Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Technologies & Solutions

Technologies & Solutions
Technologies & Solutions RSS Feed RSS

hotel implementation of cloud-based access control

Arena Del Mar Hotel deploys digital keys and cloud-based access management

July 23, 2021

Arena Del Mar Hotel’s adoption of Mobile Access via integration with Access Management represents the industry’s latest evolution toward simultaneously maximizing guest safety and convenience while boosting operational efficiency.

 


Read More
Case study moving to a cloud-based security platform

Nebraska non-profit, Together, boosts security with cloud platform

July 22, 2021

To streamline the security infrastructure, the non-profit organization turned to a unified cloud platform that would integrate with its existing technologies and allow for scalability and future growth.


Read More
Latvia Concert Hall uses AI-driven analytics for security

Concert Hall Latvia uses AI-driven analytics to secure facility during lockdown

July 22, 2021

Securing a cultural center in Ventspils, Latvia, includes a responsive security system to keep the building safe in lockdown as well as when the hall opens again.


Read More
mass transit antimicrobial air treatment approved

EPA approves mass transit air treatment for virus-born particles in several states

July 21, 2021

The U.S. Environmental Protection Agency (EPA) approved an antimicrobial air treatment system for intrastate transit and transportation applications in Texas, Nevada, Pennsylvania and Maryland. 


Read More
Las Vegas resort implements turnstiles for employee access management

Resorts Las Vegas deploys turnstiles for perimeter protection

July 21, 2021

The first integrated resort to be built on the Las Vegas Strip in over a decade with a grand opening in June 2021, Resorts World Las Vegas, has deployed turnstiles for perimeter protection. 


Read More
artificial intelligence a security practitioner's roadmpa

A security practitioner’s roadmap to artificial intelligence

Dan Dunkel
Dan Dunkel
July 19, 2021

Artificial Intelligence impacts the physical security industry directly when you consider that surveillance cameras are the ultimate end-point device, the “all-seeing eyes” of the Internet. Could “intelligence” be applied to optimize security operations? Learn from one security leader’s experience using AI to reduce tailgating and streamline security operations.


Read More
Grand Hyatt in Saudi Arabia goes to digital key experience

Grant Hyatt in Saudi Arabia implements contactless digital key tech

July 16, 2021

In an effort to provide a safe alternative to front desk check-in and guestroom entry, the Grand Hyatt Al Khobar Hotel and Residences in Saudi Arabia has deployed contactless digital key technology.


Read More
SEC0721-ProdSpot-Feat-slide1_900px
Product Spotlight

Product spotlight on IP video surveillance

A sampling of the latest IP video surveillance solutions.
Maria Henriquez
July 16, 2021

Switching from analog to IP-based cameras can offer more reliable security and added value for your business, providing higher resolutions to cover larger areas or get more detailed images to meet identification requirements to deliver vital business data and increase surveillance efficiency, all with potential for integration. Here is a sampling of the latest IP video surveillance solutions.


Read More
Port of Seattle bans facial recognition

Port of Seattle Commission bans facial recognition

July 14, 2021

The Port of Seattle Commission has voted to ban the use of biometric technology for surveillance and security purposes by government and law enforcement on all its properties, which include the downtown port and Seattle-Tacoma International Airport.


Read More
reimagining biometric access for customer authentication

Using biometrics to reinvent customer authentication

Simon Marchand
July 14, 2021

AI-enabled biometrics can help in the fight against deception for its ability to authenticate customers securely and accurately over the phone.


Read More
Previous 1 2 … 52 53 54 55 56 57 58 59 60 … 210 211 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing