SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Smart

Namibia security news

1,598 articles found
Showing 241 to 260 of 1,598 Namibia security news articles
Page 13 of 80 pages
Stadium security protocols tighten amid terrorism; enhanced physical security standards improve public safety
Terrorism threats have focused the attention of sports security professionals like Paul Turner , Director of Event Operations & Security for...
Biometrics’ greater convenience and cost-effectiveness expands its applications to markets beyond security
Once used mostly to secure high-value government facilities, biometrics are now a basic tool used in a variety of vertical markets. This article will...
Sophisticated analytics of high-definition video security systems set to drive growth in surveillance market
Surveillance and CCTV applications are poised for continued growth in 2016 and beyond as security dealers and their end-user customers turn to video...
Run, hide or fight – Law enforcement veteran’s tips for surviving an active shooting incident
Many people who decide to run, hide or fight during an active shooter event survive. John Matthews, a decorated law enforcement veteran and nationally...
Johnson Controls and Tyco to merge, resulting company expects $32 billion 2016 revenue
Johnson Controls and Tyco announced that they have entered into a definitive merger agreement under which Johnson Controls, a global multi-industrial...
Key control technology & guard tour systems enhancing security in healthcare organisations
Morse Watchmans, a leading provider of key management solutions explains how to provide top-notch security and manage asset with a combination of key...
Advanced biometric identity systems help tackle immigration & border security issues for screening large numbers of people
As we face 2016, identity management has become more critical to successful security operations. Recent acts of terrorism, border security issues, and...
Justifying corporate security costs with benefits to business continuity
Persistent crime — both physical and logical — and the rise of terrorism around the world have led more and more corporations to expand...
Jemez wins Axis 2015 Technology Integration Partner of the Year at 10th annual connect & converge conference
Jemez Technology was named 2015 Technology Integration Partner of the Year by Axis Communications at its 10th annual Axis Connect & Converge...
Big Data in the physical security market – an overlooked opportunity for end users
Access control and video systems have always yielded a lot of data, although historically much of it has been stored on hard disk drives and later...
Physical security industry tips and best practices for recruiting and retaining top security officers
The physical security industry today is driving focus on finding the right talent. Deborah O’Mara, SourceSecurity.com's dealer/integrator...
5 things to consider before moving your surveillance to cloud-based video storage
Until about a decade ago, most enterprises used their video surveillance systems primarily to view live video or review security incidents after the...
Electronic access control adoption rises as demands for mobile connectivity and building integration increase
Strong electronic access control (EAC) investments by the healthcare and education verticals were a highlight of a very strong 2015 for Allegion. The...
How are biometrics companies expanding system functionalities for better security and identification?
Biometrics companies throughout the security marketplace are expanding the functionality of their systems for a variety of uses. This article will take...
Video analytics and 4K cameras for outdoor city surveillance present opportunities for manufacturers, security resellers and integrators
An improving economy has resulted in additional spending on new and existing security initiatives in 2015, a solid year for the security industry. In...
Growing demand for mobile phone door locks and custom user-friendly access control solutions
With increased demand for high-security door locks in all the vertical markets we serve, the last year has been very good for Securitech. Looking...
Key and asset management are vital parts of security strategy, but more integration is needed
2015 has been a huge success for key and asset management company Traka. The manufacturer is predicting growth between 20 and 30 percent. It attributes...
Security goes mobile: Identity and access management solutions on devices to improve user experience
HID Global is looking forward to a long term investment in a complete range of secure identity solutions. Also, focusing on its global partnership...
Siklu’s millimetre wave wireless technology supports video surveillance networks with improved capacity
Siklu further expanded its presence in the video surveillance market in 2015. The company released the world’s smallest outdoor Gbps radio to...
Security integrators push connectivity with IoT technology and global customer service in 2016
In today’s connected world, our customers are focused on streamlining operations and garnering actionable insights to help drive success across...
next6|7|8|9|10|11|12|13|14|15|16|17|18|19|20next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition