SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Site tour of SourceSecurity.com

Sri Lanka security news

1,251 articles found
Showing 1 to 20 of 1,251 Sri Lanka security news articles
Page 1 of 63 pages
School security & safety best practices: Designing physical security frameworkSchool security & safety best practices: Designing physical security framework
School security has increasingly become an area of focus among school boards and municipalities. Officials are constantly seeking to...
Frank De Fina – remembering a security industry iconFrank De Fina – remembering a security industry icon
31 July, 2015: Frank De Fina’s death this week came as a shock to everyone in the security industry. The industry has lost both a giant presence and a good friend. He...
PSIM transition to Converged Security and Information Management (CSIM)PSIM transition to Converged Security and Information Management (CSIM)
(see bigger image) The very nature of true enterprise PSIM software is that it has the capability to connect to other systems and subsystems...
Physical security industry adopts social media monitoringPhysical security industry adopts social media monitoring
Private security professionals and law enforcement personnel are leveraging social media as a physical security tool to identify security...
Honeywell, Twitter integration for situational awareness and emergency communicationsHoneywell, Twitter integration for situational awareness and emergency communications
Honeywell, Twitter integration brings security communication to its life safety products Honeywell, Northford, Conn., is leveraging...
Home automation standards and protocolsHome automation standards and protocols
As the home automation industry has expanded with an ever growing number of devices and services, companies are placing bets on which wireless protocols will...
EMERgency 24, dealer value and RMR with critical response servicesEMERgency 24, dealer value and RMR with critical response services
EMERgency 24 developed the Incident Command and Control platform to deliver faster and more succinct data to first responders and others...
Airport perimeter security breach – laughable or potential threat?Airport perimeter security breach – laughable or potential threat?
If airport perimeter fencing is vulnerable then covert detection methods should be used Lack of airport perimeter security would be...
Role of security integrators in the Internet of Things eraRole of security integrators in the Internet of Things era
23 July, 2015: Where do traditional security dealer/integrators fit in the new era defined by the Internet of Things (IoT)? According to Robert C. Martens, Allegion's...
Body search and airport security – maximising safety and dignity for travellersBody search and airport security – maximising safety and dignity for travellers
A US Department of Homeland Security investigation showed that undercover agents defeated airport screening in 95 percent of cases by...
Internet of Things (IoT) impacts video surveillance and security sectorInternet of Things (IoT) impacts video surveillance and security sector
According to some estimates, the Internet of Things will connect 50 billion devices by 2020 This article by Keith Jernigan Sr., General...
Smart home security risks with Internet of things (IoT)Smart home security risks with Internet of things (IoT)
The appealing convenience of Smart Home devices comes with a sobering downside Security and technology are rushing to offer home...
Physical security solution buying guide: 7 things to considerPhysical security solution buying guide: 7 things to consider
All seven decision factors contribute to an effective physical security solution Installation of an effective physical security solution...
Beyond the camera: Body worn camera management and data storage opportunitiesBeyond the camera: Body worn camera management and data storage opportunities
For police, BWCs can significantly improve how evidence is collected by recording the visual and audio actions Body worn...
Role of interactive services in maintaining steady RMR streamRole of interactive services in maintaining steady RMR stream
Affiliated Monitoring’s UL-Listed monitoring centre with a second floor dedicated to areas for security company meetings Central...
Biometric security: Growth and challenges in fingerprint technology and new devicesBiometric security: Growth and challenges in fingerprint technology and new devices
Biometrics is most useful as an additional level of authentication — determining that you are who you say you are Over the years,...
Security integrators face tough competition in smart home marketSecurity integrators face tough competition in smart home market
Successful companies who want into home automation should begin with the customers they know What does it take to be a success in the...
Raytec’s Panoramic Ultra IR illuminator range launched at IFSEC 2015Raytec’s Panoramic Ultra IR illuminator range launched at IFSEC 2015
10 July, 2015: The new range of illuminators provide wide angle 180° illumination to generate images at night, at distances up to 150m & beyond...
Revisiting video analytics - applications beyond securityRevisiting video analytics - applications beyond security
When video analytics first emerged in the security industry about a decade ago, there were high hopes it would instantly transform the landscape of video...
Laser scanning technology for perimeter protection, building security applicationsLaser scanning technology for perimeter protection, building security applications
When it comes to protecting buildings and property, traditional methods of security—such as structural barriers, security guards,...
1|2|3|4|5|6|7|8|9|10|11|12|13|14next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition
{*}{*}