SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Everything you need know

Cyprus security news

2,232 articles found
Showing 1 to 20 of 2,232 Cyprus security news articles
Page 1 of 112 pages
Joint Commission accreditation impacts healthcare security upgradesJoint Commission accreditation impacts healthcare security upgrades
Compliance with Joint Commission accreditation can impact hospital and healthcare safety and security decisions, and can even drive security system...
IHS Markit: Global shipment of e-government credentials to reach 1 billion units by 2020IHS Markit: Global shipment of e-government credentials to reach 1 billion units by 2020
30 September, 2016: Shipments of electronic government (e-government) credentials—including e-passports, e-identity cards, e-health cards and e-driving licenses, and...
Gallagher Security becomes Security Institute’s first corporate partnerGallagher Security becomes Security Institute’s first corporate partner
30 September, 2016: Gallagher Security (Europe) has become the Security Institute’s first corporate partner. Officially presented at the Security Institute's annual...
Security companies embrace Corporate Social Responsibility to improve environmental & social impactSecurity companies embrace Corporate Social Responsibility to improve environmental & social impact
What exactly is Corporate Social Responsibility (CSR) and how does it apply to the security industry? Let’s look at how two very different...
Video intelligence broadens with actionable intelligence from social media and other dataVideo intelligence broadens with actionable intelligence from social media and other data
For more than a decade, Verint Systems, Melville, New York, has been developing and redefining the phrase the company pioneered: actionable...
Advantages of integrating audio monitoring and sound detection in school security solutionsAdvantages of integrating audio monitoring and sound detection in school security solutions
With the increasing number of campus shootings and lockdowns, security is a top priority for schools. Decision-makers are looking to repair the...
Wireless tracking & RFID enabled Real-Time Location System protects infants at Boston Medical CenterWireless tracking & RFID enabled Real-Time Location System protects infants at Boston Medical Center
Wireless tracking and radio frequency identification (RFID) continue to improve dramatically in range and reliability, allowing Real-Time Location...
Beyond PoE standards – factors that can cause component failureBeyond PoE standards – factors that can cause component failure
Power over Ethernet (PoE) is an important consideration in IP video security infrastructures, and many people believe Institute of Electrical and...
Download: Modern tools to achieve excellence in video securityDownload: Modern tools to achieve excellence in video security
Better-performing video systems provide better security. Today’s end users demand systems with optimum performance,...
FERMAX expands Access Control range for easy installation and implementationFERMAX expands Access Control range for easy installation and implementation
27 September, 2016: FERMAX fully explores Access Control Systems with a new catalogue that includes a wide range of solutions. With new products for small, medium or large...
Clarifying evidentiary procedures for digital video admissibilityClarifying evidentiary procedures for digital video admissibility
Over the last decade, the video surveillance security industry has morphed drastically in attempts to keep pace with both the consumer electronics and...
Deep learning technology applications for video surveillanceDeep learning technology applications for video surveillance
The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular. The meteoric rise of...
Considerations when designing an IP video security infrastructureConsiderations when designing an IP video security infrastructure
Network infrastructures for security devices are complex. It may seem simple to connect an Ethernet cable to a cable modem, but the connection of IP...
Security buying: Why purchase from a distributor?Security buying: Why purchase from a distributor?
S ecurity companies have multiple options to pur chase security products today – online, manufacturer direct , or from the vast...
Nedap MACE mobile access control platform to debut at Security Essen 2016Nedap MACE mobile access control platform to debut at Security Essen 2016
22 September, 2016: Just a few months ago, Nedap Identification Systems launched MACE: the mobile access control platform. This platform enables the use of smartphones to...
ASIS 2016 Accolades Award winners list releasedASIS 2016 Accolades Award winners list released
21 September, 2016: ASIS International, an organisation for security professionals worldwide, has selected its ASIS 2016 Accolades Award winners. ASIS Accolades...
Nortech’s NanoQuest card reader and access controller integrates with third-party monitoring systemsNortech’s NanoQuest card reader and access controller integrates with third-party monitoring systems
21 September, 2016: Nortech’s NanoQuest compact standalone proximity card reader and access controller now includes an RS232 data output to enable third party equipment...
Low-key ASIS 2016 reflects changes in the security industryLow-key ASIS 2016 reflects changes in the security industry
21 September, 2016: I have been unpacking from last week’s ASIS show in Orlando. It was a good show, except if you compare it to last spring’s ISC West in Las...
Future of mobile security hardware for enhanced situational decision makingFuture of mobile security hardware for enhanced situational decision making
There are too many moving parts to a mobile system to think we could just predict hardware innovations. In our world we make mobile security equipment...
Maximising camera-based applications for securityMaximising camera-based applications for security
The ability to customise IP video surveillance cameras with third-party apps has been a game-changer in system design and implementation. Traditional...
1|2|3|4|5|6|7|8|9|10|11|12|13|14next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition