Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Technologies & Solutions » New Security Technology

New Security Technology
New Security Technology RSS Feed RSS

Unfolds to Create Ballistic Shield

September 1, 2015

This shield looks like an average laptop bag, but built into it is a lightweight and discreet ballistic shield – a three-foot long blanket of protection against most handgun, shotgun and pistol-caliber sub-machine gun threats.


Read More

Blends Advanced Wireless Access Control and Décor

September 1, 2015

This access control solution offers customizable designer locking form factors in a variety of trims and finishes, pairing with advanced wireless access control on smartphones.


Read More

Designed for IP Setup Simplicity

September 1, 2015

This series of network video recorders (NVRs) come with either 4- or 8-port embedded Power over Ethernet (PoE) switches, and they are pre-configured with video management software and have 2TB and 4TB of storage, respectively.


Read More

Streamlines Security Door Maintenance to Minimize Downtime

September 1, 2015

An update to the existing BoonConnect software tool will enable technicians to access a verity of door functions remotely to resolve issues faster and minimize downtime.


Read More

Provides Personalized Self- Service Venue Management

September 1, 2015

This operational intelligence solution covers many customer service operations processes at venue entries, including welcoming and greeting, access control and ticket validation, marketing and sponsorships, and non-intrusive security screening.


Read More

Provides Intrusion Detection Day and Night

September 1, 2015

This bullet camera combines 24/7 high-contrast thermal video and high-performance built-in video motion detection to provide intrusion detection and visual awareness in daytime and nighttime conditions.


Read More

Detects Verbal Aggression for Smarter Surveillance

May 1, 2015

This audio classification software integrates microphones, select Axis IP cameras and leading video management software to analyze noises through advanced algorithms, detecting specific sounds such as verbal aggression.


Read More

Saves Bandwidth by Adjusting Hallway Surveillance

April 1, 2015

The latest version of this IP bullet camera features low-light technology to reduce motion blur, noise and storage requirements


Read More

Checks Cards at Perimeter or on Patrol

April 1, 2015

This portable reader is a lightweight and rugged hand-held card-reading device for roaming security personnel.


Read More

Quickly Creates Simple Wireless Links

April 1, 2015

Complete with two radios, two mounting brackets and two Power over Ethernet injectors, this point-to-point kit is designed to quickly and cost-effectively create simple wireless links


Read More
Previous 1 2 … 14 15 16 17 18 19 20 21 22 … 26 27 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

Classroom with desks and chairs

School’s Out, But Security’s Not: Preparing for K-12 Summertime Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
The Role of AI and Video - Free Webinar - June 3, 2026

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing