Thanks to wireless lock technologies, cloud-based software, and smartphone/tablet integration, it is now possible to deploy a secure, manageable, and cost-effective security solution without the need for complicated and expensive infrastructure.
- By Peter Boriskin
- Dec 01, 2018
Video surveillance has dramatically changed in recent decades. Open, IP-based network technology has largely replaced the closed, proprietary world that long dominated the security industry.
- By Jeff Whitney
- Dec 01, 2018
Before installing a networked, open-platform, VMS solution, the Port of Antwerp had a standalone DVR system with no networking capabilities and no open platform support, meaning only a limited number of camera brands were supported.
- By Courtney Dillon Pedersen
- Dec 01, 2018
When it comes to access control, it all boils down to companies trying to determine whether you are who you say you are, and whether you are authorized to access certain information. As we all know, both those are tall orders to fill.
- By Jeff Capone
- Dec 01, 2018
Radar may not be the first technology that comes to mind when discussing perimeter protection, but that is all beginning to change.
- By Gadi Bar-Ner
- Dec 01, 2018
My, how times are changing the way we do business… in the publishing industry. Without going back to the details of yesteryear, the manner in which a publication is produced has changed from cut and paste, to the digital version of today.
- By Ralph C. Jensen
- Dec 01, 2018
We live in a world where computer hacking, data breaches, identity theft, and stolen records of all sizes have become worldwide events that can happen at any time.
- By Ruben Lugo
- Dec 01, 2018
The coffee chain says hackers might have accessed customer info through a data breach.
- By Sydny Shepard
- Nov 30, 2018
Legacy endpoint prevention and protection solutions are limited when faced with advanced and sophisticated threats
- By Liviu Arsene
- Nov 30, 2018
The cameras are expected to cost about $30,000 and will be installed in about three months.
- By Sydny Shepard
- Nov 30, 2018
“The OVMC-EORH employees and medical staff have been very adaptive and supportive, and we are able to continue with quality patient care,” Ohio Valley Medical Center CEO Daniel Dunmyer said.
- By Jessica Davis
- Nov 29, 2018
Huawei, the world’s biggest producer of telecoms equipment, has faced pushback from governments due to concerns that its technology could be used for unsavory purposes such as spying.
- By Jessica Davis
- Nov 29, 2018
Here are five principles that developers should keep in mind to create more secure apps
- By Madhan Kanagavel
- Nov 29, 2018
Tips and tactics for ensuring your small business is safe from the threat of cyberattacks.
- By Michael Flavin
- Nov 28, 2018
A security hole in a mail preview program may have made the data of 60 million customers vulnerable.
- By Sydny Shepard
- Nov 28, 2018
The site of Berlin's devastating 2016 truck attach has now become a testing area for heavy security.
- By Sydny Shepard
- Nov 28, 2018
When a rider uses the app or a text to report a non-emergency security incident, the operations center alerts security staff so they can find the corresponding train and respond to the report.
- By Jessica Davis
- Nov 27, 2018