This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
    • Newsletter
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » security technology

Articles Tagged with ''security technology''

This printer provides professional, high-quality card printing suited for all organizations

Product Showcase: Visitor Management Solutions

June 1, 2015

ISC West, the largest physical security tradeshow in North America, once again was home to more than 10,000 new product introductions. Here are a few of the visitor management solutions introduced this year, from smart card readers to ID badges and more.


Read More
Cameras are positioned at stations throughout the San Diego transit system. Photo courtesy San Diego MTS

Security on Mass Transit to Improve Service and Reduce Crime

zalud-2016-200px.jpg
Bill Zalud
May 1, 2015

For Chanda Litten, light rail in Sacramento is the way to get around although she was sometimes faced with characters who made her uneasy. “It’s really dark, and you see some undesirables,” she reported to a local TV station. “It doesn’t happen often, but when it does it can be very scary.” Norm Leong, the head of Regional Transit Police in Sacramento, California, plans to improve the system through use of more video and patrol coordination with local police.


Read More
Cameras are now body worn and can be helpful for officers and others. Photo courtesy KJB Security

Tactics for Better Covert Video Surveillance

zalud-2016-200px.jpg
Bill Zalud
May 1, 2015

There are times and situations when security executives or law enforcement need to mount a covert investigation or monitoring event that may include cameras, sometimes infrared and low light, or audio.


Read More
surveillance 1 feat

Finding the Right Technology to Unlock Cloud and Mobile Surveillance

Robert Liscouski
Bob Liscouski
May 1, 2015

Businesses have listened to staff and abandoned in-house developed tools in favor of consumer products and ubiquitous software-as-a-service (SaaS) capabilities. They want to exploit the benefits that extensive R&D and manufacturing can bring and are willing to trade off the minor compromises that come with standardized solutions. Also, security managers are starting to ask why sites can’t be secured in the time it takes to add a Dropcam to their home network…


Read More
Tribrid NDVR from WatchNET

Upgrade to Megapixel HD without Running New Wires

April 1, 2015

This technology allows enterprise security leaders to retain their original investment in the wiring and cabling infrastructure of their existing surveillance system while upgrading to 1080p Full HD (2.1MP) cameras.


Read More
ISC West 2015 Product preview

ISC West 2015 Product Preview

March 1, 2015

In the midst of mergers and acquisitions, there is still plenty of innovation and energy within the security industry, and enterprise security executives are in a position to benefit. As more and more end users attend the annual ISC West conference April 15-17 in Las Vegas, more focused solutions find their way to the forefront of booths, as manufacturers outline not only the technical aspects but the integration possibilities, risk mitigation benefits and problem-solving features of their new solutions for active end users.


Read More
Sensors in the driveway at The Castle are integrated with the front positioned PTZ camera so when an alert is detected the camera will pan in that direction and record the action.

Recording New Revenue with Surveillance Cameras at The Castle

diane-2016-200.jpg
Diane Ritchey
January 7, 2015

Known as Music City USA, Nashville attracts artists from nearly every genre of music and from all corners of the globe. The community boasts approximately 200 recording studios as well as the supporting spinoff industries such as booking agencies, publishing companies, trade publications and more.


Read More
Surveillance Strategies Liscouski default

Right-Sizing Technology for Agile Surveillance Success

Robert Liscouski
Bob Liscouski
January 7, 2015

 In recent years, “cyber” has monopolized most of the serious coverage in the security industry, and rightly so, given the underprepared stance of many government and commercial organizations in the face of persistent “leakage” of information and malicious attacks. Yet too often, the equivalent dialogue around physical security has been disappointingly predictable. The industry fixates on pixel counts and IP versus analog. The more enlightened may debate the benefits of the latest breakthrough technology or an attempt at greater industry cooperation. At this point, insert “video analytics” and “ONVIF interoperability,” or any one of a hundred themes. 


Read More
Enterprise Services

Security Officers or Video Surveillance: Your Best Option

Tory-Brownyard
Tory Brownyard
December 1, 2014
It just takes a walk through the exhibit hall at any security convention to see the technological advances and growth of video monitoring technology. From thermal imaging and panoramic technology to enterprise surveillance systems, video monitoring becomes more and more sophisticated every year. Today’s systems incorporate “smart” cameras, boast internal storage and embedded analytics, and can stream to virtually any mobile device.  

Read More
video

Making the Best System from Best of Breed Technology

John Grabowski
October 28, 2014
The integration of formerly disparate technologies surely represents a change in the landscape for enterprise level systems design and deployment.
Read More
Previous 1 2 … 53 54 55 56 57 58 59 60 61 62 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • doctor with cellphone.jpg
    Sponsored byAxis

    How remote patient monitoring safeguards patient care and optimizes workflows

Popular Stories

SEC Top Cybersecurity Trends of 2023 header

Top cybersecurity trends of 2023

mall decorated for christmas

Data breach and identity protection concerns are at an all-time high

digital fingerprint

Digital fatigue is increasing cyber risks in modern workplaces

computer with green vertical text

Organizations face an average of 86 ransomware attacks annually

ChatGPT on computer

Security leaders discuss ChatGPT DDoS attack

SEC AuditBoard webinar

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

June 29, 2023

From Crisis Response to Proactive Defense: Shifting the Paradigm of Threat Intelligence

In today's rapidly evolving security landscape, organizations face an ever-growing array of disruptive events, security threats and risks. Traditional reactive approaches to security intelligence often leave businesses vulnerable and ill-prepared to anticipate and mitigate emerging threats that could impact the safety of their people, facilities or operations.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
LinkedIn

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing