Territory coverage includes Indiana, Michigan, Ohio, Kentucky, West Virginia and Western Pennsylvania.
June 2nd event features new products, access to factory reps, hourly trainings including Atmos presented by Dolby Labs, exclusive show deals and product giveaways.
The consolidation of video systems delivers new levels of situational awareness and security intelligence.
Umberto Malesci explains what IoT is, what it does and gives real-world examples of IoT in action.
- By Ginger Hill
- May 29, 2015
Members of city council are demanding better security after a woman was sexually assaulted inside a Philadelphia parking garage.
- By Matt Holden
- May 29, 2015
Action steps people can take to make it more difficult for hackers.
- By Ginger Hill
- May 28, 2015
The Boston Public Library’s largest union had repeatedly complained about the lack of security during renovations.
- By Matt Holden
- May 28, 2015
Company provides security features and tools to empower individual account users.
- By Ginger Hill
- May 27, 2015
Advanced Biometric Access Control designed to teach physical security integrators all they need to know about successful migration from traditional card access systems to biometrics.
Oil tanker Oriental Glory averted by group of 30 pirates, went on board, robbed the crew and siphoned tons of fuel.
Full-service security integration firm to offer Immix command center software.
Increased access control security from thugs, delinquents, criminals and terrorists.
Newly strengthened partnership between AMAG Technology and Salient Systems provides unmatched security system for adolescent mental health hospital.
Protects electric power infrastructures from terrorist vehicle attacks.
IS Decisions launched ‘The Weakest Link: A user security game,' with the input of security experts and analysts.
Company delighted about government award for enterprise-wide physical security and security system integration support services.
Provides valued system integrators with the tools, resources and benefits needed to maximize long-term customer relationships and drive sales.
U.S. officials say all 11 threats were phoned in by a single person.
- By Matt Holden
- May 27, 2015
Company committed to being a true distribution partner.
Security efforts often hindered by losses related to theft, damage or other factors.
- By Brian McIlravey
- May 26, 2015