Tamoco utilized HID Trusted Tag Services to provide film lovers with the ability to use their Near Field Communications (NFC) enabled smartphone to receive Tribeca Film Festival tickets.
Getting back to the tranquility of nature without the buzzing sounds of small flying objects.
- By Ginger Hill
- May 05, 2014
Banks worldwide are putting biometrics at the front end using fingerprint authentication.
- By Bill Spence
- May 05, 2014
Engaging on Twitter leads to discover of app to help parents keep their children safe via open communication and allowing the child to be an advocate for their own safety.
- By Ginger Hill
- May 01, 2014
The staff at Security Products and Security Today wish all the winners a huge congratulations.
World Vision Mexico Receives the Donation of US $10,000.
9th annual Milestone Systems Milestone Integration Platform Symposium (MIPS) partner conference in the Americas recognizes company for their support of Milestone XProtect and Arcus software.
Founded in 1983, Fort McDowell Casino in Arizona doesn’t take security lightly. Their security system has undergone a number of transitions over the years to aid in protecting 128,000 square foot of slot machines, 18 blackjack tables, 20 poker tables, a 1,800-seat bingo hall and a golf course.
- By Jamie Friedlander
- May 01, 2014
Philosophical and physical shifts in intelligence and management at the edge are remaking corporate networks.
- By Vince Ricco
- May 01, 2014
Ensuring the safety and security of patients and employees is critical to healthcare organizations of any size. For larger facilities, the task can seem monumental, leading many in the industry to turn to IP network surveillance technology to help take control of the process.
- By Greg Peratt
- May 01, 2014
With employees and physicians totaling more than 6,000, Baptist Health Care Network is the largest, non-governmental employer in northwest Florida.
- By Ben Scaglione
- May 01, 2014
“Banks Heap Suits on Target over Breach,” read a recent headline of a Wall Street Journal story. By that time, seven financial institutions had already filed class action suits against the retail giant alleging it did not sufficiently protect its customer’s data.
- By David Rizzo
- May 01, 2014
When UCF began planning an upgrade to their security solution—standalone,
battery-operated access control that did not provide the level of security
needed and a variety of small, analog video systems dispersed throughout multiple
campuses
- By Brent Doherty
- May 01, 2014
As access control systems have become more prevalent in business environments, companies are looking to leverage this technology to deliver additional solutions at less expensive costs.
- By Gerald McHugh
- May 01, 2014
Museums are complicated for security professionals. They must be open and welcoming to the public, but they often have quiet nooks and crannies where patrons sit and ponder the art and human endeavor on display.
- By Vicki Contavespi
- May 01, 2014
As the sophistication of the security industry evolves daily, companies are honing their partner loyalty programs to assist integrators in all aspects of the industry.
- By Ginger Hill
- May 01, 2014
When most people consider cybersecurity, they think about protecting the information that resides on their computers—sensitive emails, folders or files.
- By Mauricio Chacon
- May 01, 2014
While an alarm system can’t protect your customers from everything, it is a proven measure of deterrence. Homes with alarm systems are three times less likely to get burglarized than homes without them.
- By Rob Phillips
- May 01, 2014
Datacenter traffic is predicted to triple by 2017 with the cloud as the biggest traffic source, according to a recent Cisco Global Cloud Index study.
- By Charles P. Williams
- May 01, 2014
There is no telling what an appetite for success and a passion for technology will produce. One thing for certain, the desire to give the customer the best security solution possible will likely bear a long-term, winning combination.
- By Ralph C. Jensen
- May 01, 2014