Articles Search Results

141 Articles and 4 related Products found for laptop
  • BIO-key awarded $1.1M enterprise biometric subscription contract by fortune 500 company
    BIO-key International, an innovative provider of biometric software and hardware solutions for strong and convenient user authentication, announced that it has secured an initial $1.1M subscription contract for its enterprise biometric authentication platform with a leading Fortune 500 customer.
    Editor / Provider: BIO-key International | Updated: 2016 / 12 / 28
  • Australian garden store secured by March Networks
    Flower Power Garden Centres, an Australian retailer with 10 locations in the Sydney Metropolitan Area, took a major step toward managing its point-of-sale losses when it acquired a March Networks Searchlight for Retail software solution.
    Editor / Provider: March Networks | Updated: 2016 / 12 / 15
  • Panasonic provides safe environment for US hotel
    Monitoring a large hotel can be a challenging task. Marriott Marquis Hotel needed a security system to keep an eye out trespassers and other incidents. Panasonic was able to equip the hotel with its surveillance system and a facial recognition technology.
    Editor / Provider: Panasonic System Networks | Updated: 2016 / 11 / 30
  • QNAP partners with AMD to launch TVS-x73 NAS
    QNAP Systems have partnered with Advanced Micro Devices (AMD), and announced the release of the high-performance TVS-x73 NAS series.
    Editor / Provider: QNAP Systems | Updated: 2016 / 11 / 14
  • Diagnosing the needs of the health care security market
    In an effort to strengthen security measures to ensure the safety of patients, visitors and staff, health care facilities are upping their security game with improved technologies and solutions.
    Editor / Provider: Eifeh Strom, Freelancer | Updated: 2016 / 11 / 11
  • The drivers, and models, of physical-logical access convergence
    More and more, access to both the physical doors as well as IT resources – those that reside on the network – is converged, resulting in what is called physical and logical access integration on a single credential.
    Editor / Provider: William Pao, a&s International | Updated: 2016 / 10 / 25