This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
    • Newsletter
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
    • Video Security You Can Trust
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » security technology

Articles Tagged with ''security technology''

Keven Marier

Surveillance ‘In The Dark’

Keven Marier
April 1, 2012
When designing a surveillance system that is to be used in the outdoors, changing lighting conditions are one of the biggest challenges to overcome. So over the past several years, low-light surveillance technology has been growing in importance as a means to improve outdoor surveillance designs, and megapixel imagers have been modified to improve identification.
Read More
Alarm

How Monitored Video Alarms Deliver Insurance Discounts

diane-2016-200.jpg
Diane Ritchey
April 1, 2012
Monitoring makes a difference. Surveillance is not a monitored Video Intrusion Alarm. Security video and DVRs (whether on-site or the newer DVRs in the cloud) provide remote viewing and document what has happened – but their primary use isn’t catching burglars.
Read More
Federal Legislation Loosens Up Regulations

Corporate Use of Drones in U.S. Flying Closer to Reality

Expect Corporate and Law Enforcement Applications
February 18, 2012

President Obama just signed legislation which directs the Federal Aviation Administration to create regulations to allow greater use of unmanned aerial vehicles in the U.S.


Read More
Keven Marier

Scalable? No Problem

Keven Marier
December 1, 2011
How well a hardware or software platform can adapt to increasing demands defines the term scalability. This term is becoming the de facto reason why the security industry has been replacing older DVRs with newer storage solutions. The popularity of video encoder devices as standalone appliances versus bundled into the DVR is accelerating this industry shift even further.
Read More
Biometric hand reader

Increases Key Security

September 30, 2011
Biometrics offer an advanced level of security, and hand geometry technology is one of the most accurate technologies.
Read More
Government Building

Securing ‘Uncle Sam’

diane-2016-200.jpg
Diane Ritchey
Laura Stepanek
September 13, 2011
Kansas City, Missouri. Edmonton, Alberta, Canada. Nashville Metropolitan Government. And Hennepin County, Minnesota. Four different government agencies that vary in size, physical characteristics, geography, history and culture. But the security directors responsible for securing these municipalities are finding common ground in their unique needs and challenges, which include funding, meeting demanding constituent needs and having the right technology.
Read More
City of Orlando article feature image

Expanding Video System Continues Watch on Orlando Area

September 1, 2011
Throughout Orlando and Orange County, Florida, video cameras help law enforcement ensure safer streets and more livable neighborhoods. Implementation of the area’s IP-based video surveillance system began about two years ago, starting small with approximately 17 cameras in the first phase. Since then, the number of cameras has grown to 150 active cameras in a regional video system covering the city of Orlando and Orange County. Keeping in step with technology and municipal security needs, the cameras in use have migrated toward higher-resolution models.
Read More
Monarch of the Seas

Full Steam Ahead

Heather Klotz-Young
July 1, 2011

For the last four years, Axis Communications Inc., Chelmsford, Mass., has hosted the members of its A&E program at an annual technology summit. This year, the Axis A&E Technology Summit 2011 begin at the Rosen Shingle Creek Resort in Orlando, Fla., and then took to the high seas, as attendees enjoyed a three-day cruise to the Bahamas aboard the Royal Caribbean’s Monarch of the Seas vessel.


Read More
Web Exclusive Logo

Moving to a New, Portable Model for Secure Identity

Brad Jarvis
May 10, 2011

We often confuse the concept of identity with the card that carries it, but in reality, “identity” can reside on a mobile phone, a USB stick, or some other medium. 


Read More
Access ID feature

It’s Cool! But Is It Right For You?

Brent Mast
May 1, 2011

I joke about people who are easily distracted and enamored by shiny objects with flashing lights.


Read More
Previous 1 2 … 53 54 55 56 57 58 59 60 61 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security
    Sponsored byAMAROK LLC

    How an Investment in Security Can Prevent Unplanned Expenses

  • solar enews
    Sponsored byAxis

    Sustainably meeting the security and operational needs of solar farms

  • clouds in sky
    Sponsored byMilestone Systems

    Smaller School Districts are Facing Infrastructure Growing Pains

Popular Stories

Cybersecurity-lock.jpg

47% of all internet traffic came from bots in 2022

criminal-on-laptop.jpg

T-Mobile confirms second data breach in 2023

multicolored text on black screen

ScanSource suffers ransomware attack

drone flies over landscape

Technology hones physical security threat assessments

multicolor text on black screen

Ransomware is being excluded from cyber insurance policies

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

June 6, 2023

Measure What Matters: The Top 10 Reports Every Security Leader Should Have

Are you ready to elevate your security game and take charge of your data-driven decision-making? As today's industry leaders know, data is key to driving impact and success.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
May 2023 Webinar

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing