
- Oct 11, 2012
The LAPD faces distinct challenges as space shuttle Endeavour makes final trip through downtown Los Angeles.
- By Tyler Thurston
- Oct 11, 2012
Verint Systems Inc. recently announced that a leading financial services institution is implementing its Nextiva Financial IP Video suite, including the Nextiva EdgeVR versatile network video recorders, Nextiva S5000 series IP cameras, and Nextiva Vid-Center and Nextiva Op-Center video management and viewing software. The organization will use the comprehensive solution across its U.S.-based retail branch locations and corporate facilities.
In preparation for National Fire Prevention Week, which begins on October 7, the American Red Cross is offering fire prevention tips, ensuring you and your family can stay free from harm’s way.
- By Tyler Thurston
- Oct 04, 2012
Motivated by the compelling logic that video security systems need top quality, perfectly matched hardware and software components to achieve optimum system performance, Geutebruck is launching a variety of new products all perfectly attuned to its system world.
ASSA ABLOY, provider of door opening solutions will showcase their world-class Aperio wireless lock technology for complementing access control systems at the SECURITY exhibition Essen.
Security Essen is the international meeting place for solutions relating to everything to do with civil security: At the 20th global fair for security and fire protection technology, more than 39,000 trade visitors from 115 countries obtained information from 1,086 exhibitors from 40 nations.
After all is said and done with Security Essen, the market every one wants to play in is North America. Some of the problem is, companies aren’t sure how to get into the market if they’re not already here.
- By Ralph C. Jensen
- Oct 02, 2012
UT Dallas computer scientists have developed a technique to automatically allow one computer in a virtual network to monitor another for intrusions, viruses or anything else that could cause a computer to malfunction.
Whether for a weekend getaway or a business conference, a meeting or a round of golf, taking in the entertainment or trying your luck at the slots or card tables, the 4-star family-friendly Hard Rock Hotel & Casino Albuquerque is dedicated to offering its guests a pleasant stay with amenities including a full service spa. The security for the property and guests is no exception. One of the most secure properties in Albuquerque, the Hard Rock Hotel & Casino on the Isleta Pueblo Indian Reservation south of Albuquerque, decided earlier this year to further enhance the protection offered by upgrading its security video surveillance system. Calling for bids, the hotel and casino wanted advice and estimates to upgrade the security surveillance system.
There were dreams and promises of Minority Report-like video intelligence that could predict a crime before it happened. Fortunately, industry expectations have come back down to earth, and we’ve learned some valuable lessons along the way.
- By Robert Muehlbauer
- Oct 01, 2012
More government agencies are taking their physical access control system (PACS) to the cloud, and it’s easy to see why.
- By Kevin Kozlowski
- Oct 01, 2012
The individual cash pay-outs might be small, but for Texas Title Loans—a chain of 14 short-term loan shops stretching from Dallas to San Antonio—keeping an eye on the till was creating big problems.
- By Matt Krebs
- Oct 01, 2012
Rob Hile’s security career started somewhat quietly, in sales and business development with a leading manufacturer of HVAC controls and security platforms.
- By Ralph C. Jensen
- Oct 01, 2012
It would be hard to dispute that the banking industry has an enormous stake in security operations. In fact, other than the government, the financial services industry is considered one of the top spenders for worldwide security solutions.
- By Ralph C. Jensen
- Oct 01, 2012
The ADT Corp. returned today to the public equity markets as an independent company after completing its spinoff from Tyco International Ltd.
The city of Selma, Ala., seamlessly manages a high-definition surveillance system by implementing control center network video management software (NVMS) with HD Stream Management.
- By Rick Ramsay
- Oct 01, 2012
Convergence has come, and while there are still analog cameras being produced, bought and installed, the security industry has become a networked prism.
- By Ralph C. Jensen
- Oct 01, 2012
New developments in network cameras are enhancing their role as imaging sensors at the edge of IP video networks. The new landscape in imaging includes cameras that offer new capabilities, can see better and are smarter and more versatile.
- By Greg Peratt
- Oct 01, 2012
Despite networks’ best efforts to thwart them, motivated, sophisticated attackers are going to get into a network.
- By Neal Creighton
- Oct 01, 2012
It has been eight years since President George W. Bush signed Homeland Security Presidential Directive 12 (HSPD-12) into law and four years since its compliance deadline.
- By Geri B. Castaldo
- Oct 01, 2012
New IP-based surveillance solutions leverage advanced wireless protocols and solar power to allow property owners to extend the reach of their surveillance system without the expense.
- By John Graham
- Oct 01, 2012
Centralized management of security solutions is not a new concept for large enterprise environments.
- By Rich Mellott
- Oct 01, 2012
The lesson of Pandora could be, in short, that containers secure enough to lockdown all the evil in the world are probably secure enough to protect good things, too.
- By Naeem Zafar
- Oct 01, 2012
Industrial Ethernet is a powerful tool when planning for the deployment of remote security monitoring in any setting that has environmental challenges.
- By Jim Krachenfels, TJ Roe
- Oct 01, 2012
Traditional systems that required heavy upfront IT infrastructure investments have given way to cloudbased systems.
- By Bill Moran
- Oct 01, 2012