SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Site tour of SourceSecurity.com

Netherlands security news

1,719 articles found
Showing 61 to 80 of 1,719 Netherlands security news articles
Page 4 of 86 pages
Video analytics: On the server or at the edge?
Analytics at the edge provide the ability to process what is happening in a field of view and discern if a relevant alert is triggered There are multiple benefits to using video analytics at the edge (i.e., near or inside the camera). For...
Allegion launches inspec - a new specification guide for 2015
Leading global provider of security and safety solutions, Allegion, has placed an emphasis on complete specification solutions to save specifiers, architects and contractors time and resources, through the launch of inspec - a new Specification Guide for...
Milestone Systems releases XProtect bi-monthly Device Pack 7.8
Milestone Systems, the open platform company in IP video management software (VMS), has just released its bi-monthly Device Pack 7.8 for the XProtect® portfolio of products. The most significant feature in this upgrade is support for a new type of...
Video analytics applications in retail - beyond security
Video analytics isn’t just for security. In general, the ability to leverage data from video provides a new wealth of information and “intelligence” about all aspects of the business. The retail vertical is leading the way in...
Networking basics for security professionals: PoE standards are not so standard
Standards are like a warm blanket on a cold winter night. They make us feel safe and warm. A standard tells us the devices we use within our systems will interact with each other regardless of manufacturer. For IP-powered PoE devices, we...
HID Global UHF RFID tags for industrial environments
HID Global®, a worldwide leader in secure identity solutions, recently announced that its Identification Technologies division has launched its new High Temperature Label portfolio of wafer-thin UHF RFID tags that endure harsh industrial environments....
Custom-built IP cameras to boost transport security
The ability to clearly see facial features and other identifying characteristics on each passenger greatly enhances security Some of the video technology used in the transportation vertical is purpose-built, but the wide range of...
Veterans in security: Military skills utilised to develop strategies
Veterans are able to use their skills from the military to help develop strategies Ex-army officers/ military veterans bring considerable skills and invaluable experience to security companies. Not only do they play an important role in...
Video Analytics for forensics: Analytics-based forensic evidence collection
Intelligent searches of video archives provide investigators faster access to any needed video clip That video analytics can be immensely useful in forensics is relatively less known. However, forensic search capabilities offered by some...
Critical Infrastructure Protection & Resilience Europe 2015 to open with a Ministerial keynote presentation
Minister Opstelten will provide a strategic overview from the political position to the country's and Europe's changing position on security The opening of the 2nd Critical Infrastructure Protection and Resilience Europe conference will...
Networking basics for security professionals: How does PoE work?
The action of a voltage applied to a resistance element, draws power from the switch’s PoE port We often think about a power supply operating in a single format. A power source provides power to a device. You plug it into a wall...
High quality images maximise video analytics success
The better the sensors, the better the analytics Garbage in, garbage out. The familiar cliché is just as applicable to the area of video analytics as any other field of computing. You simply must have a high-quality image in order...
Cybersecurity - Hackers target SCADA embedded systems
Forty-one percent of cyber incidents involved the energy sector The Bipartisan Policy Center, the Industrial Control Systems Cyber Emergency Response Team, which is part of the U.S. Department of Homeland Security, reports responding to...
Video analytics systems in real-world environments
Various vertical markets such as retail, airports, and transportation have benefited from video analytics Video analytics systems have progressed far beyond the theoretical and are now being used effectively in a range of applications....
Post Canon acquisition, Axis still committed to open security systems
In the wake of Canon’s acquisition of Axis Communications, the company faces a communication challenge in the market – to reiterate the camera manufacturer’s commitment to open systems- acknowledges Fredrik Nilsson, General Manager, North...
Canon-Axis buy: Integrators respond
Recent news of Canon’s $2.83 billion cash bid for network surveillance leader Axis Communications came as a surprise to some, but many could easily digest the move as more consolidation of the marketplace, especially the crowded video...
Still independent, Genetec emphasises innovation
Given the current trend toward consolidation, the industry has seen more camera manufacturers and software suppliers aligning under the same owner. Bucking the trend is software company Genetec.  “Staying independent will help us...
Importance of upgrading physical security systems
Regular upgrading ensures all systems communicate correctly  In the IT world, innovation moves quickly. New versions of software are launched every day to keep business processes running smoothly. So frequent upgrading isn’t...
Addressing business goals for transportation
Many purpose-focused stand-alone systemsaddress business goals aside from security Transportation gets passengers and goods to their destination safely and in a timely manner. Making transportation possible are purpose-focused stand-alone...
Hardware vs. software-based surveillance recorders: which is best for you?
Coming of age: storage devices have evolved to better record, manage and play back high-quality images Video surveillance and security technology continues to come of age. The sophistication of cameras that have moved to high-definition,...
next1|2|3|4|5|6|7|8|9|10|11|12|13|14next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition