SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Site tour of SourceSecurity.com
Smart

Estonia security news

939 articles found
Showing 21 to 40 of 939 Estonia security news articles
Page 2 of 47 pages
Enhancing video security with physical detector technologyEnhancing video security with physical detector technology
Event-driven video for surveillance and recording involves using a video recorder or video management software system that is triggered by...
Hospital security departments bracing for Ebola impactHospital security departments bracing for Ebola impact
16 October, 2014: Spread of the Ebola virus beyond Western Africa has heightened concerns among healthcare professionals and the general public. In practical terms, healthcare...
Role of health and performance monitoring in preventing security system downtimeRole of health and performance monitoring in preventing security system downtime
If a security or video surveillance / CCTV system isn’t working, who’s to blame? Or more to the point, what’s to blame?...
Optimising business security and processes by implementation of smart reportsOptimising business security and processes by implementation of smart reports
At what time of day do you have most people in your building? Do you have enough parking spaces for your employees? Are there always enough...
Axis Communications and SightLogix announce strategic agreement at ASIS 2014Axis Communications and SightLogix announce strategic agreement at ASIS 2014
30 September, 2014: A busy first day at the ASIS International Seminar and Exhibits in Atlanta ended with a surprise strategic announcement by one of the industry’s...
Dispatches from Security Essen 2014: Big event bolsters the European marketDispatches from Security Essen 2014: Big event bolsters the European market
29 September, 2014: Just days before the ASIS International conference and exhibits in Atlanta, the global security market's attention last week has been focused on the big...
The Threat of Commoditisation – and new opportunitiesThe Threat of Commoditisation – and new opportunities
29 September, 2014: Commoditisation is the biggest problem facing today’s security integrators, says Bill Bozeman, president and CEO of PSA Security Network, an electronic...
The next group of challenges for “Plug-and-Play” access controlThe next group of challenges for “Plug-and-Play” access control
29 September, 2014: In its role to achieve “plug-and-play” interoperability for security system and device integration, the Physical Security Interoperability...
Role of Bluetooth Smart and NFC in access controlRole of Bluetooth Smart and NFC in access control
Bluetooth Smart creates new ways to open doors and gates The latest generation of access control systems offers more secure and...
Harnessing the power of smart phone video for surveillanceHarnessing the power of smart phone video for surveillance
19 September, 2014: I love Wikipedia, not just because I use it every day, but also because it reflects the value that can be created when a large community works together. When...
Video surveillance is everywhere – even in the woodsVideo surveillance is everywhere – even in the woods
15 September, 2014: The Silver Comet Trail is a 61-mile hiking and biking trail west of Atlanta that follows a route previously travelled by the Silver Comet passenger train...
Apple’s new iPhone announcements: What is the impact on the physical security market?Apple’s new iPhone announcements: What is the impact on the physical security market?
15 September, 2014: When Apple makes a new product announcement, the whole technology world takes note. Such was the case last week when the tech giant introduced its sleek and...
SureView integrates Immix video based automation software with mobiDEOS UCNE range of cloud and network-enabled surveillance systems
10 September, 2014: SureView Systems announces they have successfully integrated the mobiDEOS UCNE range of cloud and network-enabled surveillance systems into Immix, the...
Professionalising security management by challenging established notionsProfessionalising security management by challenging established notions
Law enforcement and pure problem-solvingskills will play less of a role for the futuresecurity director Much effort has been put down in...
Should video of public places be made available to the public?Should video of public places be made available to the public?
4 September, 2014: If a video surveillance system is installed using public funds, should the resulting video therefore be accessible to the public? A poll in the United...
IHS reports market for security and fire equipment and services to be $1 billion+ in oil and gas industryIHS reports market for security and fire equipment and services to be $1 billion+ in oil and gas industry
29 August, 2014: Many oil and gas companies utilise independent systems for incident management, crisis management and security It’s no secret that...
Analysing effectiveness of security operations with security metricsAnalysing effectiveness of security operations with security metrics
The ability to measure and analyse the effectiveness of security operations is extremely useful – not only for identifying and...
HID Global expands SlimFlex Tag portfolio with addition of Near Field Communication-readable tags
22 August, 2014: HID Global®, a worldwide leader in secure identity solutions, recently announced that its Identification Technologies division has added Near Field...
Kantech releases Intevo integrated security platform featuring exacqVision VMS
22 August, 2014: Kantech, part of the Security Products business unit of Tyco, the world’s largest pure-play fire protection and security company, announces the release...
Drone attacks at U.S. prisons present new category of riskDrone attacks at U.S. prisons present new category of risk
22 August, 2014: If you had a super power, would you use it for good or evil? The question might typically be the subject of vigorous debate among third graders, but...
next1|2|3|4|5|6|7|8|9|10|11|12|13|14next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition