Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Technologies & SolutionsNew Security TechnologySecurity Services

Product spotlight: Year in review

By Taelor Sutherland
Product Spotlight Year in Review
December 10, 2024

A wide-variety of products have been released this year, especially surrounding artificial intelligence (AI).

Security magazine highlights some of the products that have been released in 2024.

ExtraHop RevealXTM

ExtraHop

Reduce Cyber Risk Within Your Network

ExtraHop unveiled new network-based file analysis capabilities in ExtraHop RevealXTM to detect malware, combat ransomware and help prevent data loss. With built-in file hashing, file-based detections and file carving, SOC analysts can leverage the power of the network to reduce their cyber risk within a single platform, ensuring no threat goes unnoticed, and operations keep running. Users can rapidly detect malicious files on the network with even greater accuracy. They can generate identifiers to spot unauthorized changes or malicious files instantly, informed by CrowdStrike Falcon Adversary Intelligence built into the ExtraHop RevealX Platform. Image courtesy of ExtraHop
Find out more at www.extrahop.com


Genetec Clearance digital evidence management system (DEMS)

Genetec

Collect Data to Better Respond to Crime

Genetec announced a new feature that enables law enforcement professionals to collect, manage and share vehicle-based evidence captured by AutoVu Cloudrunner through the Genetec Clearance digital evidence management system (DEMS). With this new functionality, Genetec enables law enforcement professionals to manage and securely share precise vehicle identification data — including license plate information, color, type, make, and vehicle behavior — and other types of evidence with both internal and external partners. Image courtesy of Genetec
Find out more at www.genetec.com


FARGO HDP5000e

HID

Protect Data While Printing

The new FARGO HDP5000e delivers an advanced electronics platform — ensuring faster and more precise control over the printing process, resulting in crisper text and more vivid imagery. From its reinforced connection points to its streamlined module attachment, the HDP5000e was designed for dependability inside and out. The printer’s connectivity reinforcements strengthen and protect USB, Ethernet and power cable connection points. The printer’s resin scramble data protection feature effectively scrambles and subsequently conceals information printed with a resin panel. Image courtesy of HID
Find out more at www.hidglobal.com


Aero PTZ camera

i-PRO

Capture Video While Remaining Weather-Resistant

i-PRO announced the addition of 19 new models to its Aero PTZ camera line featuring enhanced durability and edge AI processing. Built for extreme weather and environmental conditions, the new, heavy-duty Aero PTZ cameras support up to 4K resolution and feature AI-driven analytics. With a zoom range of up to 40x, the shock-resistant, water-proof Aero PTZ cameras are IK10, MIL-STD-167-1A, and IP66/68 rated for uninterrupted video protection during extreme weather conditions. They are also resistant to heavy salt corrosion (C5-M). The camera can operate reliably and clearly in temperatures from -50 to 65°C (-58 to149°F) with i-PRO’s newly developed transparent glass heater. Image courtesy of i-PRO
Find out more at i-pro.com


OneSpan’s VISION FX

OneSpan

Verify Transactions For Secure Banking

OneSpan’s VISION FX is a transaction verification software, helping banks of all sizes future-proof security. Combining OneSpan’s patented CRONTO transaction signing with FIDO2 protocols that strengthen protection against phishing and account takeover threats (ATO), VISION FX delivers the a secure and user-friendly option on the market for banking customers logging on to execute transactions. VISION FX enables passwordless login with phishing-resistant transaction signing and What You See Is What You Sign (WYSIWYS) with zero footprint. Millions of financial transactions are annually secured by OneSpan’s CRONTO technology, which creates a transaction signature unique to each transaction to preserve data integrity and confirm authenticity. Image courtesy of OneSpan
Find out more at www.onespan.com


Scalance MUM856-1

Siemens

Remotely Monitor Industrial Devices

The Scalance MUM856-1 connects local industrial applications to public 5G and 4G (LTE) mobile wireless networks. The router can be used to remotely monitor and service plants, machines, control elements and other industrial devices via a public 5G network flexibly and with high data transmission rates. Featuring a robust IP65 housing, this Siemens router can also be used outside the control cabinet, for example, under harsh conditions in production or in outdoor facilities in the water industry. Image courtesy of Siemens
Find out more at www.siemens.com/global


Silverfort

Provide Kill Switch to Prevent Cyberattacks

Silverfort launched its Identity-First Incident Response solution, transforming how companies handle breaches and reducing the blast radius of a cyberattack. Silverfort is offering a ‘kill switch,’ which cuts down detection and remediation times and prevents attacks from spreading. Unlike previous IR solutions, Silverfort eliminates the need to sift through endless data to find and validate a breach, delivering instant visibility into compromised user accounts and visibility into which machines are compromised, including access to the attack route and origin. Image courtesy of Silverfort
Find out more at www.silverfort.com

KEYWORDS: data collection kill switch remote monitoring solutions video camera video monitoring

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Taelor daugherty 2023

Taelor Sutherland is the Associate Editor at Security magazine. Sutherland covers news affecting enterprise security leaders, from industry events to physical & cybersecurity threats and mitigation tactics. She is also responsible for coordinating and publishing web exclusives, multimedia content, social media posts, and a number of eMagazine departments. Sutherland graduated in 2022 with a BA in English Literature from Agnes Scott College.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • GSX 2024 product preview

    Product spotlight: GSX 2024 product preview

    See More
  • Product spotlight on analytics

    Product spotlight on analytics

    See More
  • Product spotlight on robotics and drones

    Product spotlight on robotics and drones

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing