One minute and thirty-six seconds. That’s all it took for seven thieves, both men and women, dressed in hoodies and jackets that adequately concealed their identity, to enter an Apple store in Natick, Massachusetts, in a carefully coordinated heist. They were able to disable security tethers and make off with 19 iPhones, worth about $13,000.
Consolidation, technology, training and partnerships are among the watchwords for security officer firms and their clients as the calendar turns toward 2017.
Searchlight™ for Retail Software from March Networks and RFID Technology from Zebra Technologies
December 1, 2016
The integration of high-definition surveillance video and data from RFID-tagged items allows enterprise security personnel to quickly search events by data, time, brand, product type, serial number of Electronic Product Code, allowing them to see exactly when and how an item entered or left a location.
In order to help enterprise cybersecurity leaders reduce the amount of time spent integrating threat management and monitoring solutions, this solution provides application testing to add proven tool options to IntellaStore II for security, analysis, forensics, or network and application performance monitoring.
Twenty-eight countries teamed up with Europol to thwart organized crime groups involved in trafficking in human beings across the European Union and beyond.
If you are a CSO or head of security, you will inevitably face the day when a senior business executive will ask you for a detailed analysis of your strategy including the level of service you provide and how it will scale over time.
You can have the greatest cameras and video recorders, but without software to manage and analyze the video, you might miss out on the greatest benefits of having a video solution.
Depending on your needs, some video management solutions can use motion detection to prompt events, read license plates on vehicles in a parking lot, detect added or removed objects from a room, and more.