Articles Search Results

386 Articles and 1 related Products found for attack
  • Why data center security should come in layers
    Data centers have become an increasingly important business, as enterprises acquire more and more servers to host their data. Amidst this trend, the need to keep data centers secure from physical and cyber attacks has become critical. While different defense mechanisms have been proposed, most agree
    Editor / Provider: William Pao, a&s International | Updated: 2016 / 8 / 17
  • EMEA market: balancing between security and privacy
    One unique feature about the European market is that it's really into privacy. There are privacy laws and regulations dictating how personal data is to be gathered and used, and failure to compliance results in hefty fines. As a result security companies come up with solutions to address that need.
    Editor / Provider: William Pao, a&s International | Updated: 2016 / 8 / 16
  • Gallagher releases new Class 5 End of Line Module (ELM)
    High value and sensitive assets are normally protected by intruder alarm systems, using three to four state analog monitoring to detect sensor tampering. Without a Class 5 ELM, sites are susceptible to sophisticated attacks, rendering high value assets unprotected.
    Editor / Provider: Gallagher | Updated: 2016 / 8 / 4
  • Canon, Digital Barriers go wireless in city surveillance
    While municipal administrators are tasked with the mission to protect their cities, the cost of running city surveillance programs can be overwhelming, especially installing cameras that are wired. Going wireless, therefore, becomes an ideal alternative.
    Editor / Provider: William Pao, a&s International | Updated: 2016 / 8 / 3
  • What's lacking in nightclub security?
    Two people were killed and 16 wounded in a shooting at a nightclub in Fort Myers, Florida this week. It follows the another attack by a gunman on a gay nightclub six weeks ago that left 49 people dead.
    Editor / Provider: Prasanth Aby Thomas | Updated: 2016 / 7 / 26
  • How to determine your cyberthreat
    In today's connected world, IP-based security systems offer numerous breach points for cyberattacks. The vulnerability of these systems is quite a conundrum, so the biggest question is how we can make these physical security systems more secure.
    Editor / Provider: a&s Editorial team | Updated: 2016 / 7 / 25
  • Texas school district security aided by ISONAS access control
    The Sands Consolidated Independent School District (SCISD) in Ackerly, Texas, had been operating without a security system. There were no cameras to monitor the flow of students, teachers and others coming in and out of the buildings, and there was no access control system to secure school doors. Wi
    Editor / Provider: ISONAS | Updated: 2016 / 7 / 22
  • iluminar lighting increases security and efficiency at US borders
    iluminar, the specialist manufacturer and supplier of infrared (IR) and white light illuminators, was selected by Van Cleve & Associates to provide strategic LED illumination for US Government border control.
    Editor / Provider: iluminar | Updated: 2016 / 7 / 19
  • PROTEC2 CLIQ helps to keep power flowing to North-West England
    Electricity North West is the distribution network operator for the North-West, England. The company serves around 5 million people via 57,000 km of overhead lines and under- ground cables, and more than 34,000 transformers.
    Editor / Provider: Abloy UK | Updated: 2016 / 7 / 15

asmag.com provides weekly and monthly e-Newsletters which include the latest security industry news, vertical solution case studies and product information.



Please key in code