SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Site tour of SourceSecurity.com
Powerful

Guatemala security news

934 articles found
Showing 21 to 40 of 934 Guatemala security news articles
Page 2 of 47 pages
Security Technology: A house built on sand?Security Technology: A house built on sand?
The security industry can be like a house built on sand if there's a lack of professional standards set in place Picture the scene:...
Why workplace training is essential for business successWhy workplace training is essential for business success
Good training is a best practice that applies across a broad range of industries and markets Owners and managers of security dealerships,...
Rethinking physical access control to operate in an IT-centric environmentRethinking physical access control to operate in an IT-centric environment
Physical access control system architecture should be built to use the changing IT infrastructures of today’s organizations to their...
Video walls provide the big picture for collaborative securityVideo walls provide the big picture for collaborative security
2 December, 2014: Video walls are growing in popularity in security applications, providing everyone in a control room access to the same current information at the same time....
The benefits of training in the access control marketThe benefits of training in the access control market
Training and education are essential elements of success in the access control market for integrators and end users alike. Whether one is a...
Costs, usability, and support among access control challengesCosts, usability, and support among access control challenges
Access control can sometimes get overshadowed by video surveillance Technology is shifting rapidly in the access control market, but...
Transitioning from legacy access control to newer technologiesTransitioning from legacy access control to newer technologies
A planned migration provides the ability to plan, budget and control the path to an improved access control environment The installed base...
Access control market working to overcome tradition of proprietary systemsAccess control market working to overcome tradition of proprietary systems
Access control systems that leverage proprietary technologies severely limit system flexibility Access control’s ongoing transition...
Simplifying interoperability of access control with PLAI specificationSimplifying interoperability of access control with PLAI specification
Communicating access control information across multiple platforms is simplified with the PSIA's PLAI specification Managing access...
Genetec introduces new hybrid cloud archives service for Security CenterGenetec introduces new hybrid cloud archives service for Security Center
19 November, 2014: The archives allow organisations to easily scale the available storage capacity of their surveillance system Genetec™, a leading...
Identiv reports Q3 financial results for 2014Identiv reports Q3 financial results for 2014
17 November, 2014: Identiv reaffirms revenue guidance for fiscal year 2014 of revenue between $80 million and $90 million Identiv, a global security...
Remote video monitoring – the smarter way to enhance business security effortsRemote video monitoring – the smarter way to enhance business security efforts
Remote monitoring offers a multiplying effect on security efforts The growth of IP-based networks has made it possible for security...
MBX Systems: Working behind the scenes to optimise pairing of software and hardwareMBX Systems: Working behind the scenes to optimise pairing of software and hardware
5 November, 2014: Sometimes companies want to buy their physical security software separate from the servers it runs on. Other times, companies prefer to buy an...
New iris recognition capabilities are a real eye-openerNew iris recognition capabilities are a real eye-opener
5 November, 2014: Iris recognition has been used as a biometric for access control applications for many years, but we have heard a lot more lately about fingerprint scans....
Strengthening Loss Prevention with Unified and Cloud-Based Security SolutionsStrengthening Loss Prevention with Unified and Cloud-Based Security Solutions
Newer concepts and modern security solutions help achieve operational efficiencies in the retail sector Asset protection across retail...
Standardising global security to minimise risks and budgetStandardising global security to minimise risks and budget
Security standardisation reduces operational requirements Controlling identified risks at all of your sites, anywhere in the world, can be...
How cybersecurity impacts the physical security worldHow cybersecurity impacts the physical security world
Cybersecurity is a critically important aspect in today’s increasingly IP-driven world of physical security The physical security...
DVTEL names Jack Meltzer as Senior Director for Global A&E ProgramDVTEL names Jack Meltzer as Senior Director for Global A&E Program
28 October, 2014: The program helps engineers and consultants develop expertise with DVTEL’s video surveillance technologies DVTEL, INC., the video...
IndigoVision video security technology enhances mining safety for Rio TintoIndigoVision video security technology enhances mining safety for Rio Tinto
27 October, 2014: IndigoVision's video technology allows Rio Tinto to control over 200 driverless trucks to move 130 million tons of material When it comes...

Related market: Government & Public Services
Accessing social media as a tool for physical security with GeofeediaAccessing social media as a tool for physical security with Geofeedia
27 October, 2014: Especially for younger individuals, sharing on social media is almost an automatic reflex. Bystanders at any event are likely to constantly be tweeting...
next1|2|3|4|5|6|7|8|9|10|11|12|13|14next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition