Mobile Security


Intelligence on the Edge - Do you have an App for that?

Intelligence on the Edge

In video surveillance, the concept of centralized intelligent systems and intelligence on the edge is an on-going conversation, as both solutions have pros and cons depending on specific user needs and applications.

New Report Finds Security Gaps in Vehicle Technology

New Report Finds Security Gaps in Vehicle Technology

A report by U.S. Senator Edward Markey finds that most automakers don’t have the ability to find security breaches.

Security and Privacy for Wearables Not So Good

Security and Privacy for Wearables Not So Good

By 2019, it is predicted that more than half a billion wearable devices will be in use each day.

Two Big Problems with Fingerprint Security

Two Big Problems with Fingerprint Security

One tech expert says biometrics are good, but there are still problems to consider.

SmartTek Systems Grants OnWatch of Australia Exclusive Rights

Agreement opens floodgates for international expansion.

Planes Searched Amid Security Concerns

Planes Searched Amid Security Concerns

One commercial flight was diverted while two were also evacuated

Jimmy Kimmel Exposes Bad Password Security

Jimmy Kimmel Exposes Bad Password Security

The late night host was able to get passwords from strangers off the street in a skit on his show.

Mobile Apps have Exploded

Mobile Apps have Exploded

In 2014, the number of Internet users worldwide has reached nearly 30 billion. While the majority of these users connect via fixed-line to a PC, the growth of mobile- and cloud-based solutions has skyrocketed.



Searching the Horizon

Searching the Horizon

As the time nears on the shutdown of the second-generation, or 2G, wireless network, now is the time for security dealers and integrators to not only start planning for this massive migration but also begin searching for opportunities to make this change easier for themselves as well as their clients.

BlackBerry and Boeing Team up for Self-Destructing Phone

BlackBerry and Boeing Team up for Self Destructing Phone

The BlackBerry Enterprise Server (BES 12) will be integrated into the phone.

Evidence Gathering and Management to Get Smarter in 2015

According to eMarketer, the United States will pass 50% Smartphone penetration among its population.

Tips to Improve Holiday Cyber Shopping Security

Tips to Improve Holiday Cyber Shopping Security

These tips will help secure pay data when shopping online

80 Percent of Patients Worry for Health Data Security

80 Percent of Patients Worry for Health Data Security

A new report indicates consumers remain concerned about medical technology and the security of their health information and data.

7-year-old Hacks Apple Touch

7-year-old Hacks Apple Touch

Stealthy youngster uses ninja-like skills to gain access to his father's iPhone6.

Apple Gets First Real Virus Scare

Apple Gets First Real Virus Scare

Wirelurker sneaks onto computers using unauthorized Chinese apps.

Guardly Enterprise E911 Solution Improves Active Shooter Response

New indoor positioning systems enhance ability for security teams to detect shooters earlier and locate people inside buildings.

mPERS Mobile App Trio Introduced by SmartTek Systems Provides Dealers with a Competitive Edge

Central station-based Smartphone apps that provide anywhere, anytime life protection services and new revenue stream for partners.

Do Not Post Pictures of Your Completed Ballot on Social Media

Do Not Post Pictures of Your Completed Ballot on Social Media

Steep fines are being issued and some are having their votes invalidated.

Using Bluetooth-enabled Devices as the Key to Remote Monitoring

As the desire to connect more real-world activities to the digital world increases, designers across industries are beginning to look at harnessing this technology as a way to enhance physical security.

Court Rules Police Can Force Users to Unlock iPhones with Fingerprints

Court Rules Police Can Force Users to Unlock iPhones with Fingerprints

The ruling doesn’t allow police to unlock phones using passcodes, however.

Featured

  • Meeting Modern Demands

    Door hardware and access control continue to be at the forefront of innovation within the security industry, continuously evolving to meet the dynamic needs of commercial spaces. Read Now

  • Leveraging IoT and Open Platform VMS for a Connected Future

    The evolution of urban environments is being reshaped by the convergence of Internet of Things (IoT) technology and open platform VMS. As cities worldwide grapple with growing populations and increasing operational complexities, these integrated technologies are emerging as powerful tools for creating more livable, efficient, and secure urban spaces. Read Now

  • Securing the Future

    Two security experts sit down with Security Today’s editor in chief Ralph C. Jensen to discuss what they see emerging and changing over the next several years along with how security stakeholders can harness these innovations into opportunities. Read Now

  • Collaboration Made Easy Using a Work Management Platform

    Effective collaboration between security operators, teams and other departments is critical to the smooth functioning of organizations. Yet, as organizations grow in complexity, it becomes more difficult for teams to coordinate with each other. This is compounded by staffing shortages, turnover and ineffective collaboration tools. Read Now

  • Creating a Safer World

    Managing and supporting locks and door hardware within a facility is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Read Now

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.