This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
Security Magazine logo
  • MAGAZINE
    • Digital Edition
    • This Month's Issue
    • Archives
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
    • Call for Entries
  • CONTACT
    • Advertise
    • Editorial Guidelines
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Home » Keywords » security systems

Items Tagged with 'security systems'

ARTICLES

get more out of your access control system

Get more out of your access control

Jonathan lach portrait hi res 18922
Jonathan Lach
December 29, 2020
No Comments
Enterprises can increase the value of their access control by using these electronic security systems for more than just managing access at the front door.
Read More
k12_900

School Districts in West Virginia Request Security Funds

June 18, 2019
No Comments

The state School Building Authority (SBA) in West Virginia will select several projects for funding during a meeting set for Monday in Charleston, says a news report. 


Read More
Viakoo Camera Firmware Update Manager (CFUM) - Security Manager

Camera Firmware Update Manager (CFUM)

Automates Cyber-Hardening of Surveillance Systems
March 1, 2018
No Comments
Viakoo’s Camera Firmware Update Manager (CFUM) module reports on the firmware version currently present in each camera device on the network and can update cameras on older firmware versions to the most recent to mitigate the risk of cyber attacks.
Read More
Protects Outdoor Security Infrastructure from Electrical Surges

Protects Outdoor Security Infrastructure from Electrical Surges

DTK-MRJPOEX from Ditek Surge Protection
August 1, 2017
No Comments

With a NEMA 4X enclosure with weatherproof connectors, the DTK-MRJPOEX from Ditek Surge Protection is built for installation in harsh our outdoor environments.


Read More
Offers Complete Cloud-Based Access Control and Monitoring

Offers Complete Cloud-Based Access Control and Monitoring

Galaxy Cloud Concierge from Galaxy Control Systems
August 1, 2017
2 Comments

The Galaxy Cloud Concierge from Galaxy Control Systems integrates video surveillance, video management, elevator control, locks and turnstiles onto a unified platform.


Read More
Expands Security Infrastructure to Scale from SMBs to Enterprises

Expands Security Infrastructure to Scale from SMBs to Enterprises

Streamvault Security Infrastructure from Genetec
August 1, 2017
No Comments

Genetec is expanding its Streamvault™ (SV) turnkey security infrastructure portfolio to include enterprise-grade servers, workstations and storage solutions, available with Genetec Security Center pre-installed.


Read More
Designed for Long-Distance Security Applications

Designed for Long-Distance Security Applications

NetWaySP8WP Hardened PoE Switch from Altronix
August 1, 2017
No Comments

The NetWaySP8WP Hardened PoE Switch with Dual SFP (Fiber) Ports from Altronix is a cost-effective, all-in-one solution to power security devices over long distances.


Read More
storm-enews

Surge Protection Planning Proves Essential in Security System Design

Bill MacKenzie
July 25, 2017
No Comments
Physical security planning and building system design are ever-evolving fields as technology continues to advance.
Read More
cyber camera

How to Change Behavior for Stronger Security System Cybersecurity

How Healthy Are Your Cybersecurity Habits?
Robert K. Brown
June 27, 2017
No Comments
There is a world of difference between knowing the right thing to do and actually following through and doing it. Think about doctors who repeatedly remind their patients to quit smoking, or to be careful with their cholesterol, to get regular exercise and adopt healthier eating habits instead of eating bacon with every meal. We know what we should do. Quite often, though, that knowledge is not enough to actually change our behavior.
Read More
camera-cyber

Preparing for Inevitable Cyberattacks on Physical Security Systems

Tips on Pre- and Post-Installation Readiness
John Bartolac
June 13, 2017
No Comments
When it comes to potential cyberattacks, the Boy Scouts’ motto says it all: “Be prepared.” In other words, make sure you’re always in a state of readiness. This is especially true when you’re talking about installing multi-component security solutions.
Read More
More Articles Tagged with 'security systems'

EVENTS

Industry

1/19/12
Marriott St. Louis Airport
10700 Pear Tree Lane
St. Louis, MO
United States
Contact: Tom Hanley

1-day Advanced Encoder Training

Axis Communications' Academy's Encoder Training is a technical course developed for system designers, installers and consultants. The course will introduce you to Axis Communications' encoder offering and show you all the benefits of working with video encoders. Read More

Industry

3/15/12
Axis Communications
Denver, CO
United States
Contact: Tom Hanley

1-Day Advanced Encoder Training

Axis Communications' Academy's Encoder Training is a technical course developed for system designers, installers and consultants. Read More

Industry

3/23/12
Webinar
United States
Contact: Tom Hanley

New AXIS Design Tool

The Axis Communications Design Tool has been completely retooled to provide system designers with much more information on Axis Camera installations. Read More

Industry

4/16/12
Webinar
United States
Contact: Tom Hanley

New AXIS Design Tool

The Axis Communications Design Tool has been completely retooled to provide system designers with much more information on Axis Camera installations. Please join us for this demonstration of the powerful new tool from Axis engineered to take the guesswork out of surveillance systems Read More

Industry

4/19/12
Sheraton Read House Hotel Chattanooga
827 Broad Street
Chattanooga, TN
United States
Contact: Tom Hanley

1-Day Advanced Encoder Training

Axis Communications' Academy's Encoder Training is a technical course developed for system designers, installers and consultants. Read More
Subscribe For Free!
  • Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

Close
Sponsored content bnp covid  3j9fmqpy3i  1
Sponsored By
SureView Operations

How command centers are responding to COVID-19

In recent months, I’ve had many different conversations with our customers about how the COVID pandemic has impacted their security operations—from global companies with hundreds of thousands of employees to much smaller organizations with control rooms responsible for local operations and campuses. The overwhelming feedback is that everyone has needed, in one way or another, to change their processes, and expect to continue having to do so for the foreseeable future.

Popular Stories

data breach

Ubiquiti suffers data breach and alerts customers to change passwords

Allied Universal acquires SecurAmerica

Allied Universal acquires SecurAmerica

Social Media for Business

200 million Facebook, Instagram, and Linkedin users' scraped data exposed

The Cyber 101 Discussion

Five cyber threats to watch in 2021

Suburbs of Chicago install gunshot detection solution

Kankakee and North Chicago in Illinois deploy gunshot detection solution for patrol

2.16_SEC_SBS_360X180_customcontent.png

Events

September 24, 2020

Pandemics, Recessions and Disasters: Insider Threats During Troubling Times

ON DEMAND: The insider threat—consisting of scores of different types of crimes and incidents—is a scourge even during the best of times. But the chaos, instability and desperation that characterize crises also catalyze both intentional and unwitting insider attacks. Learn how your workers, contractors, volunteers and partners are exploiting the dislocation caused by today's climate of Coronavirus, unemployment, disinformation and social unrest.

October 28, 2020

Industrial Cybersecurity: What Every Food & Bev Executive Needs to Know

ON DEMAND: There's a lot at stake when it comes to cybersecurity. Reputation, productivity, quality. Join us to discuss the future of your global security strategy and a path forward with trusted partners Cisco and Rockwell Automation, and turn your Food & Bev security challenges into strategic advantages that drive business value.

View All Submit An Event

Poll

Who has ownership or primary responsibility of video surveillance at your enterprise?

Who has ownership or primary responsibility of video surveillance at your enterprise?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security 500 360

The latest news and information

Content written for business-minded executives who manage enterprise risk and security

REGISTER TODAY
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2021. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing