KeyWatcher Systems ensure accountability for keys and essential communication devices.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New combination will create formidable player in market by combining the strengths of Canon’s imaging technology with Milestone’s video management software.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Attempting to keep a low-profile after leaving the White House, George W. Bush didn't bargain on his most private room being revealed to the public.
                    
			            - By Ginger  Hill
 - Jun 12, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    4 elements that must be included in a security strategy to gather information from a variety of sources to create heightened security within an organization.
                    
			            - By Brian   McIlravey
 - Jun 11, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    How three security professionals in the education vertical are keeping their campuses safe and secure for all.
                    
			            - By Ginger  Hill
 - Jun 11, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Hackers targeting golfers at conferences, US government sectors along with American, European and Japanese satellite, aerospace and communication companies.
                    
			            - By Ginger  Hill
 - Jun 11, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    ID cards evolve from bar code to magnetic stripe to proximity to smart card and finally to the biometric card.
                    
			            - By Kim  Humborstad
 - Jun 10, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Since hackers bust through networks on a daily basis, it would make sense that they are password-generating superstars, but are they?
                    
			            - By Ginger  Hill
 - Jun 10, 2014
 
		            
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    GSM radio sewn into sweatshirt allows different gestures to trigger different text messages to be sent to smartphone contact. 
                    
			            - By Ginger  Hill
 - Jun 09, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Designed for company's DVRs and Hybrid DVR standalone recorders to allow more control of surveillance system in palm of users hand.