Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Technologies & Solutions

Technologies & Solutions
Technologies & Solutions RSS Feed RSS

Applies Analytics After Recording for Faster Searches

April 1, 2015

This post-installation video analytics tool enables enterprise security leaders to perform quick and precise analytics on recorded video from security video DVRs, NVRs, IP cameras, NAS devices and more.


Read More

Extends Installation Distance to Sensors by Two Meters

April 1, 2015

These thermal sensors can be installed into any location up to two meters away from a single S15D core unit due to flexible video cabling, weatherproof design and a tiny footprint.


Read More

Combines Long-Range Facial Recognition, Surveillance and Attendance

April 1, 2015

This cost-effective access control camera unlocks doors upon positive face recognition once authorized users walk within 12 feet of it.


Read More

Combines Identity Theft Protection and Fraud Monitoring

April 1, 2015
More than 40 percent of respondents in an Experian Data Breach Resolution survey said that they feel that monitoring financial transactions for fraud is too time-consuming, and 71 percent of respondents say they rely heavily on their bank or card issuer alerting them to fraud.
Read More

Verifies Identity Before Allowing Device Access

April 1, 2015

To better protect proprietary or sensitive data, enterprises can utilize this fingerprint-area scanner, which plugs into a USB port and can be used to authenticate users at the device.


Read More

Log Into Devices with Written Biometrics

April 1, 2015

This online security software can authenticate a user logging into a network with 99.97-percent accuracy, according to a company study.


Read More

Facilitates Easier Data Extraction during Investigations

April 1, 2015

This digital forensics tool enables investigators and security professionals tasked with handling risk management and fraud detection to gather evidence in the field more easily.


Read More

Trains Security Officers as EMTs

February 4, 2015

As skyscrapers climb higher and higher, getting prompt medical attention to people in need can be a struggle for first responders.


Read More

Dual Lever Eliminates Additional Hardware

February 4, 2015

When installed on either side of the TRUE Wood RITE Door, these dual levers activate the top latching mechanism, allowing each leaf to operate independently, which eliminates the need for floor strikes, center latches, flush bolts, astragals or coordinators.


Read More

Silently Alarms on Metal Detection

February 4, 2015

This compact tactical hand-held detector (THD) features a highly sensitive 360-degree detection area and a silent vibrating alarm indicator, making it particularly effective for use in schools, bars and clubs, and corporate security programs.


Read More
Previous 1 2 … 186 187 188 189 190 191 192 193 194 … 210 211 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing