This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » security technology

Articles Tagged with ''security technology''

Government Building

Securing ‘Uncle Sam’

Diane 2016 200
Diane Ritchey
Laura Stepanek
September 13, 2011
Kansas City, Missouri. Edmonton, Alberta, Canada. Nashville Metropolitan Government. And Hennepin County, Minnesota. Four different government agencies that vary in size, physical characteristics, geography, history and culture. But the security directors responsible for securing these municipalities are finding common ground in their unique needs and challenges, which include funding, meeting demanding constituent needs and having the right technology.
Read More
City of Orlando article feature image

Expanding Video System Continues Watch on Orlando Area

September 1, 2011
Throughout Orlando and Orange County, Florida, video cameras help law enforcement ensure safer streets and more livable neighborhoods. Implementation of the area’s IP-based video surveillance system began about two years ago, starting small with approximately 17 cameras in the first phase. Since then, the number of cameras has grown to 150 active cameras in a regional video system covering the city of Orlando and Orange County. Keeping in step with technology and municipal security needs, the cameras in use have migrated toward higher-resolution models.
Read More
Monarch of the Seas

Full Steam Ahead

Heather Klotz-Young
July 1, 2011

For the last four years, Axis Communications Inc., Chelmsford, Mass., has hosted the members of its A&E program at an annual technology summit. This year, the Axis A&E Technology Summit 2011 begin at the Rosen Shingle Creek Resort in Orlando, Fla., and then took to the high seas, as attendees enjoyed a three-day cruise to the Bahamas aboard the Royal Caribbean’s Monarch of the Seas vessel.


Read More
Web Exclusive Logo

Moving to a New, Portable Model for Secure Identity

Brad Jarvis
May 10, 2011

We often confuse the concept of identity with the card that carries it, but in reality, “identity” can reside on a mobile phone, a USB stick, or some other medium. 


Read More
Access ID feature

It’s Cool! But Is It Right For You?

Brent Mast
May 1, 2011

I joke about people who are easily distracted and enamored by shiny objects with flashing lights.


Read More
Campus News Feature

Security & SDM Campus News April 2011

April 1, 2011
These news articles contains information on security issues and solutions on college campuses.
Read More
Security Newswire

Finding That Face in the Crowd: Learn About the Myths and Realities of Facial Recognition at ISC West!

March 8, 2011

Facial recognition and video based biometrics continue to be a hot topic with security professionals. While shows like CSI, Law & Order and 24 make it seem that technologies exist that can pick a terrorist out of a crowd in Times Square or spot a criminal the moment he steps foot on the street, the reality is that we're not quite there...yet.


Read More
low light camera

See Color in Dark Settings

March 3, 2011

Cameras in the OnSIP™ IP camera series from Speco Technologies allows you to see color in close to dark situations. Technology in the cameras allow you to amplify existing light such as the moon, stars, vending machine light, exit signs and more in order to view dark scenarios. 


Read More

Biometrics Redefined

Ronald Hawkins
January 1, 2011
At many buildings and installations, biometric technology is a key component of the security system.
Read More
sec1210featureonedoor

One Door at a Time

Zalud 2016 200px
Bill Zalud
November 29, 2010
Whether it’s a church door, an entrance into a high-tech Internet company or admission to a local police station, enterprise security leaders often view the application of access control technology one door at a time.
Read More
Previous 1 2 … 53 54 55 56 57 58 59 60 61 Next
Subscribe For Free!
  • eMagazine Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security camera
    Sponsored byAxis

    The power of analytics in surveillance: What can they do for you?

  • security office
    Sponsored byExperian

    Taking a Personal Approach to Identity Will Mitigate Fraud Risk & Ensure a Great Customer Experience

  • Cloud Security
    Sponsored byConvergeOne

    The Next Frontier of Security in the Age of Cloud

Popular Stories

Top cyber security conferences 2023

Top cybersecurity conferences of 2023

Top security conferences of 2023

Top security conferences of 2023

health care data privacy

The outlook for healthcare cybersecurity in 2023

Cyber tactics

2023: The year for contextual cyber threat intelligence

Campus security officer

Considerations for security officer training in healthcare facilities

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

February 16, 2023

Executive Protection for Hospitals and Healthcare Facilities

A head of state needs heart surgery at your facility. High-profile members of a national sports team are getting updated vaccinations. What do you do when you get the call?

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security Most Influential

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing