SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Leadership

Ethiopia security news

1,643 articles found
Showing 61 to 80 of 1,643 Ethiopia security news articles
Page 4 of 83 pages
Machine learning security systems address the limitations of traditional threat detection
“Converged security” has been a buzz phrase for more than a decade, but the industry is just now starting to reap the rewards. Converged...
Evolution of security robots responds to market needs
Security and safety robotics, unlike any other industry, is driven by customer and market demand. Once buyers acquire robots, they often find new things...
Harnessing location-based alerting technologies to track and secure employees in emergency situations
Workplace mobility is on the rise, which means organisations have an increasing number of employees who travel or work from home. In fact, there were...
Rio 2016 security: The role of technology and personnel
A week before the Rio Olympics were slated to begin, Brazil fired the private security firm assigned to hire personnel to screen people entering the...
Shedding light on integrated cameras and independent illuminators
Video surveillance has rapidly advanced over the last two decades. Today, integrators can purchase IP cameras offering complete network control,...
Data mining for insider threats: Another convergence of physical and cyber security
For the past several years, information technology security concerns and priority regarding insider threats have steadily risen as evidenced by a variety...
TDSi to showcase new GARDiS solution at IFSEC Southeast Asia 2016
Integrated security manufacturer TDSi will be giving visitors a chance to see its new range of GARDiS software and hardware solutions at IFSEC Southeast...
Video surveillance as evidence: Does human bias undermine reliability?
The power of video as evidence in a court of law is often seen as a function of specific variables: How clear is the video? What exactly does it show? Can...
Healthcare facilities’ diverse security requirements provide opportunities for systems integrators
Part 7 of our healthcare series One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the...
Robotics: Redefining crime prevention, public safety and security
Robots come in all shapes and sizes from small tracked vehicles to large upright cylinders and cart-like devices on wheels. They fly through the air...
Access control technologies manage emergency hospital lockdowns
Hospitals and healthcare institutions increasingly face a reality of workplace violence, attacks on patients, and threats to doctors and other support...
Pokemon Go: A lesson in physical and cyber convergence for the security market?
The new Pokemon Go video game, which has taken the world by storm, combines real-world landmarks and locations with virtual creatures in a smart phone...
Open Options announces access control integration with Axis Communications
Open Options, an open platform access control and software development company, and Axis Communications, the global leader in network video, announce the...
Web and social media intelligence transforms security and safety planning
Over the course of the last decade, we’ve seen a blurring of lines between cyber and physical security concerns. Whether it’s the hacking of...
Shooting incidents highlight importance of hospital security
Hospital security always counts. Patients may arrive from a crime scene and someone has to make sure they weren’t followed by trouble. Doctors,...
13 tips for security and IT professionals to keep IP video surveillance networks secure
Keeping surveillance networks secure can be a daunting task but there are several methods that can greatly reduce risk, especially when used in...
Healthcare security systems: Funding remains biggest obstacle to installation
Several forces are working in favour of greater adoption of hospital security and video surveillance technologies in the healthcare market....
User experience: How well does physical security measure up?
I’ve been hearing a lot of talk lately about the “user experience” or UX. UX is a techy term that refers broadly to how a customer...
Biometrics prove best for preventing time & attendance fraud
Security technology is increasingly being used to help organisations tackle challenges going far beyond controlling access to office buildings and...
Body worn cameras increase amid current police concerns
Body worn cameras have realised a surge in demand across the United States in the current climate of concern about how police interact with citizens,...
next1|2|3|4|5|6|7|8|9|10|11|12|13|14next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition