Articles Search Results

4741 Articles and 75 related Products found for Technology
  • Women in the security industry
    a&s talked to several women in security to find out how they got into the industry, why they think there are so few women in the industry, and what we can do to encourage more women to be a part of it.
    Editor / Provider: Eifeh Strom, Freelancer | Updated: 2016 / 9 / 26
  • Promise Vess NVRs certified with Milestone XProtect
    Promise Technology announced that its Vess A2330 and Vess A3340 network video recorders (NVRs) have been certified by Milestone Systems for use with the whole range of XProtect video management software (VMS) products. Both the Vess A2330 and A3340 easily supported the benchmark video data throughpu
    Editor / Provider: Promise Technology | Updated: 2016 / 9 / 26
  • Brisbane's premium student accommodation secured with SALTO
    Surrounded by Universities, English Language Schools and Pathway Institutes, the 158 storey Student One on Adelaide Street residence features a mix of 55 five-bedroom share apartments, 196 studios and 108 twin bed-studios protected by a smart access control system from SALTO, as well as non-intrusiv
    Editor / Provider: Salto Systems | Updated: 2016 / 9 / 26
  • Altronix showcases outdoor NetWay managed PoE+ switches
    Altronix, the recognized leader in power and transmission solutions for the professional security industry, introduces new managed PoE+ indoor and outdoor hardened switches.
    Editor / Provider: Altronix | Updated: 2016 / 9 / 28
  • Altronix premiers new all-in-One EoC solution
    Altronix, the recognized leader in power and transmission solutions for the professional security industry, continues to expand its widely deployed line of eBridge adaptive transmission solutions with the introduction of the eBridge8E 8-Port EoC Managed Receiver with Integral PoE+ Switch.
    Editor / Provider: Altronix | Updated: 2016 / 9 / 27
  • Role of multifactor authentication in integrating access control systems
    Dual authentication is an option in any mixed technology environment, but the technology applied should be determined by the individual use case, according to Martens, Futurist at Allegion. In many circumstances, a smart phone is already validating the identity of the user prior to presenting a smar
    Editor / Provider: Prasanth Aby Thomas | Updated: 2016 / 9 / 23