SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Everything you need know

Korea (South) security news

1,551 articles found
Showing 421 to 440 of 1,551 Korea (South) security news articles
Page 22 of 78 pages
Networking basics for security professionals: The 60 Watt dilemma
Standards for camera manufacturers presented a new challenge with the introduction of security cameras that require more than 30 Watts of power....
MIPS 2015: Largest-ever Milestone symposium keeps focus on partners
This year’s 10 th anniversary Milestone Integration Platform Symposium (MIPS) was the largest ever, with 463 participants, including manufacturers ,...
Addressing false alarms in video analytics
False alarms have plagued the video analytics market since the beginning. Improvements in the technology have lowered – but not eliminated –...
Learning to use visitor management technology in schools
Handwritten check in and check out books fail to alert the security risks posed by individuals on school campuses. Installing visitor management...
HID Global Mobile Access Solution via Samsung KNOX 2.4 mobile platform
HID Global®, a worldwide leader in secure identity solutions, has partnered with Samsung to provide enterprises with a secure and seamless management...
Honeywell IS335 Motion Detector
Honeywell recently expanded its line of Performance Series IP embedded network video recorders (NVRs), giving customers more flexibility when designing...
AXIS P39-R network camera series for outdoor use on vehicles
AXIS P3905-RE is an outdoor-ready camera addition to the family of compact, rugged and discreet cameras of the AXIS P39-R Network Camera Series. They are...
Is home automation driving a security renaissance?
For years, the industry’s penetration rate for security alarm systems has hovered from a conservative 18 percent of households to a more liberal...
Security’s new job - Managing supply chain risks
Today’s complex world needs risk managers, business people that think about the bad things that might happen and lay plans to eliminate or at...
Combining thermal cameras with video analytics
Prices are dropping for thermal cameras. Now they are much more affordable for non-military customers – and more likely to be used in combination...
Key to IoT (Internet of Things) success: Scalable computing platforms
The era of IoT - the Internet of Things - is upon us. A deluge of urban sensory data is flowing into data centers every minute, putting pressure on...
Transportation end users embracing open video platform
The transportation vertical is embracing the open platform for video systems. In the past, manufacturers required transportation end users to purchase...
Video analytics: On the server or at the edge?
There are multiple benefits to using video analytics at the edge (i.e., near or inside the camera). For one thing, analytics at the edge provides the...
Video analytics applications in retail - beyond security
Video analytics isn’t just for security. In general, the ability to leverage data from video provides a new wealth of information and...
Networking basics for security professionals: PoE standards are not so standard
Standards are like a warm blanket on a cold winter night. They make us feel safe and warm. A standard tells us the devices we use within our systems will...
HID Global UHF RFID tags for industrial environments
HID Global®, a worldwide leader in secure identity solutions, recently announced that its Identification Technologies division has launched its new High...
Custom-built IP cameras to boost transport security
Some of the video technology used in the transportation vertical is purpose-built, but the wide range of applications and environments is conducive to a...
Veterans in security: Military skills utilised to develop strategies
Ex-army officers/ military veterans bring considerable skills and invaluable experience to security companies. Not only do they play an important role...
Video Analytics for forensics: Analytics-based forensic evidence collection
That video analytics can be immensely useful in forensics is relatively less known. However, forensic search capabilities offered by some modern video...
Networking basics for security professionals: How does PoE work?
We often think about a power supply operating in a single format. A power source provides power to a device. You plug it into a wall outlet and...
next15|16|17|18|19|20|21|22|23|24|25|26|27|28|29next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition