 
                    
                                        
		            
                    To enhance the quality of the educational experience as well as the safety of their students, many schools and universities today view campus safety as a top priority.
                    
			            - By Vance  Kozik
- Aug 01, 2012
 
            
                
	                 
                    
                                        
		            
                    Today, decision makers can raise the bar on enterprise security without raising the complexity for their users. 
                    
			            - By Phil   Scarfo
- Aug 01, 2012
 
            
                
	                
                    
                                        
		            
                    The FBI established the Criminal Justice Information Services (CJIS) division in 1992, and it is now the bureau’s largest division.
                    
			            - By Chris  Jensen
- Aug 01, 2012
 
            
                
	                 
                    
                                        
		            
                    Of all the accoutrements of civilization—and they are myriad, from plumbing to Pop- Tarts—perhaps none is more routinely taken for granted than the lowly fire hydrant.
                    
			            - By Ronnie  Rittenberry
- Aug 01, 2012
 
            
                
	                
                    
                                        
		            
                    Video surveillance as a network service continues to grow and presents expanded opportunities for silicon solutions.
                    
			            - By Mike  Green
- Aug 01, 2012
 
            
                
	                
                    
                                        
		            
                    In 2010, the historic Egyptian Theatre in DeKalb, Ill., decided to upgrade to a more modern and effective life safety system to protect the structure and its patrons.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Cyberthieves and hackers are always looking for new ways to obtain sensitive information. As Web browsers have become the common interface for accessing information that drives business activity, browsers have become the primary target of theft and data leakage.
                    
			            - By Bill  Morrow
- Aug 01, 2012
 
            
                
	                
                    
                                        
		            
                    After recommending strategies for on-the-border video cameras and other security technologies, Rep. Candice Miller (R-MI) and her colleagues in the U.S. House of Representatives have passed H.R. 1299, known as the Secure Border Act. 
                    
			            - By Ralph  C. Jensen
- Aug 01, 2012
 
            
    
                
	                
                    
                                        
		            
                    First Affiliated Hospital of Jinan University in Guangzhou, China has selected HID Global's networked access control solutions and contactless readers to provide multi-layered security with advanced access control level settings and centralized monitoring to improve the hospital’s overall security in key access zones.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    ITT Exelis (NYSE: XLS) has been awarded the Agile Cyber Technologies (ACT) indefinite delivery, indefinite quantity contract by the U.S. Air Force Research Laboratory (AFRL).