SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Site tour of SourceSecurity.com
In focus

Sudan security news

1,053 articles found
Showing 1 to 20 of 1,053 Sudan security news articles
Page 1 of 53 pages
Addressing the unique security challenges of primary/secondary schoolsAddressing the unique security challenges of primary/secondary schools
Schools are unlike commercial buildings or other facilities in several ways, and the differences impact how they should be secured. For one thing, the...
Networking basics for security professionals: Do you believe in specifications?Networking basics for security professionals: Do you believe in specifications?
Misreading specifications of transmission products can lead to making the wrong selection Manufacturers’ product specifications are...
Security camera manufacturers address commoditisation and lower pricingSecurity camera manufacturers address commoditisation and lower pricing
26 March, 2015: Commoditisation of cameras and downward price pressure are big topics in the video surveillance market. There was an interesting discussion about pricing and...
Video surveillance storage suppliers gearing up to meet demandVideo surveillance storage suppliers gearing up to meet demand
According to a recent MarketsandMarkets report, video surveillance storage solutions and services are experiencing a rapid adoption in the industry,...
Allegion on IoT: 5 questions with futurist Rob MartensAllegion on IoT: 5 questions with futurist Rob Martens
Rob Martens, Allegion's futurist and director of connectivity platforms, is a leading strategist on the Internet of Things (IoT). He will be a featured...
ISC West 2015: Insights from more than two decadesISC West 2015: Insights from more than two decades
Budinoff believes that ISC West is the most comprehensive product show for the physical security industry Daniel Budinoff, president of...
Sports security: Ensuring safety at sports venues a continuing challengeSports security: Ensuring safety at sports venues a continuing challenge
Anything that can incite a crowd surge is a security threat in a sports arena Security at sports stadiums is making headlines across...
Designing security systems: Project management techniquesDesigning security systems: Project management techniques
Access control and video surveillance technologies are expensive to buy and install. So it’s important that end users make sure they get a system that...
Smart thermal cameras protect perimeters in transportation applicationsSmart thermal cameras protect perimeters in transportation applications
Thermal cameras can often be used to cover larger areas than standard visible light cameras Smart thermal cameras use on-board video...
exacqVision 6.8 with VideoPush feature
18 March, 2015: Exacq Technologies, part of the Security Products business unit of Tyco, introduces faster camera discovery and VideoPush to mobile devices with exacqVision...
Utilising intelligence analysts to improve businessUtilising intelligence analysts to improve business
If your company has a facility or a current business meeting in Seoul, South Korea, you would want to know the details behind the recent knife attack on the...
Cloud-based systems: Current challenges and future technologyCloud-based systems: Current challenges and future technology
There’s more talk than ever in the security industry about cloud-based systems – where they are, where they’re going, the risks, the...
Networking basics for security professionals: What network switches don’t doNetworking basics for security professionals: What network switches don’t do
Differences between standard data applications and the requirements of networks designed for IP video security applications are critical for your...
Key management essential for transportation environmentKey management essential for transportation environment
Lost or damaged keys cost authorities thousands of dollars to replace Keys are a common element in any transportation department, and...
Networking basics for security professionals: The 60 Watt dilemmaNetworking basics for security professionals: The 60 Watt dilemma
Standards for camera manufacturers presented a new challenge with the introduction of security cameras that require more than 30 Watts of power...
MIPS 2015: Largest-ever Milestone symposium keeps focus on partnersMIPS 2015: Largest-ever Milestone symposium keeps focus on partners
12 March, 2015: This year’s 10th anniversary Milestone Integration Platform Symposium (MIPS) was the largest ever, with 463 participants, including manufacturers,...
Addressing false alarms in video analyticsAddressing false alarms in video analytics
Improvements in the technology have lowered – but not eliminated – concerns about false alarms False alarms have plagued the...
Learning to use visitor management technology in schoolsLearning to use visitor management technology in schools
It’s important for everyone in a high school to wear an ID Handwritten check in and check out books fail to alert the security risks...
HID Global Mobile Access Solution via Samsung KNOX 2.4 mobile platform
10 March, 2015: HID Global®, a worldwide leader in secure identity solutions, has partnered with Samsung to provide enterprises with a secure and seamless management and...
Honeywell IS335 Motion Detector
10 March, 2015: Honeywell recently expanded its line of Performance Series IP embedded network video recorders (NVRs), giving customers more flexibility when designing...
1|2|3|4|5|6|7|8|9|10|11|12|13|14next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition