An innovative and easy-to-use interface allowing local monitoring and management, including photo ID badging for up to 250 entrance points and 25,000 users.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Key control and asset management technology are reliable and cost-effective methods to improve security by ensuring that facility keys are properly managed with regard to access, storage and tracking.
                    
			            - By Fernando  Pires
- Jun 27, 2014
 
            
                
	                 
                    
                                        
		            
                    Seeing what’s out there is the beginning of situational awareness. Over the years, video surveillance technology has steadily raised the level of situational awareness available to security teams, and today’s video technologies are pushing the envelope again. 
                    
			            - By Richard E.  Widup Jr.
- Jun 27, 2014
 
            
                
	                
                    
                                        
		            
                    Do you remember that one hotel you’ve stayed at during the course of your travels? You remember the one I’m talking about; it looked good on the outside, but inside, there was no security. It sort of left you feeling weak in the knees hoping nothing bad would happen.
                    
			            - By Ralph  C. Jensen
- Jun 27, 2014
 
            
                
	                 
                    
                                        
		            
                    Over 300,000 servers still vulnerable; McAfee offers free detection tool. 
                    
			            - By Ginger  Hill
- Jun 24, 2014
 
            
                
	                 
                    
                                        
		            
                    Allows quick communication between cybersecurity professionals who respond to cyber threats. 
                    
			            - By Ginger  Hill
- Jun 23, 2014
 
            
                
	                 
                    
                                        
		            
                    As campus shootings increase across the nation, retailers are stepping up to create bulletproof products.
                    
			            - By Ginger  Hill
- Jun 19, 2014
 
            
                
	                 
                    
                                        
		            
                    Total number affected still unknown, but company to offer free credit monitoring.
                    
			            - By Ginger  Hill
- Jun 19, 2014
 
            
    
                
	                 
                    
                                        
		            
                    What it all boils down to is internal vs. external cyber communications.
                    
			            - By Ginger  Hill
- Jun 18, 2014
 
            
                
	                 
                    
                                        
		            
                    Integrated with the smartphone's firmware, it is impossible to remove or disable the malicious app.
                    
			            - By Ginger  Hill
- Jun 18, 2014