Industry Innovations

What are the latest products being introduced into the security market, and what specific benefits can they bring to your enterprise?

ARTICLES

Utilizes Wireless Mesh Network for Fire Detection

 To protect challenging applications and high-cost installations, as well as enterprises in expanding facilities, this system uses a Class A mesh network, where every device acts as a repeater with redundant path communication.  


Read More

Provides Higher Recording Performance, Reliability and Capability

 This line of hybrid and IP camera recorders offer new options to create a performance-optimized solution for demanding, enterprise-scale applications.  


Read More

Improves Decision-Making and Response Time

 Modeled after the “battlefield awareness” concept developed by military operations, this tablet app is designed for ease of use, speed of information-sharing and real-time response in the field.  


Read More

Provides Mobile Access to Emergency Response Procedures

 In the event of an emergency, employees will likely grab smartphones and personal items before evacuating. They are unlikely to rush to find the binder of emergency procedures.  


Read More

Provides Real-Time Insights to Better Detect Cyberattacks

 Attackers used authorized credentials in more than 76 percent of network intrusions in 2013, allowing them to impersonate legitimate network traffic while conducting suspicious activities.  


Read More

Enhances Security for Cloud Data Storage and Data Centers

 Building off of technology from Intel Corporation, this system lets organizations proactively control where virtual workloads can run, further mitigating the risks of data mobility that virtualization and cloud computing create.  


Read More

Features Authenticated Signature for Shellshock Vulnerabilties

 This cloud-based vulnerability scanner has been enhanced with a Bash Shellshock Authenticated Signature. 


Read More

Scans Facilities with Radar for Intrusion Detection

 For remote or unmanned facilities, getting early warning of possible intruders could make the difference in stopping a theft or other malicious security breach.  


Read More

Automatically Discovers Cameras without Additional Programming

 With a set-up time of less than three minutes, this NVR is designed for easy ownership, including no complex router configuration and cloud-based mobile apps for iPhone, iPad and Android.  


Read More

Uses Audio Enhancement Algorithm for Sound Clarity

 These voice-over-IP call stations combine high-quality speaker and microphone components along with a proprietary audio enhancement algorithm for sound clarity.  


Read More

EVENTS

Webinar

How to Design SIEMs and Security Analytics

2/27/14
Online
Contact: Adam Thomas

Available On-Demand Register for this webinar to learn about the different types of SIEM and Security Analytic solutions, the difference between SIEMs and Security Analytics, and design considerations when implementing your own solutions.

Read More

Webinar

Employee Theft: It is Not the Cost of Doing Business!

5/8/14
Online
Contact: Adam Thomas

On Demand This presentation will focus on how employee theft impacts the profitability of business. We will examine the causal factors of employee theft and how security professionals need to address and resolve theft in the workplace.

Read More

Webinar

Close Your Security Gaps with Automated 360 Degree Intelligence

6/24/14
Online!
Contact: Adam Thomas

On Demand Learn how to fully leverage diverse data sources (video, text, audio) to achieve holistic situational awareness, improve effectiveness and efficiency in detecting and responding to threats with automated monitoring, analysis and workflow and accelerate incident investigations to minimize business and operational disruptions.

Read More

Webinar

Setting New Standards for Integrated Security Systems

7/15/14
Contact: Adam Thomas

On Demand Keri Glitch, CSO of Iberdrola USA, will cover how Iberdrola USA's strategic organizational structure protects against the threat, innovative solutions that feature real-time situational awareness and automated alerts, and how security technology and compliance requirements (NERC in this case) integrate to enhance value and reduce brand risk.

Read More

Webinar

Best practices for creating a safe campus environment using Integrated Surveillance Technology

8/19/14
Online!
Contact: Adam Thomas

On Demand Sprawling, campus-like properties pose unique security challenges. This webinar will address why a layered approach is best when addressing the needs of campus security, as it relates to a wide range of verticals, including corporate, municipal, healthcare, hospitality and education.

Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security December 2014 issue cover

2014 December

This issue of Security Magazine covers our 12th annual Top Guarding Firms list. Check out the best of the best as of December 2014. The 21st century has brought with it new types of security threats. Read how to combat and protect against these threats.

Table Of Contents Subscribe

Security Emergency Preparedness Training

Which security personnel emergency preparedness training is the top priority to you and your enterprise?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.