Articles Search Results

868 Articles and 23 related Products found for networks
  • Teleste secures the safety of people in Logan City, Australia
    The City of Logan is a local government area in South East Queensland, Australia. The city is divided into 64 suburbs and 12 divisions, which elect a Councillor. Logan is ideally located between Brisbane, Ipswich and the Gold Coast, and has easy access to the national highway and rail networks.
    Editor / Provider: Teleste | Updated: 2016 / 3 / 8
  • Comelit leads the way in student accommodation security
    Working with IT installers Abzorb Networks, Comelit has supplied its Ikall digital entrance panels and hands-free resident audio units to the Old Fire Station in Birmingham, a Grade II-listed former fire command base in the center of the city. The building is now a £35 million high-end student accom
    Editor / Provider: Comelit | Updated: 2016 / 3 / 3
  • How video surveillance can secure ATMs against physical attacks
    ATM security is an important topic addressed by international organizations. Attacks on ATMs can be divided to physical attacks, trying to reach the cash stored inside the ATM safe or fraud attempts.
    Editor / Provider: Israel Gogol, Freelancer | Updated: 2016 / 3 / 4
  • CriticalArc Safeguards an expatriate community in Saudi Arabia
    Al-Bustan Village in Riyadh prides itself in providing the highest standards of residential comfort and care for around 3000 senior professionals, their partners and children. Comprehensive on-site facilities include an international school plus recreational and retail facilities. However, cultural
    Editor / Provider: CriticalArc | Updated: 2016 / 2 / 25
  • Russian bank opts for AxxonSoft security software
    The North-Western Bank of the Sberbank of Russia has the most extensive branch network in the region, with more than a 1,000 branches. Not only does the bank keep up with the modern market trends, but it actually goes ahead of them, showing utmost confidence in the world of rapidly changing technolo
    Editor / Provider: AxxonSoft | Updated: 2016 / 2 / 22
  • How to minimize cyberthreats in IP-based physical security systems
    Companies have gradually started to change the architecture of their solutions in order to avoid cyberthreats. One approach is to change the security solution architecture in a way that will minimize the number of potential breach points.
    Editor / Provider: Israel Gogol, Freelancer | Updated: 2016 / 2 / 22
  • Xtralis smoke detectors to protect new theme park
    VESDA-E VEA addressable smoke detectors provide over 2,000 sampling points for critical fire prevention at the world's largest indoor theme park, an architectural marvel with 1.5M sq. ft. of space
    Editor / Provider: Xtralis | Updated: 2016 / 2 / 22
  • How secure is surveillance data accessed on mobile apps?
    Mobile apps that can provide access to security solutions have become a standard facility for most solution providers. Such ‘on-the-go' access does raise some concerns, however, especially with regard to protecting surveillance data from unwanted, third-party access.
    Editor / Provider: Prasanth Aby Thomas | Updated: 2016 / 2 / 18

asmag.com provides weekly and monthly e-Newsletters which include the latest security industry news, vertical solution case studies and product information.



Please key in code