Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Technologies & Solutions

Technologies & Solutions
Technologies & Solutions RSS Feed RSS

Extends Installation Distance to Sensors by Two Meters

April 1, 2015

These thermal sensors can be installed into any location up to two meters away from a single S15D core unit due to flexible video cabling, weatherproof design and a tiny footprint.


Read More

Combines Long-Range Facial Recognition, Surveillance and Attendance

April 1, 2015

This cost-effective access control camera unlocks doors upon positive face recognition once authorized users walk within 12 feet of it.


Read More

Combines Identity Theft Protection and Fraud Monitoring

April 1, 2015
More than 40 percent of respondents in an Experian Data Breach Resolution survey said that they feel that monitoring financial transactions for fraud is too time-consuming, and 71 percent of respondents say they rely heavily on their bank or card issuer alerting them to fraud.
Read More

Verifies Identity Before Allowing Device Access

April 1, 2015

To better protect proprietary or sensitive data, enterprises can utilize this fingerprint-area scanner, which plugs into a USB port and can be used to authenticate users at the device.


Read More

Log Into Devices with Written Biometrics

April 1, 2015

This online security software can authenticate a user logging into a network with 99.97-percent accuracy, according to a company study.


Read More

Facilitates Easier Data Extraction during Investigations

April 1, 2015

This digital forensics tool enables investigators and security professionals tasked with handling risk management and fraud detection to gather evidence in the field more easily.


Read More

Trains Security Officers as EMTs

February 4, 2015

As skyscrapers climb higher and higher, getting prompt medical attention to people in need can be a struggle for first responders.


Read More

Dual Lever Eliminates Additional Hardware

February 4, 2015

When installed on either side of the TRUE Wood RITE Door, these dual levers activate the top latching mechanism, allowing each leaf to operate independently, which eliminates the need for floor strikes, center latches, flush bolts, astragals or coordinators.


Read More

Silently Alarms on Metal Detection

February 4, 2015

This compact tactical hand-held detector (THD) features a highly sensitive 360-degree detection area and a silent vibrating alarm indicator, making it particularly effective for use in schools, bars and clubs, and corporate security programs.


Read More

Simplifies Transition to IP Surveillance

February 4, 2015

These 24-port managed switches, including CLEER’s enterprise-grade version, enable government agencies, enterprises, hotels, casinos and large retailers to gain the benefits of IP security video without having to tip and replace infrastructure to support IP cameras and other IP devices.


Read More
Previous 1 2 … 186 187 188 189 190 191 192 193 194 … 210 211 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing