Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » security technology

Articles Tagged with ''security technology''

SEC0818-cyber-feat-slide1

Is Voice the Next Stage for your Enterprise Security Program?

Phil Aronson
Phil Aronson
August 1, 2018

As the industry moves toward holistic 360-degree security systems to satisfy business needs, security professionals are beginning to appreciate the role of voice in the equation.


Read More
school-enews

How Security Professionals Can Help Create Positive School Memories

How Safety Measures Can Define a Generation
James Marcella
July 17, 2018
If we want today’s children to look back on their school days as more than just a time of “Run, Hide, Fight” training, lockdowns and lectures on the potential dangers of online behavior, school systems need to institute security measure that will create safer learning environments without making schools feel like prisons.
Read More
entrance-enews

How to Formulate a Holistic Approach for Effective Entrance Planning

Tracie Thomas
July 17, 2018
Traditionally, security personnel begin with their building’s main entrances when planning to secure their facility. While that is an effective start, it is important to consider the entire facility or campus to ensure that all areas are protected.
Read More
Product Spotlight 0718

Product Spotlight: Key & Asset Management

July 16, 2018

From pharmaceuticals to documents to electronic devices or forensic evidence, maintaining security for various assets can be paramount to compliance in some organizations.


Read More
SEC0718-spot-feat-slide1_900px

Southco, Inc.'s Bluetooth Controller Adds Bluetooth Access Management & Virtual Keys

July 16, 2018

The EA-BT BLUETOOTH Controller from Southco, Inc., allows Bluetooth-enabled devices, such as smartphones or tablets, to be used as a credential for wirelessly actuating an electronic lock.


Read More
SEC0718-spot-feat-slide1_900px

Morse Watchmans' New Asset Management System Sends Alerts, Tracks Assets Through RFID Lockers

July 16, 2018

The RFID-powered asset management system, AssetWatcher from Morse Watchmans, gives security leaders control over important assets such as mobile devices, weapons, tools and more.


Read More
SEC0718-spot-slide2_900px

ASSA ABLOY's Stand-Alone Cabinet Locks Provides Cost-Effective Asset Management for Commercial & Residential Applications

July 16, 2018

The battery-powered HES K20 and KP20 Stand-Alone Cabinet Locks from ASSA ABLOY Electronic Security Hardware offer cost-effective secure storage for residential and home installations.


Read More
Panda restaurant outside

Panda Restaurants Adds Business Intelligence Technology to 1,960 Stores

Panda Restaurant Group Improves Company-Wide Store Operations with 3xLOGIC VIGIL Trends Business Intelligence Software
July 12, 2018

3xLOGIC, Inc., a leading provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500™ winner, today announced that Panda Restaurant Group, Inc. (parent of Panda Express, Panda Inn and Hibachi-San) has completed deployment of 3xLOGIC’s VIGIL Trends Business Intelligence software to all of its North American locations.


Read More
In-Car Video 1 July 2018

In-Car Video Proves Valuable in University Security Operations

How one mid-sized university department is successfully using valued-engineered, in-car video surveillance systems.
CPT. Dennis Schumaker Jeff Karpovich CPP, CHPA
July 6, 2018

Police have benefited from in-car video and surveillance for decades, but private security departments rarely utilize this asset. Here’s why: Since most security departments do not perform vehicle stops, in-car video systems are not believed to be of value. Also, cost is a deterrent.


Read More
small-cyber-enews

Small and Mid-Size Businesses Need to Focus on Cybersecurity

Mathieu Chevalier
July 5, 2018
There seems to be a constant supply of news stories involving high-profile, high-impact criminal cyber activity. More often than not, the data breaches that we hear about occur at large businesses or global organizations. This leads many people to think that it’s only those big companies who are at risk of being attacked. They incorrectly assume that today’s cybercriminal is always looking for a giant financial payout or a huge cache of personal data. But the reality is that small and mid-size businesses (SMB) are actually at greater risk.
Read More
Previous 1 2 … 23 24 25 26 27 28 29 30 31 … 62 63 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing