One prison guard was pronounced dead at the prison.
Local, federal, state and private security officials are teaming up to create a security stronghold that protects a three mile area around the stadium.
AMAG Technology is pleased to announce that Jody Ross has been promoted to Vice President of Global Sales and Business Development for AMAG Technology.
Site of 10-day fan festival in downtown Houston to feature Axis video and audio products.
Earlier in 2016, when Gartner analysts stated that by 2020, 80 percent of all software will be offered on a subscription basis—this did not come as surprise to us at Genetec.
- By Christian Morin
- Feb 01, 2017
Beyond the core functionalities of recording and displaying video, one of the most important capabilities of modern Video Management Software platforms is the ability to reduce bandwidth required for transmitting live video.
- By Brian Carle
- Feb 01, 2017
Financial institutions have been historically slow to adopt IP video surveillance citing concerns about possibly compromising network security.
- By Stephen Joseph
- Feb 01, 2017
After a year of in–depth research and testing of many systems, the RJUSD found CyberLock’s access control system to be the solution that best fit the district’s needs, including installation and maintenance.
- By Jennifer Robinson
- Feb 01, 2017
Fraud prevention, it’s time to get better acquainted with your security team. You may see them in the hallways, have a coffee with them in the breakroom, and possibly join them on the dance floor at your annual holiday party.
- By Daniel Caggiula
- Feb 01, 2017
I’ve been writing, professionally, for 40 years. The first story that I ever worked on was a triple homicide, and a contract murder that was related. Back then, I didn’t think reporting could get any worse.
- By Ralph C. Jensen
- Feb 01, 2017
Security threats are on the rise and as IT security teams increase their scrutiny of all network-connected devices, it’s time for some new thinking about the design and maintenance of building security systems.
- By John Szczygiel
- Feb 01, 2017
Pick any county in the United States, money is scarce to non-existent, and in the pecking order of who gets the available money, the county library is way down the line.
- By Ralph C. Jensen
- Feb 01, 2017
The abundance of networked solutions and devices—both security and nonsecurity— has exploded in recent years, providing unparalleled convenience and efficiency.
- By Ken LaMarca
- Feb 01, 2017
Based in Milwaukee, Wisconsin, Bell Ambulance Company has been in operation since 1977, growing into the largest provider of ambulance services in the state. The company responds to around 75,000 calls per year and provides a range of services.
- By Fernando Pires
- Feb 01, 2017
It can be difficult to decide whether and when to make the transition to new access control technology. Transitions are often delayed over budget concerns or because of worries that the process will adversely impact productivity and workflow.
- By Brandon Arcment
- Feb 01, 2017
Physical identity access management (PIAM) solutions have changed the way leading organizations approach security.
- By Don Campbell
- Feb 01, 2017
Terminal One at JFK International Airport had relied on a limited analog surveillance system and a separate, older IP system that were independent of each other.
- By Courtney Pedersen
- Feb 01, 2017
When it comes to protecting transportation hubs, seaports have their own set of challenges.
- By Anthony Incorvati
- Feb 01, 2017
In 2015, an ex-deputy shot and killed an unarmed black man.
On Friday, January 27, President Trump signed an executive order that excluded travel from seven countries.