SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Site tour of SourceSecurity.com

Guatemala security news

1,090 articles found
Showing 1 to 20 of 1,090 Guatemala security news articles
Page 1 of 55 pages
Vicon providing openness against “total solutions” manufacturersVicon providing openness against “total solutions” manufacturers
28 May, 2015: We’re seeing a market trend toward manufacturers seeking to provide “total solutions” rather than components. The trend is reflected...
FST Biometrics combines security with convenienceFST Biometrics combines security with convenience
28 May, 2015: Security vigilance can be sporadic at many companies and institutions. Facilities tend to tighten security in the days after a scary event happens or makes...
How video storage ensures critical data isn’t lostHow video storage ensures critical data isn’t lost
The fundamental value of data is widely apparent in modern society, and its loss may have significant consequences Video data is critical...
Rethinking DIY: new opportunities for recurring revenueRethinking DIY: new opportunities for recurring revenue
According IHS Technology, more than 11 million consumer and DIY network cameras will be shipped worldwide this year Perhaps we should...
HID Global’s Denis Hebert quits as President & CEOHID Global’s Denis Hebert quits as President & CEO
22 May, 2015: Denis Hébert, president and CEO of HID Global, has quietly left the company. There has been no official announcement, and the...
ISCON Imaging’s IR technology addresses shrinkage at distribution centresISCON Imaging’s IR technology addresses shrinkage at distribution centres
22 May, 2015: Most of us think of shrinkage in the context of the retail environment, where a host of video cameras, tamper-proof packaging, sensors and other technologies...
Long range identification - 3rd major contactless access controlLong range identification - 3rd major contactless access control
Recently there has been great interest in long range reading (433 MHz technology) For the last two decades, the primary contactless...
How SIP-enabled intercoms open up communication with security departmentsHow SIP-enabled intercoms open up communication with security departments
The trend towards greater unification is facilitated by an all-encompassing shift to IP technologies As more organisations are looking for...
Making security easier for integrators to spec, install and programMaking security easier for integrators to spec, install and program
Easy does it is the watchword of the day, as industry suppliers make their products more intuitive A common theme emerging from physical...
Airbus Defence and Space and Cisco collaborate on defence and security productsAirbus Defence and Space and Cisco collaborate on defence and security products
7 May, 2015: The partner agreement expands the two companies’ sales collaboration globally Airbus Defence and Space and Cisco recently announced...
Networking basics for security professionals: Understanding the role of midspans to supply powerNetworking basics for security professionals: Understanding the role of midspans to supply power
Just as with network switches, there are no real standards for midspans In general terms, a midspan is a power over Ethernet (PoE) power...
Technology contributes to holistic security approach at primary/secondary schoolsTechnology contributes to holistic security approach at primary/secondary schools
Honeywell recently helped the Penns Valley Area School district in Pennsylvania design and implement a custom security system Security...
Clarifying misconceptions about video storage solutionsClarifying misconceptions about video storage solutions
One key misconception is that solid-state drives (SSDs) are going to replace hard disk drives (HDDs) Like many areas of the security...
A wrinkle emerges in Canon’s acquisition of Axis CommunicationsA wrinkle emerges in Canon’s acquisition of Axis Communications
28 April, 2015: Anyone thinking the Canon acquisition of Axis is a done deal should reconsider. Not so fast. A wrinkle has emerged as the Japanese imaging giant has been...
Video surveillance trends driving increasing storage needsVideo surveillance trends driving increasing storage needs
End users in the video surveillance market are looking for higher quality images and to retain those images for longer periods. Also,...
Integrators should foster relationships to increase primary/secondary education salesIntegrators should foster relationships to increase primary/secondary education sales
Integrators must understand that the primary/secondary education market has a unique and urgent need for access control, but with limited budgets...
School security: Communication and controlling accessSchool security: Communication and controlling access
Readily available security technology can help officials take control of their campuses Two top priorities for school security are the...
Networking basics for security professionals: What do layers really mean?Networking basics for security professionals: What do layers really mean?
Layering as applied to computers is a made up term having no relationship to any particular standards When it comes to setting the...
Convergence of IT networks and physical securityConvergence of IT networks and physical security
Kevin Brownell, principal physical security consultant at PTS Consulting Group, considers convergence of IT networks and physical security. He argues that...
Technology advancement requires well-educated, well-paid security officersTechnology advancement requires well-educated, well-paid security officers
The industry has to advance in terms of attracting experienced people and paying for that experience Time was, security officers patrolled...
1|2|3|4|5|6|7|8|9|10|11|12|13|14next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition