SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Unique environments

Congo security news

1,600 articles found
Showing 1 to 20 of 1,600 Congo security news articles
Page 1 of 80 pages
Physical security systems enable compliance to HIPPA and other privacy lawsPhysical security systems enable compliance to HIPPA and other privacy laws
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) in the United States fosters health insurance coverage for workers and their...
Download: Best practices for integrating mobile into the access control architectureDownload: Best practices for integrating mobile into the access control architecture
  What's the White Paper about? The mobile industry is known as one of the most innovative and fast-paced and what we...
VMS and PSIM jargon distracts from tangible security solution benefitsVMS and PSIM jargon distracts from tangible security solution benefits
The security industry has changed a lot in recent years. Many will remember a time not so long ago when it was about buying boxes/pieces of tin, opening...
Robolliance’s Cliff Quiroga on advancing robotics in securityRobolliance’s Cliff Quiroga on advancing robotics in security
There’s no better indication that robots are the next big thing in security than the formation of the industry organisation known as Robolliance....
Qognify to demonstrate advanced video security portfolio at ASIS International 2016Qognify to demonstrate advanced video security portfolio at ASIS International 2016
26 August, 2016: Qognify, formerly NICE Security, will showcase its portfolio at ASIS International in Orlando Florida, September 12th-14th. With significant advancements...
SALTO to showcase latest security products and BLE access control at ASIS 2016SALTO to showcase latest security products and BLE access control at ASIS 2016
26 August, 2016: SALTO Systems, a manufacturer of electronic access control solutions, will showcase its latest security innovations — including new BLE enabled...
IT & access control collaboration leads to functional, personnel and financial benefitsIT & access control collaboration leads to functional, personnel and financial benefits
Over the last several years, there has been a revolution in access control methodologies including increased integration with video management software...
Military and government data collection technologies for corporate and city securityMilitary and government data collection technologies for corporate and city security
24 August, 2016: Creating and accessing intelligence is increasingly part of the mission of corporate security departments, and of Safe Cities applications. Such...
Smart home products help security companies engage customersSmart home products help security companies engage customers
Dennis Sage Home Entertainment, Phoenix, is a best-in-breed audiovisual contracting services firm that gradually began expanding its offerings to...
Weaponised robots? Military and police response uses for robots on the riseWeaponised robots? Military and police response uses for robots on the rise
The era of the “killer robot” hasn’t arrived, exactly, but it may not be far off. Police and the military have been using these...
Electronic locks prove a worthwhile investment for the security industryElectronic locks prove a worthwhile investment for the security industry
Mechanical locks and keys date back thousands of years and have undergone many changes, but the industry’s transition to electronic locks might...
10 tips for using business intelligence tools to maximise ROI in retail10 tips for using business intelligence tools to maximise ROI in retail
A lot has changed in the last 15 plus years in the security industry, including the ability to process and analyse Big Data.  The growth rate of...
Home automation: A growth area for the security industry?Home automation: A growth area for the security industry?
It’s become a hot topic lately, but what are the real prospects for the smart home and home automation market? More specifically, what...
Access control evolution allows multiple options for healthcare securityAccess control evolution allows multiple options for healthcare security
Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely , through...
Machine learning security systems address the limitations of traditional threat detectionMachine learning security systems address the limitations of traditional threat detection
“Converged security” has been a buzz phrase for more than a decade, but the industry is just now starting to reap the rewards. Converged...
Evolution of security robots responds to market needsEvolution of security robots responds to market needs
Security and safety robotics, unlike any other industry, is driven by customer and market demand. Once buyers acquire robots, they often find new things...
Harnessing location-based alerting technologies to track and secure employees in emergency situationsHarnessing location-based alerting technologies to track and secure employees in emergency situations
Workplace mobility is on the rise, which means organisations have an increasing number of employees who travel or work from home. In fact, there were...
Rio 2016 security: The role of technology and personnelRio 2016 security: The role of technology and personnel
A week before the Rio Olympics were slated to begin, Brazil fired the private security firm assigned to hire personnel to screen people entering the...
Shedding light on integrated cameras and independent illuminatorsShedding light on integrated cameras and independent illuminators
Video surveillance has rapidly advanced over the last two decades. Today, integrators can purchase IP cameras offering complete network control,...
Data mining for insider threats: Another convergence of physical and cyber securityData mining for insider threats: Another convergence of physical and cyber security
For the past several years, information technology security concerns and priority regarding insider threats have steadily risen as evidenced by a variety...
1|2|3|4|5|6|7|8|9|10|11|12|13|14next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition