Social Hall uses ENTASYS 200 Column Line Arrays and VLF Subwoofers.
Modbus connectivity comes standard on all FAAST aspirating smoke detectors at no additional cost.
CNL Software, a solution provider of Physical Security Information Management (PSIM) software, partners with Geutebruck GmbH, a video systems developer, renowned for producing complete, high-performance video security systems that are open for the future, flexible and cost-effective.
However, property crimes and arson offenses declined, according to the agency's Preliminary Annual Uniform Crime Report, released June 3.
Attendees of ASIS 2013 and the third annual (ISC)² Security Congress will get answers to their career-related questions and challenges, and learn how best to position themselves on the job and in leadership roles.
The ER-EN27 comes complete with integrated cooling fans and lockable, removable side panels allowing for the organization of multiple electronic components, while providing essential thermal management as well as protection from thermal issues, damage and theft.
Schlage offers “Try Me” Program for barracks using hotel locks.
For many security industry professionals, one of two things often comes to mind when they hear the term, “video analytics.” One: high-tech, critical-infrastructure protection in applications such as airport security.
- By Scott Ferguson
- Jun 01, 2013
Apps are more prevalent than ever. The best ones are clean, fast and easily navigable for all ages, not just the world’s youngest millionaires.
- By Rob Phillips
- Jun 01, 2013
Most of the 30 million classic burglar alarms installed since 1970 fail to meet growing consumer expectations of what a modern burglar alarm should be.
- By Keith Jentoft
- Jun 01, 2013
Charlie Howell’s childhood was hardly conventional. While other children were reading comic books, he was poring over repair manuals and installation diagrams.
- By Rebecca Overton
- Jun 01, 2013
Post Cold War, some of the threats have changed, but the squadrons’ mission remains the same—to master the tactics of foreign air forces.
- By Mike Madden
- Jun 01, 2013
I recently participated in a webinar titled Industrial Security in the Real World: Practical Steps, which indirectly discussed how some fundamental tenants of project management were applied to this topic.
- By Dennis Adamkiewicz
- Jun 01, 2013
If you’re limiting your business to selling surveillance technology as a capital expense, you’re leaving a lot of money on the table.
- By Matt Krebs
- Jun 01, 2013
In 2011, his mother, along with several other volunteers, joined forces with the Cedar Park Veterans Memorial Citizens Advisory Group to honor military veterans who have given their lives serving our country.
What job function does the staff of full-service central stations spend the most time performing? Processing signals? Taking calls? No! The answer is data entry.
- By Victoria Ferro
- Jun 01, 2013
As the largest healthcare provider in the Twin Cities’ East Metro area, HealthEast Care System is dedicated to offering its patients the highest quality medical services.
- By Joe Kirmser
- Jun 01, 2013
Here’s a typical building systems setup in a large commercial office facility. The security function—video, access, intrusion, fire and other systems—is run over a dedicated network.
- By Andre Greco
- Jun 01, 2013
Newfoundland and Labrador-based commercial service provider Cougar Helicopters doesn’t take safety and security lightly.
- By Scott McNulty
- Jun 01, 2013
As IP technology and advanced video surveillance systems become increasingly popular, video analytics have officially entered the mainstream.
- By Megan Weadock
- Jun 01, 2013