Articles Search Results

125 Articles and 1 related Products found for attack
  •   Eagle Eye Networks launches Eagle Eye Contract Vault
    Eagle Eye Networks announced the Eagle Eye Contract Vault, a complete cloud based system for recording and archiving video of important business transactions.
    Editor / Provider: Eagle Eye Networks | Updated: 10 / 27 / 2016
  • Integrating access control in the age of IoT
    As the complexity and power of access control devices increase to a level seen on IP cameras, their security becomes more important.
    Editor / Provider: Prasanth Aby Thomas | Updated: 10 / 13 / 2016
  • What trends are next for oil and gas security?
    Despite being a volatile year for the oil and gas industry, it is keeping up with security investments as a result of increasing threats. To keep up with rising company expectations, security providers and integrators need to adapt to change, whether it be via incorporating more trending technology
    Editor / Provider: Eifeh Strom, Freelancer | Updated: 10 / 14 / 2016
  • Surveon protects governments with high C/P value solutions
    Unlike private sectors, these official institutions can easily become a target for tempted malicious attack by people who might possess strong and negative emotions toward the governments. Despite the fact that these buildings are often guarded with more security staff with arms, it is even more tha
    Editor / Provider: Surveon Technology | Updated: 9 / 29 / 2016
  • Comelit opening doors in Leeds
    Q One and Q Two are both former office blocks that have been repurposed in carbon-friendly projects to utilize the existing structures of the buildings.
    Editor / Provider: Comelit | Updated: 9 / 27 / 2016
  • Complexities of converging IT, OT and physical security
    When considering bringing together silos of physical and cyber security, it is important to understand the various nuances involved, according to Michael Assante, Director of ICS at the SANS Institute.
    Editor / Provider: Prasanth Aby Thomas | Updated: 9 / 20 / 2016
  • Gallagher releases new Class 5 End of Line Module (ELM)
    High value and sensitive assets are normally protected by intruder alarm systems, using three to four state analog monitoring to detect sensor tampering. Without a Class 5 ELM, sites are susceptible to sophisticated attacks, rendering high value assets unprotected.
    Editor / Provider: Gallagher | Updated: 8 / 4 / 2016
  • What's lacking in nightclub security?
    Two people were killed and 16 wounded in a shooting at a nightclub in Fort Myers, Florida this week. It follows the another attack by a gunman on a gay nightclub six weeks ago that left 49 people dead.
    Editor / Provider: Prasanth Aby Thomas | Updated: 7 / 26 / 2016
  • How to determine your cyberthreat
    In today's connected world, IP-based security systems offer numerous breach points for cyberattacks. The vulnerability of these systems is quite a conundrum, so the biggest question is how we can make these physical security systems more secure.
    Editor / Provider: a&s Editorial team | Updated: 7 / 25 / 2016 provides weekly and monthly e-Newsletters which include the latest security industry news, vertical solution case studies and product information.

Please key in code