SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Site tour of SourceSecurity.com

Ireland security news

1,779 articles found
Showing 161 to 180 of 1,779 Ireland security news articles
Page 9 of 89 pages
Integrators should foster relationships to increase primary/secondary education sales
Integrators must understand that the primary/secondary education market has a unique and urgent need for access control, but with limited budgets Systems integrators play a key role delivering effective security solutions to the...
Mul-T-Lock to present its digital security advances with ASSA ABLOY at IFSEC 2015
Visitors to Mul-T-Lock will be invited to experience ENTR, the first smart lock solution in the market Mul-T-Lock® will be at IFSEC 2015 with ASSA ABLOY to present its very latest revolutionary advances in digital security. The global...
IFSEC 2015: Bosch Security Systems’ latest innovations and technologies to be showcased
Bosch’s new FLEXIDOME IP panoramic camera family as well as AUTODOME IP 4000 and 5000 models will be shown at the event From 16th to 18th of June, Bosch Security Systems will showcase its innovations and award-winning technologies...
School security: Communication and controlling access
Readily available security technology can help officials take control of their campuses Two top priorities for school security are the ability to communicate within a facility, and the ability to control access of who comes and goes. Paul...
Networking basics for security professionals: What do layers really mean?
Layering as applied to computers is a made up term having no relationship to any particular standards When it comes to setting the criteria for network switching, we often hear “I only want a layer 3 switch.” We naturally...
Convergence of IT networks and physical security
Kevin Brownell, principal physical security consultant at PTS Consulting Group, considers convergence of IT networks and physical security. He argues that current best practice shows that they no longer need to be separate disciplines and reassures...
Technology advancement requires well-educated, well-paid security officers
The industry has to advance in terms of attracting experienced people and paying for that experience Time was, security officers patrolled with walkie-talkies, responding to dispatchers monitoring cameras in the control centre. The post...
Online and offline locks: Leveraging the best of both options
Online wireless locks enable real-time online access control functionality Organisations require more than a “one-size-fits-all” approach from their access control technology. Today, integrators leverage a mix of both online...
The Internet of Things presents new cyber-vulnerabilities
Companies need to increase the knowledge within their business on the range of cyber-vulnerabilities At one time, embedded devices, such as access control components communicating with application software, used proprietary protocols like...
Cyber-defence challenges cannot be ignored, says DVTEL
Cybersecurity has been getting much more attention lately in the physical security market. One company ready to address cybersecurity of IP video products is DVTEL. The Israeli company’s roots in IT and networking make it a logical choice to take a...
Networking basics for security professionals: Misinterpreting product specs – temperature, latency and more
Too often a valid assumption turns out to be the opposite in practical operation It’s easy to misinterpret product specifications of IP video transmission products to the detriment of system functionality. We have seen how this...
Illinois Association works to quell proposed fire alarm legislation
Anyone who questions the value of participation in local and national burglar and fire alarm associations need only look at the ongoing activities of the Illinois Electronic Security Association (IESA) to validate the reason for membership. Just last week...
Deploying a high-performance computing environment to minimise processing costs
Organisations must find more effective ways to optimise the use of the resources they have available As market demand intensifies for higher resolution from megapixel, and 4K cameras, customers will begin to feel the ensuing cost...
From consolidation to video services: Milestone’s Thinggaard talks coming trends
Milestone Systems is closing in on a year since their acquisition by Canon’s European subsidiary in June 2014. Throughout the ownership transition, Milestone has reiterated its commitment to open systems and continued to flourish, building its...
Impact of school shootings on demand for security systems
School administrators are now choosing products that make the biggest, long-term impact on campus security Well-publicised events such as the U.S. school shootings at Columbine and Sandy Hook lead to an increased demand of security...
Networking basics for security professionals: Considering 4k’s impact on networks
Since last year there has been a lot of talk with regard IP security cameras with 4K resolution. As with any advancement in video security, this too has come about due to advances in consumer electronics. While being the “latest...
GJD to showcase latest innovations at IFSEC 2015
Featuring on GJD’s stand will be the recently launched D-TECT 2 IP detector GJD Manufacturing Limited, one of the world’s most innovative leaders in UK manufacturing, design and supply of professional external detector...
Networking basics for security professionals: Do you believe in specifications?
Misreading specifications of transmission products can lead to making the wrong selection Manufacturers’ product specifications are the main source of determining product purchases for video security users. In many cases, the...
Addressing the unique security challenges of primary/secondary schools
Schools are unlike commercial buildings or other facilities in several ways, and the differences impact how they should be secured. For one thing, the inhabitants are mainly children and won’t carry card credentials. Also, schools have distinct...
Protection & Management 2015: Sir Ranulph Fiennes confirmed for Inspirational Speaker Series
Sir Ranulph Fiennes will touch on how the ability to perform under extreme pressure determines success Sir Ranulph Fiennes Bt OBE has recently been revealed as the second high-profile speaker confirmed for the Inspirational Speaker...
next2|3|4|5|6|7|8|9|10|11|12|13|14|15|16next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition