These rugged smart card access control readers feature stainless steel construction, epoxy encapsulated electronics, audiovisual feedback, and a modern low-profile design, which helps reduce the cost of repairs and replacement due to vandalism and harsh environments.
This updated social media monitoring and analysis platform enables the use of location-tagged data to discover, engage and analyze content across Twitter, Instagram, Facebook, YouTube, Picasa, Flickr, Sina Weibo and other social media channels. With the new iOS app, enterprise security leaders can gather location-based social intelligence in the areas around the current locations, create or monitor any location while mobile, and access a streamer view of location-tagged social media posts on-the-go. The platform’s upgraded capability can process more than 1 billion posts daily, and users can save time by creating and reusing search criteria, such as locations, networks, keywords and usernames, within a search template.
This shield looks like an average laptop bag, but built into it is a lightweight and discreet ballistic shield – a three-foot long blanket of protection against most handgun, shotgun and pistol-caliber sub-machine gun threats.
This series of network video recorders (NVRs) come with either 4- or 8-port embedded Power over Ethernet (PoE) switches, and they are pre-configured with video management software and have 2TB and 4TB of storage, respectively.
This operational intelligence solution covers many customer service operations processes at venue entries, including welcoming and greeting, access control and ticket validation, marketing and sponsorships, and non-intrusive security screening.
This bullet camera combines 24/7 high-contrast thermal video and high-performance built-in video motion detection to provide intrusion detection and visual awareness in daytime and nighttime conditions.
Change-makers, thought leaders and industry pioneers, these 16 security executives, legislators and mavericks are making a difference in security, impacting enterprises, communities and nations. Can Hackers Really Control Airplanes? Discover 3 steps for timely cyber intrusion detection. Read all this and more in the September 2015 issue of Security.