When it comes to perimeter security, strong upfront planning and swift real-time reactions supported by technology can go a long way in helping an enterprise secure its outermost layer.
How can security leaders be sure to shore up that outermost barrier at their organizations? When it comes to perimeter security, strong upfront planning and swift real-time reactions supported by technology can go a long way in helping an enterprise secure their most important assets.
This week, former Uber drivers in the U.K. claimed that the company fired them after claiming they subcontracted out their rides; the drivers refute that and claim that the facial biometrics the company uses is racially biased and flawed.
How will artificial intelligence (AI) transform video surveillance in 2021? Below, we speak to Satish Raj, CTO of Pro-Vigil, who believes AI in digital video surveillance systems will become much smarter next year, to the point where it will be able to actually predict crime before it happens.
Jon Litt, Senior Manager, Government Solutions (US) at Christie shares his five key considerations to ensuring an impactful, efficient professional video collaboration solution.
Having a secure and efficient video collaboration system has evolved from a ‘useful to have’ technology to an indispensable capability in 2020, allowing teams to feel more connected to remote locations and distributed team members. With travel restrictions and social distancing limiting in-person meetings, remote face-to-face video communication is more imperative than ever in security environments. Systems integrators around the globe have been upgrading technologies to support the mission of operators. Before you work with an integrator to either upgrade an existing video collaboration system or invest in a new one, there are a host of considerations. Below are the key ones that will help you with your conversations with the systems integrator.
COVID-19 has caused many large educational institutions to accelerate the transition to online delivery of educational services. This has highlighted the issue of student identity and specifically the identity of students during online examinations and testing. New advances in voice biometrics can help educational institutions and other online enterprises manage access and secure data.
How can electronic access control solutions and other devices like biometrics technologies be configured to help mitigate unauthorized entry through swing doors and turnstiles? Here, we’ll take a look at swing doors and turnstiles first, then the high security revolving doors and mantrap portals.
Singapore’s Changi Airport Group, one of the most innovative and technologically advanced airports in the world, will be upgrading and enhancing its security system.
Technology company Clearview AI’s scraping of billions of images of people from across the Internet represented mass surveillance and was a clear violation of the privacy rights of Canadians, the Office of the Privacy Commissioner of Canada has found after conducting an investigation into the matter.
Loss prevention and safety/risk employees can benefit from occupancy analytics, especially during the current health crisis. But beyond the pandemic, employees in operations, marketing, and merchandising can benefit considerably by learning all about the foot traffic in their stores.
Adoption of Push-to-Talk over Cellular and Wi-Fi networks is growing in the security market due to the wide area coverage, low cost, the bandwidth to accommodate voice and video communications, and integration with dispatching applications. This article reviews the different types of Push to Talk network deployments, how they work, the devices used, and the benefits to users. The types of Push-to-Talk networks include Push to Talk over Cellular (PoC), Push-to-Talk over Wi-Fi, and unified PoC, Wi-Fi and LMR radio networks.