Security 500 conference     

 Don’t miss the networking event of the year for security executives!
Register today for the Security 500 Conference.

Items Tagged with 'security technology'

ARTICLES

ASIS 2014: Technology to Equip Enterprises for Success

Noteworthy Security Products from ASIS 2014

Get a sneak peek at the security products to be showcased at ASIS 2014.


Read More

Sneak Peek: ASIS 2014 Security Technology

Take a look at the product preview for ASIS 2014.

Take a look at products from Honeywell, Axis Communications, HID Global and more.


Read More

Views from a Top Integrator

Kratos PSS provides rapidly evolving technologies such as digital video analytics, LAN/WAN convergence and wireless solutions.

Kratos Public Safety & Security Solutions’ Robert Gaulden discusses the latest trends in security technology and how to manage surveillance for rooftop helipads.


Read More

DHS and ASIS International Sign MOU for Technological Innovation

The Department of Homeland Security (DHS) Science and Technology Directorate and ASIS International (ASIS) signed a Memorandum of Understanding (MOU) at the ASIS headquarters in Alexandria, Va., on Thursday, March 6, 2014. The agreement stipulates how DHS will work in partnership with ASIS to communicate the agency’s capability gaps, technology requirements, and outreach opportunities to its vendor and member communities in an effort to provide state of the art technological capabilities to its operating components and the nation’s first responders.


Read More

ISC West 2014: New Technology Showcase

ISC West is fast approaching – April 2-4 – so while you’re booking your travel to the show, take a few moments to scope out what innovations you want to see for yourself.

Even if you can’t make it to Las Vegas for this year's show, there’s no reason you have to miss out on this year’s technology. Get a sneak peek of what will be shown and debuted at ISC West 2014.


Read More

Top Security Technology and Innovations in 2014

Technology has become ingrained in enterprise security operations.

Like most other segments of the business world, technology has become ingrained in enterprise security operations. With that increased use of technology comes a new set of risks.


Read More

How the Generational Security Gap Affects Security

Despite concerns about technology, clearly Americans still have a hard time unplugging.

I used to write stories like this on a typewriter back in the day. My articles turned out to be a mass of White-Outs to counter typing mistakes. It all made me dizzy. Today’s computer technology even auto-corrects my words, which sometimes is not a good thing.


Read More

Top Technologies from ASIS 2013

Hungry for the highlights from ASIS 2013? See Security magazine's editors' picks for this year's best in show.

The 2013 ASIS International Exhibition in Chicago was abuzz with new and renewed security solutions and technology. Hungry for the highlights? Check out Security magazine’s editors’ picks for some of the best products of the show.


Read More

U.S. Surveillance Leaks Threaten Police Use of New Technologies

Public disclosures about U.S. government surveillance threaten the ability of police to use powerful new technologies such as drones and mobile license plate readers.


Read More

Highlights from ASIS 2013 – Chicago

Two weeks ago, ASIS International Seminar and Exhibits arrived in Chicago, bringing plenty of flash in its opening ceremonies, as well as plenty of possible security solutions on the show floor, as manufacturers seek to help enterprise security leaders get more from their existing investments in analog systems.
Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security Magazine 2014 September cover

2014 October

Security takes a look at safety and preparedness for the harshest of weather phenomena in this October 2014 edition of the magazine. Also, we investigate supply chain security and the many benefits of PSIM. 

Table Of Contents Subscribe

Travel & the Ebola Risk

Are you and your enterprise restricting travel due to Ebola risks?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.