Enterprises big and small share goals when it comes to security. When it makes business sense, they want to leverage what exists; speed up the delivery of more accurate information
Web-hosted access control solutions allow end-user security to create user directories, which are housed off-site on server farms. The application includes activity logs and other features. Display courtesy of Brivo
To understand the growth of IP security video, you need only to look at the growth of what goes into the technology itself. Mark Kisten of iSuppli Corp., tells me
Identity theft shakes whole communities. Pictured is a free community shred to combat identity theft. The event, sponsored by Crime Stoppers, Shred-It and Wal-Mart allowed people to dispose of sensitive
Bill ZauldMove over, NFL. Get out of the way, MLB. Forget about it, NBA. It’s NASCAR that, without a doubt, is the top live spectator sport, boasting 17 of the
Enough with the convergence talk already. Except there are things happening out there. Cisco, Sun Microsystems, IBM, Northrop Grumman, among others, are rapidly betting their IT money on the combo
From Saflink, the SureAccess all-weather, smart card, biometric reader meets the strict requirements of FIPS 201’s Personal Identity Verification of federal employees and contractors. It’s based on technology previously deployed
Bill ZaludHere’s the thing. I’ve lived in Chicago all my life. On the same block. Most folks outside of Chicago always ask how I like living in the Loop. It
IT-based intelligent security is designed into new airport terminal construction. Shown is the new American Airlines terminal in New York.A couple dozen or so U.S. airports are today’s Petri dish
From ActiveMedia Robotics, its PatrolBot Security Robot can sense and see and report back to security via a wireless local area network or the Internet.Robot pitch – The “S-3” launches