From the numerous security industry expositions to the Jones’ wireless home broadband net, today’s overarching buzz percolates with two words – Internet Protocol. For enterprise security operations, it’s IP security
Web-hosted access control solutions allow end-user security to create user directories, which are housed off-site on server farms. The application includes activity logs and other features. Display courtesy of Brivo
Identity theft shakes whole communities. Pictured is a free community shred to combat identity theft. The event, sponsored by Crime Stoppers, Shred-It and Wal-Mart allowed people to dispose of sensitive
From Saflink, the SureAccess all-weather, smart card, biometric reader meets the strict requirements of FIPS 201’s Personal Identity Verification of federal employees and contractors. It’s based on technology previously deployed
Start off the new year with an exclusive look at the innovative security technology in the U.S. Bank Stadium in Minneapolis in our annual Security Technology & Innovations Report. This issue also includes guides for retail security leaders on video surveillance techniques, tips for retrofitting your access control systems, and recommendations for the new U.S. president on cybersecurity and terrorism.