SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Site tour of SourceSecurity.com
REGISTERTerms
Powerful

Kenya security news

1,384 articles found
Showing 301 to 320 of 1,384 Kenya security news articles
Page 16 of 70 pages
Video surveillance trends driving increasing storage needs
End users in the video surveillance market are looking for higher quality images and to retain those images for longer periods. Also, small- and...
ASSA ABLOY to showcase integrated security & access control technology at IFSEC 2015
ASSA ABLOY , the global leader in door opening solutions, will be showcasing integrated security and access control technology from its leading brands at...
Integrators should foster relationships to increase primary/secondary education sales
Systems integrators play a key role delivering effective security solutions to the kindergarten through 12 th grade (primary/secondary) education...
Mul-T-Lock to present its digital security advances with ASSA ABLOY at IFSEC 2015
Mul-T-Lock ® will be at IFSEC 2015 with ASSA ABLOY to present its very latest revolutionary advances in digital security. The global brand will...
IFSEC 2015: Bosch Security Systems’ latest innovations and technologies to be showcased
From 16th to 18th of June, Bosch Security Systems will showcase its innovations and award-winning technologies in the South hall on stand F700 during...
School security: Communication and controlling access
Two top priorities for school security are the ability to communicate within a facility, and the ability to control access of who comes and goes. Paul...
Networking basics for security professionals: What do layers really mean?
When it comes to setting the criteria for network switching, we often hear “I only want a layer 3 switch.” We naturally assume that since the...
Convergence of IT networks and physical security
Kevin Brownell, principal physical security consultant at PTS Consulting Group , considers convergence of IT networks and physical security . He argues...
Technology advancement requires well-educated, well-paid security officers
Time was, security officers patrolled with walkie-talkies, responding to dispatchers monitoring cameras in the control centre. The post of security...
Online and offline locks: Leveraging the best of both options
Organisations require more than a “one-size-fits-all” approach from their access control technology. Today, integrators leverage a mix of...
The Internet of Things presents new cyber-vulnerabilities
At one time, embedded devices, such as access control components communicating with application software, used proprietary protocols like RS485. Use of...
Cyber-defence challenges cannot be ignored, says DVTEL
Cybersecurity has been getting much more attention lately in the physical security market. One company ready to address cybersecurity of IP video...
Networking basics for security professionals: Misinterpreting product specs – temperature, latency and more
It’s easy to misinterpret product specifications of IP video transmission products to the detriment of system functionality. We have seen how this...
Illinois Association works to quell proposed fire alarm legislation
Anyone who questions the value of participation in local and national burglar and fire alarm associations need only look at the ongoing activities of the...
Deploying a high-performance computing environment to minimise processing costs
As market demand intensifies for higher resolution from megapixel, and 4K cameras, customers will begin to feel the ensuing cost pressures caused by the...
From consolidation to video services: Milestone’s Thinggaard talks coming trends
Milestone Systems is closing in on a year since their acquisition by Canon’s European subsidiary in June 2014. Throughout the ownership...
Impact of school shootings on demand for security systems
Well-publicised events such as the U.S. school shootings at Columbine and Sandy Hook lead to an increased demand of security equipment to protect...
SecProTec East Africa 2015: Messe Frankfurt expands portfolio in Africa
Having acquired a South African subsidiary with several events in the middle of this year, Messe Frankfurt is continuing to expand its portfolio in...
Networking basics for security professionals: Considering 4k’s impact on networks
Since last year there has been a lot of talk with regard IP security cameras with 4K resolution. As with any advancement in video security , this too...
GJD to showcase latest innovations at IFSEC 2015
GJD Manufacturing Limited , one of the world’s most innovative leaders in UK manufacturing, design and supply of professional external detector...
next9|10|11|12|13|14|15|16|17|18|19|20|21|22|23next
Go to :
border
Related videos

Upcoming security events and tradeshows in Kenya

Event nameLocationDate
Convergence Africa World 2016Nairobi, Kenya22 - 24 Jun, 2016
SecProTec East Africa 2016 powered byNairobi, Kenya12 - 14 Jul, 2016
Securexpo East Africa 2016Nairobi, Kenya8 - 10 Nov, 2016
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition