SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Site tour of SourceSecurity.com
Unique environments

Saudi Arabia security news

1,064 articles found
Showing 1 to 20 of 1,064 Saudi Arabia security news articles
Page 1 of 54 pages
Networking basics for security professionals: PoE standards are not so standardNetworking basics for security professionals: PoE standards are not so standard
Standards are like a warm blanket on a cold winter night. They make us feel safe and warm. A standard tells us the devices we use within our...
Airbus Defence and Space will supply Z:NightOwl M surveillance system to Middle Eastern countryAirbus Defence and Space will supply Z:NightOwl M surveillance system to Middle Eastern country
27 February, 2015: Z:NightOwl M consists of third-generation thermal imager with an optimal megapixel detector The Optronics business unit of Airbus...
Retail applies video analysis beyond securityRetail applies video analysis beyond security
Video analytics isn’t just for security. In general, the ability to leverage data from video provides a new wealth of information and...
HID Global UHF RFID tags for industrial environments
26 February, 2015: HID Global®, a worldwide leader in secure identity solutions, recently announced that its Identification Technologies division has launched its new High...
Transportation sees general and purpose-built cameras performing wellTransportation sees general and purpose-built cameras performing well
The ability to clearly see facial features and other identifying characteristics on each passenger greatly enhances security Some of the...
Veterans in security: Military skills utilised to develop strategiesVeterans in security: Military skills utilised to develop strategies
Veterans are able to use their skills from the military to help develop strategies Kevin Farrell always arrives early to his job at the...
Forensic benefits of video analyticsForensic benefits of video analytics
Intelligent searches of video archives provide investigators faster access to any needed video clip Video analytics have earned a...
Networking basics for security professionals: How does PoE work?Networking basics for security professionals: How does PoE work?
The action of a voltage applied to a resistance element, draws power from the switch’s PoE port We often think about a power supply...
High quality images maximise video analytics successHigh quality images maximise video analytics success
The better the sensors, the better the analytics Garbage in, garbage out. The familiar cliché is just as applicable to the area of...
Enter the hackers: Cyber-criminals target SCADA embedded systemsEnter the hackers: Cyber-criminals target SCADA embedded systems
Forty-one percent of cyber incidents involved the energy sector The Bipartisan Policy Center, the Industrial Control Systems Cyber...
Video analytics systems in real-world environmentsVideo analytics systems in real-world environments
Various vertical markets such as retail, airports, and transportation have benefited from video analytics Video analytics systems have...
Post Canon acquisition, Axis reiterates commitment to open systemsPost Canon acquisition, Axis reiterates commitment to open systems
20 February, 2015: In the wake of Canon’s acquisition of Axis Communications, the company faces a communication challenge in the market – to reiterate the camera...
Canon-Axis buy: Integrators respondCanon-Axis buy: Integrators respond
Recent news of Canon’s $2.83 billion cash bid for network surveillance leader Axis Communications came as a surprise to some, but many...
Still independent, Genetec emphasises innovationStill independent, Genetec emphasises innovation
19 February, 2015: Given the current trend toward consolidation, the industry has seen more camera manufacturers and software suppliers aligning under the same owner. Bucking...
Importance of upgrading physical security systemsImportance of upgrading physical security systems
Regular upgrading ensures all systems communicate correctly  In the IT world, innovation moves quickly. New versions of software are...
Addressing business goals for transportationAddressing business goals for transportation
Many purpose-focused stand-alone systemsaddress business goals aside from security Transportation gets passengers and goods to their...
Hardware vs. software-based surveillance recorders: which is best for you?Hardware vs. software-based surveillance recorders: which is best for you?
Coming of age: storage devices have evolved to better record, manage and play back high-quality images Video surveillance and security...
The way we were: Canon and Axis have a history of collaborationThe way we were: Canon and Axis have a history of collaboration
17 February, 2015: A more than 20-year shared history between Canon and Axis Communications has been an underreported aspect of the recent announcement by the world’s...
Networking basics for security professionals:  Transmission limitationsNetworking basics for security professionals: Transmission limitations
Transmission of video and PoE power for IP security cameras over infrastructures can be confusing. Network infrastructures are designed...
Security identity crisis: What’s in a name?Security identity crisis: What’s in a name?
Whether you are a contractor, installer, dealer or systems integrator depends on where you live and how you are perceived by the real world...
1|2|3|4|5|6|7|8|9|10|11|12|13|14next
Go to :
border
Related videos

Upcoming security events and tradeshows in Saudi Arabia

Event nameLocationDate
Saudi Safety and Security 2015Dammam, Saudi Arabia10 - 12 May, 2015
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition