Articles Search Results

3898 Articles and 2919 related Products found for ID
  • New LILIN Surveillance System installed at The Academy, Selsey
    After the school's video surveillance system was destroyed by fire, a new installation was required. As the school was successfully using a Merit LILIN security system for a number of years before the fire, it had every confidence in continuing to use LILIN, with work being completed by Calibre Comm
    Editor / Provider: Merit LILIN | Updated: 2017 / 1 / 16
  • Matrox Maevex launches 6100 quad encoder card
    Matrox has announced the immediate availability of the next generation of Matrox's H.264 AV-over-IP portfolio, the Matrox Maevex 6100 quad encoder card.
    Editor / Provider: Matrox Graphics | Updated: 2017 / 1 / 16
  • ISONAS kicks off new year with Pure Access 2.0 software platform
    Launched in 2016, Pure Access, is a family of leading access control software products comprised of a fully hosted platform, Pure Access Cloud and an on-premise option, Pure Access Manager. Pure Access provides a complete access control platform allowing for full installation, administration and man
    Editor / Provider: ISONAS | Updated: 2017 / 1 / 16
  • Tyco Security Products guards college in Florida
    Tyco Security Products offers protection for valuable assets and safety for students and staff at the ATC, which is part of Daytona State College and located on Williamson Boulevard, near LPGA Boulevard in Daytona Beach, Fla.
    Editor / Provider: Tyco Security Products | Updated: 2017 / 1 / 13
  • Tascent introduces breakthrough iris and face recognition system
    Tascent, a biometrics and identity innovation company, introduced Tascent InSight One, a new class of iris and face recognition system designed for high throughput enrollment, identification, and authentication.
    Editor / Provider: Tascent | Updated: 2017 / 1 / 13
  • Aimetis Symphony provided functionality and scalability to 174th Fighter Wing
    174th Fighter Wing needed an intelligent security system to be engineered, furnished, installed and implemented, which would provide day and night perimeter boundry protection while constantly recording and analyzing the high interest pieces in the interior of the base.
    Editor / Provider: Aimetis | Updated: 2017 / 1 / 13
  • The Mirai attack on embedded devices could just be the beginning
    The Mirai malware that attacked about 500,000 connected devices last year could just be the beginning of a new kind of hacking activity and could lead to other more advanced attacks in the future, according to a security research and advisory company.
    Editor / Provider: Prasanth Aby Thomas, Freelancer | Updated: 2017 / 1 / 13
  • Top identity technology trends to watch for in 2017
    Identity management has become an important topic given more physical and cyber threats faced by organization nowadays, and more advanced technologies have been rolled out to facilitate users. In this regard, HID Global named mobile credentials, cloud and IoT as some of the top trends in the identit
    Editor / Provider: William Pao, a&s International | Updated: 2017 / 1 / 12