SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Site tour of SourceSecurity.com
Leadership

Denmark security news

1,699 articles found
Showing 21 to 40 of 1,699 Denmark security news articles
Page 2 of 85 pages
ISC West 2015: Insights from more than two decadesISC West 2015: Insights from more than two decades
Budinoff believes that ISC West is the most comprehensive product show for the physical security industry Daniel Budinoff, president of...
Sports security: Ensuring safety at sports venues a continuing challengeSports security: Ensuring safety at sports venues a continuing challenge
Anything that can incite a crowd surge is a security threat in a sports arena Security at sports stadiums is making headlines across...
Milestone Systems holds first summit devoted to distribution partnersMilestone Systems holds first summit devoted to distribution partners
20 March, 2015: Event provided the distribution partners with an opportunity to network Milestone Systems, the open platform company in IP video...
Combining LPR and video analytics for enterprise applicationsCombining LPR and video analytics for enterprise applications
20 March, 2015: Advances in LPR: License plate recognition (LPR) is used widely today in law enforcement applications, but the enterprise security market is also catching...
Designing security systems: Project management techniquesDesigning security systems: Project management techniques
Access control and video surveillance technologies are expensive to buy and install. So it’s important that end users make sure they get a system that...
Smart thermal cameras protect perimeters in transportation applicationsSmart thermal cameras protect perimeters in transportation applications
Thermal cameras can often be used to cover larger areas than standard visible light cameras Smart thermal cameras use on-board video...
exacqVision 6.8 with VideoPush feature
18 March, 2015: Exacq Technologies, part of the Security Products business unit of Tyco, introduces faster camera discovery and VideoPush to mobile devices with exacqVision...
Utilising intelligence analysts to improve businessUtilising intelligence analysts to improve business
If your company has a facility or a current business meeting in Seoul, South Korea, you would want to know the details behind the recent knife attack on the...
Cloud-based systems: Current challenges and future technologyCloud-based systems: Current challenges and future technology
There’s more talk than ever in the security industry about cloud-based systems – where they are, where they’re going, the risks, the...
Networking basics for security professionals: What network switches don’t doNetworking basics for security professionals: What network switches don’t do
Differences between standard data applications and the requirements of networks designed for IP video security applications are critical for your...
Key management essential for transportation environmentKey management essential for transportation environment
Lost or damaged keys cost authorities thousands of dollars to replace Keys are a common element in any transportation department, and...
Networking basics for security professionals: The 60 Watt dilemmaNetworking basics for security professionals: The 60 Watt dilemma
Standards for camera manufacturers presented a new challenge with the introduction of security cameras that require more than 30 Watts of power...
MIPS 2015: Largest-ever Milestone symposium keeps focus on partnersMIPS 2015: Largest-ever Milestone symposium keeps focus on partners
12 March, 2015: This year’s 10th anniversary Milestone Integration Platform Symposium (MIPS) was the largest ever, with 463 participants, including manufacturers,...
Addressing false alarms in video analyticsAddressing false alarms in video analytics
Improvements in the technology have lowered – but not eliminated – concerns about false alarms False alarms have plagued the...
Learning to use visitor management technology in schoolsLearning to use visitor management technology in schools
It’s important for everyone in a high school to wear an ID Handwritten check in and check out books fail to alert the security risks...
Barix appoints LineQ as U.S. distribution partnerBarix appoints LineQ as U.S. distribution partner
10 March, 2015: The appointment of LineQ reflects the global sales strategy of Barix through regional channels worldwide IP audio and control specialist...
HID Global Mobile Access Solution via Samsung KNOX 2.4 mobile platform
10 March, 2015: HID Global®, a worldwide leader in secure identity solutions, has partnered with Samsung to provide enterprises with a secure and seamless management and...
Honeywell IS335 Motion Detector
10 March, 2015: Honeywell recently expanded its line of Performance Series IP embedded network video recorders (NVRs), giving customers more flexibility when designing...
AXIS P39-R network camera series for outdoor use on vehicles
9 March, 2015: AXIS P3905-RE is an outdoor-ready camera addition to the family of compact, rugged and discreet cameras of the AXIS P39-R Network Camera Series. They are all...
Is home automation driving a security renaissance?Is home automation driving a security renaissance?
According to research firm IHS Technology, the residential intrusion alarm market is expected to grow by 9.4 percent in 2015 For...
next1|2|3|4|5|6|7|8|9|10|11|12|13|14next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition