Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Larry Anderson's Security BeatLarry Anderson, Editor, SourceSecurity.com US Edition

Larry Anderson's Security Beat

190 articles found
Showing 1 to 20 of 190 articles
Page 1 of 10 pages
Milestone Pledges To 'Make The World See' At Upbeat MIPS 2017Milestone Pledges To 'Make The World See' At Upbeat MIPS 2017
February 22, 2017: Are the glory days of IP video behind us? Not by a long shot, if you listen to the upbeat message at ‘Milestone Community Days ’ in San...
Physical, Cyber And Network Security Enable Recovery Point’s Business Continuity ServicesPhysical, Cyber And Network Security Enable Recovery Point’s Business Continuity Services
February 8, 2017: What happens to a company’s data in the case of a disaster such as 9/11 or Hurricane Sandy? How can a company recover from a disaster and continue...
Veracity Expands Scope With Acquisition Of Software Provider icomplyVeracity Expands Scope With Acquisition Of Software Provider icomply
January 27, 2017: Veracity, the Scottish company specializing in IP video transmission, storage and display, has made a small but significant acquisition that has the...
CES 2017: Will Consumer Electronics Transform The Physical Security Industry?CES 2017: Will Consumer Electronics Transform The Physical Security Industry?
January 24, 2017: Consumer electronics are closely related to physical security. For one thing, electronics consumers increasingly see security as one of the functions they...
Could Amazon Go Eliminate Shoplifters? Customers ‘Just Walk Out’Could Amazon Go Eliminate Shoplifters? Customers ‘Just Walk Out’
December 14, 2016: Amazon Go is a new idea in retailing, now being tested at a store in Seattle, that eliminates the need for customers to go through a checkout line. The...
“Anti-Surveillance Clothing” Creates A New Wrinkle In Facial Detection“Anti-Surveillance Clothing” Creates A New Wrinkle In Facial Detection
January 5, 2017: The latest challenge to facial recognition technology is “anti-surveillance clothing,” aimed at confusing facial recognition algorithms as a...
Investigatory Powers Bill Seeks To Balance UK Privacy And SecurityInvestigatory Powers Bill Seeks To Balance UK Privacy And Security
December 7, 2016: If you want more security, you have to give up some privacy. The familiar trade-off will be tested to new extremes in the United Kingdom in 2017 when the...
Bosch-Sony Partnership Amounts To A New Variation On M&ABosch-Sony Partnership Amounts To A New Variation On M&A
November 23, 2016: Long-predicted consolidation in the video surveillance market seems to have slowed somewhat lately – no big mergers or acquisitions have been...
Panoramic Cameras Are Everywhere, But It Started With Arecont VisionPanoramic Cameras Are Everywhere, But It Started With Arecont Vision
November 16, 2016: Arecont Vision created the category of multi-sensor panoramic cameras back in 2006. Now the market is taking off, and many manufacturers now offer...
ONVIF Looks Ahead Following A Year Of Growing Impact For The Open Industry ForumONVIF Looks Ahead Following A Year Of Growing Impact For The Open Industry Forum
October 20, 2016: ONVIF will be eight years old in the next several weeks. It has been interesting to watch the open industry forum’s impact on physical security since...
March Networks Tackles Cybersecurity, Inventory Tracking And HDR CamerasMarch Networks Tackles Cybersecurity, Inventory Tracking And HDR Cameras
October 21, 2016: Add March Networks to the growing list of companies in the physical security market that are addressing the possibility of cyber-threats. Cybersecurity is...
Legacy Of Cybersecurity Apathy Plays Into Mirai Botnet AttackLegacy Of Cybersecurity Apathy Plays Into Mirai Botnet Attack
October 25, 2016: A big cyberattack on Friday impacted Internet service on the East Coast of the United States and kept several high-profile websites offline. Cyber security...
Perimeter Security Benefits From Increasingly Sophisticated And Cost-Effective TechnologiesPerimeter Security Benefits From Increasingly Sophisticated And Cost-Effective Technologies
October 3, 2016: Perimeter security has evolved in recent years from an emphasis on fences and low-cost sensors to a broader systems approach that incorporates a variety of...
Percepto Demonstrates Future Of Perimeter Protection With Autonomous DronesPercepto Demonstrates Future Of Perimeter Protection With Autonomous Drones
October 6, 2016: The future of drones in the security and safety industry is sooner than you think. Tyco Integrated Security and Percepto offered a glimpse of that future...
Low-Key ASIS 2016 Reflects Changes In The Security IndustryLow-Key ASIS 2016 Reflects Changes In The Security Industry
September 21, 2016: I have been unpacking from last week’s ASIS show in Orlando. It was a good show, except if you compare it to last spring’s ISC West in Las...
Rapid Growth of Data Attracts Hitachi to the Video Storage MarketRapid Growth of Data Attracts Hitachi to the Video Storage Market
September 12, 2016: The amount of data generated by today’s video systems – whether resulting from increasing camera counts and/or higher resolutions such as 4K...
ASIS 2016 Day 2 Highlights: New Product Releases, Technology Innovations & DataASIS 2016 Day 2 Highlights: New Product Releases, Technology Innovations & Data
September 14, 2016: The ASIS show has not traditionally been a big forum for new product introductions -- those happen mostly at ISC West in the spring. Even so, there is...
Mobile Credentials Are A Hot Topic At ASIS 2016Mobile Credentials Are A Hot Topic At ASIS 2016
September 13, 2016: No doubt about it, the ASIS International show is smaller than in years past. And there is (the usual) grumbling about slow attendee traffic (and the also...
Audio Analytics: An Underused Security ToolAudio Analytics: An Underused Security Tool
September 7, 2016: Audio has been slower to catch on in the security market because of lingering concerns about privacy laws related to audio surveillance. But audio...
Top Florida Judge Addresses Local Courthouse Security ConcernsTop Florida Judge Addresses Local Courthouse Security Concerns
August 31, 2016: The security of courtrooms throughout Florida has gotten the attention of the chief justice of the state’s Supreme Court, who has appointed a...
1|2|3|4|5|6|7|8|9|10next
Go to :
border
Related videos
Bookmark and Share
Featured White Paper

The evolution of cards and credentials in physical access

Physical access control has been a key component of many organisations’ security strategies for several decades. Like any technology, access control has evolved over the years, and solutions now offer more security and convenience than ever before. From swipe technologies, such as the now antiquated magnetic stripe, to a variety of contactless technologies and mobile access credentials, businesses now have several choices when it comes to access control.

This White Paper will examine the technologies available today and the bright future of mobile access, as well as clarify why you should ensure that each component of the access control ecosystem is as secure as possible.


See privacy and cookie policy