From pedestrian-filled farmers markets and universities to new and used car lots, a wide variety of agencies find peace of mind through the use of barriers, bollards, barricades and crash gates for vehicle-based physical access control at the perimeter.
Security clearance is given to thousands of people who owe the IRS money.
- By Matt Holden
- Jul 31, 2014
Safe School Week message: Avenues available to fund door hardware upgrades to better protect teachers and students.
North Carolina security dealer provides hosted services and video verification to homeowners and small businesses.
Funds allocated to freight railroad carriers to strengthen ability to protect against threats and to maintain security of critical surface rail infrastructure.
Loss prevention solution for hospitality users of Squirrel POS Software.
Reverse engineered firmware revealed an embedded controller chip that could be the beginning of wreaking havoc on computer systems.
- By Ginger Hill
- Jul 31, 2014
The IT world is beginning to take notice of cloud surveillance solutions. Case in point, industry newcomer Eagle Eye Networks announced today that Dell computer founder Michael Dell has made a multi-million dollar investment in the company.
- By Brent Dirks
- Jul 31, 2014
Adding to their Nova Series line-up, BCDVideo has begun shipments of the BCD350V8 Video Recording Platform, available in either tower or 5U rack-mount formats.
A look at public space surveillance on either side of the Atlantic highlights how it came of age.
- By David Aindow
- Jul 28, 2014
Here is a list to help develop an all-star team of employees that will protect your information.
- By Matt Holden
- Jul 28, 2014
After millions of dollars spent on perimeter security, no alarm sounded and two men were found.
- By Ginger Hill
- Jul 28, 2014
Because it is a public facility that houses a significant and valuable marine life population, Mystic Aquarium was in need of more sophisticated control of access than traditional methods.
Questions still remain about the implementation and effectiveness of this rule.
- By Matt Holden
- Jul 25, 2014
Company secures U.S. Federal Government facilities in Missouri and Massachusetts.
FST Biometrics' In Motion Identification (IMID) software interfaces with the Lenel OnGuard access control security system.
Typewriter sales in German economy boom as tool to thwart cyber spying.
- By Ginger Hill
- Jul 25, 2014
Expanded S2 Channel Partner Program to accelerate partner business growth.
Now a member of AMAG Technology's Symmetry Extended Business Solutions (EBS) Program.
Home access management becomes even more convenient for current and future Kevo owners; gives guests 24-hour access to the home, and sets day and time constraints.