Articles Search Results

832 Articles and 23 related Products found for networks
  • Russian bank opts for AxxonSoft security software
    The North-Western Bank of the Sberbank of Russia has the most extensive branch network in the region, with more than a 1,000 branches. Not only does the bank keep up with the modern market trends, but it actually goes ahead of them, showing utmost confidence in the world of rapidly changing technolo
    Editor / Provider: AxxonSoft | Updated: 2 / 22 / 2016
  • How to minimize cyberthreats in IP-based physical security systems
    Companies have gradually started to change the architecture of their solutions in order to avoid cyberthreats. One approach is to change the security solution architecture in a way that will minimize the number of potential breach points.
    Editor / Provider: Israel Gogol, Freelancer | Updated: 2 / 22 / 2016
  • Xtralis smoke detectors to protect new theme park
    VESDA-E VEA addressable smoke detectors provide over 2,000 sampling points for critical fire prevention at the world's largest indoor theme park, an architectural marvel with 1.5M sq. ft. of space
    Editor / Provider: Xtralis | Updated: 2 / 22 / 2016
  • How secure is surveillance data accessed on mobile apps?
    Mobile apps that can provide access to security solutions have become a standard facility for most solution providers. Such ‘on-the-go' access does raise some concerns, however, especially with regard to protecting surveillance data from unwanted, third-party access.
    Editor / Provider: Prasanth Aby Thomas | Updated: 2 / 18 / 2016
  • What makes video effective in chain store shrink prevention
    A major challenge chain operators deal with is shrinkage, or losses from employee/customer theft and other management issues. As a result, operators turn to video surveillance to prevent such losses. This article explores some of the features that make video surveillance for chain applications effec
    Editor / Provider: Israel Gogol, Freelancer, and William Pao | Updated: 2 / 16 / 2016
  • Key functions of mobile apps for surveillance
    Mobile apps have become an integral part of most security solutions, but their abilities could vary depending on the manufacturer. Customers would do well to know some key functions that should be included in an app.
    Editor / Provider: Prasanth Aby Thomas | Updated: 2 / 9 / 2016
  • Key identity management trends for 2016
    In essence, an autonomous vehicle comes with a variety of sensors that are also found in the security world. Together, they serve as the “eyes” and “ears” of the automobile to avoid obstacles, prevent accidents, and inform the driver of the state of the vehicle.
    Editor / Provider: William Pao, a&s International | Updated: 2 / 4 / 2016
  • Mobile guestroom entry offers a highly customized experience
    One concern voiced by some hoteliers about mobile key technology is that this will create further distance between the hotel and the guest, who will no longer interact with the hotel so much. However, this is a misconception, as mobility enhances the customer experience.
    Editor / Provider: William Pao, a&s International | Updated: 1 / 28 / 2016