Articles Search Results

170 Articles and 1 related Products found for attack
  • Magal acquires WebSilicon to expand into cyber security
    Magal Security Systems announced that it is expanding its business proposition with integrated physical-cyber protection solutions. As part of this strategy Magal acquires Websilicon - an Israeli-based company in the rapidly growing network management and monitoring markets.
    Editor / Provider: Magal Security Systems | Updated: 2013 / 1 / 24
  • Rob banks of security threats
    Banks are responsible for the security of countless personal, corporate and national assets, making them obvious targets. Conditions in today's economy unfortunately attract more unwanted attention to vaults and online transactions, and financial institutions are demanding more up-to-date security s
    Editor / Provider: By Christina Phillips, a&s International | Updated: 2012 / 11 / 26
  • Access solution helps keep people and assets safe at Greek Stadia
    As the spiritual home of the Olympic Games, Greece has a well-cemented connection with the spectacle of sports events and a great appreciation for the excitement of public stadia. With a population of over ten million people, modern Greece continues to enjoy live sporting events but also has to deal
    Editor / Provider: TDSi | Updated: 2012 / 11 / 14
  • Spanish pharmacy enhances management efficiency via Axis solution
    The drugstore owned by Pharmacist Alfreo Castello is a family business that has been operating for over 40 years. Taking advantage of a remodeling and renovation of the store in May 2011, they decided to incorporate a series of security and management technologies in order to turn the location into
    Editor / Provider: Axis Communications | Updated: 2012 / 9 / 24
  • Honeywell Security unveils seismic vibration sensor for financial, retail sectors
    Honeywell announced the release of the SC100 Series Seismic Vibration Sensors designed for the protection of high-value assets in financial, retail and other applications. The series includes two compact, high security sensors: the SC100 and the SC105. The SC100 detects heat and vibrations resulting
    Editor / Provider: Honeywell Security | Updated: 2012 / 9 / 6
  • Two Japanese airports pilot ultrasonic fingerprint scanning
    Airports around the world are faced with two daunting tasks—maintaining rigorous levels of security and delaying passengers as little as possible. In the years following the terrorist attacks of 9/11, airport security has been heightened, not only in the U.S. but around the world. Most officials and
    Editor / Provider: Securiport | Updated: 2012 / 9 / 5
  • HID Global Expands Crescendo Smart Card Portfolio
    HID Global announced its new Crescendo C1150 smart card suite of credentials that provide a standards-based solution across a broad range of converged logical and physical access applications. The C1150 can be used for two-factor authentication for PC login and for accessing virtual private networ
    Editor / Provider: HID Global | Updated: 2012 / 8 / 24
  • 2012 Africa Cup of Nations Security Project
    The Africa Cup of Nations is the main International Football Association competition in Africa. It is sanctioned by the Confederation of African Football (CAF), and was first held in 1957. Since 1968, it has been held every two years. The 2012 Games will be held in Gabon and Equatorial Guinea. I
    Editor / Provider: Magal Security Systems | Updated: 2012 / 7 / 10
  • Costa Rica Judiciary Relies on Milestone Protection
    Milestone XProtect open platform IP video management software (VMS) has been implemented in more than 30 government judicial buildings in Costa Rica. The new surveillance system is the foundation for defense against violence for judicial employees to be less vulnerable to the risk of attacks in the
    Editor / Provider: Milestone Systems | Updated: 2012 / 6 / 28
  • Communication Crucial to Metro Security
    Metro stations require numerous sensors to detect behavior in different areas. Processing the data from these sensors takes time and, in many cases, is done manually by operators. “Additionally, the operator then has to manually locate the video camera(s) nearest to the sensor location to verify wha
    Editor / Provider: Tevin Wang | Updated: 2012 / 7 / 5

asmag.com provides weekly and monthly e-Newsletters which include the latest security industry news, vertical solution case studies and product information.



Please key in code