This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
    • Newsletter
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
    • Video Security You Can Trust
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » security technology

Articles Tagged with ''security technology''

video monitors

The 4 ‘R’s of a Great Video Surveillance Solution

Rodney Gray
August 15, 2017
Throughout my career in security and loss prevention, I’ve evaluated many enterprise video surveillance systems for large financial and retail organizations, with the goal of choosing the best solution for my employer’s needs.
Read More
2017 ASIS Product Preview

ASIS Product Preview 2017

What’s new and noteworthy to see at the 63rd ASIS International Seminar and Exhibits?
August 1, 2017

Check out these 20 security technology products to be featured at the show, September 25-28.


Read More
Reduces Installation Cost, Encourages SMB Security Integration

Reduces Installation Cost, Encourages SMB Security Integration

Integrated Video & Access Control Platform from 3xLOGIC
August 1, 2017

With the integrated, hosted video and access control solution from 3xLOGIC, there are no wires from the access control system to the video system – all data exchange is through the software, so the total costs and time to install the system can drop immensely as an automated, cloud-based programming tool and QR codes streamline installation.


Read More
Uses Real-Time Location Technologies to Power Two-Way Communication

Uses Real-Time Location Technologies to Power Two-Way Communication

VuTeur
August 1, 2017

Through real-time location system technologies embedded within modern mobile and smart devices, the VuTeur emergency management platform uses existing WiFi connectivity to communicate directly with mobile users within a facility during an incident or event, allowing security personnel to visualize users’ locations on a map of the facility.


Read More
Protects Perimeters from Intrusion

Protects Perimeters from Intrusion

DuraShield from McGard
August 1, 2017

The DuraShield manhole security device from McGard is constructed of stainless steel with multiple security points.


Read More
Expands Features for Video Management Platform

Expands Features for Video Management Platform

Ocularis VMS Platform v. 5.4 from OnSSI
August 1, 2017

The newest version of the Ocularis VMS platform from OnSSI (version 5.4) supports H.265 compression for exceptional image quality with a reduction of video bandwidth and storage requirements.


Read More
Protects Outdoor Security Infrastructure from Electrical Surges

Protects Outdoor Security Infrastructure from Electrical Surges

DTK-MRJPOEX from Ditek Surge Protection
August 1, 2017

With a NEMA 4X enclosure with weatherproof connectors, the DTK-MRJPOEX from Ditek Surge Protection is built for installation in harsh our outdoor environments.


Read More
Delivers Security System Control to Remote Devices

Delivers Security System Control to Remote Devices

ACT365 from Vanderbilt Industries
August 1, 2017

Cloud-based access control and video management platform ACT365 from Vanderbilt Industries allows live view and video playback, access control reports and alarms with video evidence, and real-time mustering to ensure employees’ safety during an emergency.


Read More
Offers Complete Cloud-Based Access Control and Monitoring

Offers Complete Cloud-Based Access Control and Monitoring

Galaxy Cloud Concierge from Galaxy Control Systems
August 1, 2017

The Galaxy Cloud Concierge from Galaxy Control Systems integrates video surveillance, video management, elevator control, locks and turnstiles onto a unified platform.


Read More
Offers Multi-Layered Security and Simultaneous Support for Multiple Credentials

Offers Multi-Layered Security and Simultaneous Support for Multiple Credentials

Access 600 RNE1 and Harmony Series Locks from Corbin Russwin and Sargent
August 1, 2017

Combining the convenience of Integrated Wiegand system architecture with the heightened security and flexibility of HID Global’s iCLASS SE® technology, the Access 600® RNE1 and Harmony® Series locks from ASSA ABLOY Group brands Corbin Russwin and Sargent combine all standard control components into a single device.


Read More
Previous 1 2 … 36 37 38 39 40 41 42 43 44 … 60 61 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security
    Sponsored byAMAROK LLC

    How an Investment in Security Can Prevent Unplanned Expenses

  • solar enews
    Sponsored byAxis

    Sustainably meeting the security and operational needs of solar farms

  • clouds in sky
    Sponsored byMilestone Systems

    Smaller School Districts are Facing Infrastructure Growing Pains

Popular Stories

Cybersecurity-lock.jpg

47% of all internet traffic came from bots in 2022

criminal-on-laptop.jpg

T-Mobile confirms second data breach in 2023

multicolored text on black screen

ScanSource suffers ransomware attack

globe

Understanding cybersecurity trends and regulations in a global world

drone flies over landscape

Technology hones physical security threat assessments

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

June 6, 2023

Measure What Matters: The Top 10 Reports Every Security Leader Should Have

Are you ready to elevate your security game and take charge of your data-driven decision-making? As today's industry leaders know, data is key to driving impact and success.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
May 2023 Webinar

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing