This hefty, 5-ft robot could replace your security guards
The K5 may not exactly be the real-life R2-D2 that you've been looking for, but it sure does promise to take physical security surveillance to the next level.
Honeywell-UTC talks may have failed, but market still up for mergers
Recent reports of Honeywell's intention to strike a deal with UTC that did not see light of day strengthen market speculations on more M&A activities in the security industry.
Advancements in biometrics make a breakthrough in school applications in Pakistan
Advancements in biometric technology can be seen over the past few years, with more accurate identification and easier to use systems, which in turn have led to wider applications for the technology.
Public transport bets on biometrics to boost safety and efficiency
The use of biometric technology is becoming increasingly popular in public transport, as issues like the on-train shooting in France spark debate on methods to ensure better protection for travelers.
How security drives data-driven decision-making at chain stores
With retail becoming increasingly competitive, operators all find themselves asking the same question: how to retain existing customers and bring even more customers to grow their business. To that end, security can help collect important data that improves operators' sales and marketing.
How to minimize cyberthreats in IP-based physical security systems
Companies have gradually started to change the architecture of their solutions in order to avoid cyberthreats. One approach is to change the security solution architecture in a way that will minimize the number of potential breach points.
How secure is surveillance data accessed on mobile apps?
Mobile apps that can provide access to security solutions have become a standard facility for most solution providers. Such ‘on-the-go' access does raise some concerns, however, especially with regard to protecting surveillance data from unwanted, third-party access.
What makes video effective in chain store shrink prevention
A major challenge chain operators deal with is shrinkage, or losses from employee/customer theft and other management issues. As a result, operators turn to video surveillance to prevent such losses. This article explores some of the features that make video surveillance for chain applications effective, and caveats that installers should be aware of.
What are the common vulnerabilities of IP-based physical security systems for cyber intrusion?
In today's connected world, IP-based systems offer numerous breach points for cyber-attacks. Ironically, physical security systems based on IP infrastructure are among the most vulnerable systems to be attacked due to low awareness and limited offering of “hardened” security solutions.
Key functions of mobile apps for surveillance
Mobile apps have become an integral part of most security solutions, but their abilities could vary depending on the manufacturer. Customers would do well to know some key functions that should be included in an app.
Robots in physical security – down the road, but still not close
VIVOTEK demos compression, intelligent solutions at secutech
Hunt integrates IoT devices with NVR
Startup companies: financing the dream
Seagate on how to choose an HDD and customer feedback on SRS
Will 5G be the answer to mainstream connected devices?
Safran to sell Morpho Detection to Smiths Group
Copyright © 2016. Messe Frankfurt New Era Business Media Ltd. All rights reserved.