This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Keywords » mobile surveillance

Items Tagged with 'mobile surveillance'

ARTICLES

smartphone2-900px.jpg

Workplace Emergency Planning is Shifting, But Employees Don't Feel It's a Priority

February 26, 2019

The 2019 Workplace Safety and Preparedness Survey from Rave Mobile Safety discusses the latest state of safety in the corporate environment, as well as what communication changes companies have made and what shortcomings still exist from the last year.


Read More
Enables Instant Mobile Surveillance Access

Enables Instant Mobile Surveillance Access

Mobile Surveillix NVR from Toshiba Surveillance & IP Video Products
December 1, 2016

This free mobile viewer, available for iOS devices, enables security professionals to gain instant access to their Toshiba Surveillix DVR or NVR.


Read More
surveillance 1 feat

Finding the Right Technology to Unlock Cloud and Mobile Surveillance

Liscouski 200px
Bob Liscouski
May 1, 2015

Businesses have listened to staff and abandoned in-house developed tools in favor of consumer products and ubiquitous software-as-a-service (SaaS) capabilities. They want to exploit the benefits that extensive R&D and manufacturing can bring and are willing to trade off the minor compromises that come with standardized solutions. Also, security managers are starting to ask why sites can’t be secured in the time it takes to add a Dropcam to their home network…


Read More
Cameras played a crucial role in protecting the New York Marathon along its route. Solutions included easy-setup wireless cameras. Photo courtesy of Sony

Less is More with Wireless Cameras

Zalud 2016 200px
Bill Zalud
April 1, 2015

Even though Wilson Kipsang focused on winning the race, wireless video, among other security efforts, covered his back at the recent New York Marathon. Turn on a kitchen light, and thank a wireless camera for keeping the electric utility’s substation up, running and pumping out those kilowatts. And that No. 8 bus to work? Passengers can lean back in their seats knowing security personnel can view the inside scene in real-time all along the route.


Read More
Clouds

Incorporating Mobile Surveillance Options

Keven Marier
January 2, 2013
The two-way Motorola radio has been the cornerstone of real-time communications for the emergency response and security industry for nearly a century, and is soon to be complemented by smartphone technology. However, the smartphone isn’t going to be used for real-time voice, but will instead be a “must have” device for surveillance operations.
Read More
Wireless devices with security camera views

Using Wireless Surveillance for Tough Applications

Zalud 2016 200px
Bill Zalud
January 2, 2013
First of all, it is better to hard-wire security video, especially when it comes to megapixel cameras. But there are times, locations and missions where wireless makes the best sense.
Read More
Subscribe For Free!
  • eMagazine Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • hacking vital data
    Sponsored byConvergeOne

    Securing Vital Data through a New Age of Cyberattacks

Popular Stories

casino

Casino security on the Las Vegas Strip

police-alert-freepik1170x658v5.jpg

DHS issues national terrorism alert

docs-freepik1170x658v2.jpg

Microsoft Office zero day vulnerability discovered

cyber-password-freepik1170x658v4.jpg

Four ways cybercriminals can hack passwords

domain-name-freepik1170x658v.jpg

4 emerging threats in the domain name landscape

Clear Seas Research

Events

October 28, 2021

Ransomware Readiness: The Rise of Double and Triple Extortions

Ransomware and the propulsion of the extortion economy has rapidly eclipsed into a national priority. Recently, we observed the catastrophic impact of a widescale ransomware attack impacting gas pipelines and raising national gas prices overnight.
June 29, 2022

How to Build and Scale a Security Operations Center (SOC)

Security Operations Centers (SOCs) are a crucial component of safety and security culture. They support many strategic business objectives, from lowering costs and minimizing risk to improving employee trust and morale.

View All Submit An Event

Poll

Business Travel Security

Does your organization plan to reintroduce business travel in 2022?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products

Clear Seas Research

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2022. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing