SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Site tour of SourceSecurity.com

Sweden security news

1,922 articles found
Showing 201 to 220 of 1,922 Sweden security news articles
Page 11 of 97 pages
Axis Zipstream technology lowers bandwidth and storage requirements by an average 50 percent in video surveillance applications
Axis Communications, the market leader in network video, introduces Zipstream technology allowing customers to benefit from reduced bandwidth and storage requirements without having to invest in new cameras or software. Axis’ Zipstream technology is...
Combining LPR and video analytics for enterprise applications
Advances in LPR: License plate recognition (LPR) is used widely today in law enforcement applications, but the enterprise security market is also catching on to benefits of the technology – especially when it is combined with other video analytics....
Designing security systems: Project management techniques
Access control and video surveillance technologies are expensive to buy and install. So it’s important that end users make sure they get a system that works the way it is supposed to work and the way they want it to work. To that end, the principles...
Smart thermal cameras protect perimeters in transportation applications
Thermal cameras can often be used to cover larger areas than standard visible light cameras Smart thermal cameras use on-board video analytics and a high degree of video processing to detect people very accurately in complete darkness,...
exacqVision 6.8 with VideoPush feature
Exacq Technologies, part of the Security Products business unit of Tyco, introduces faster camera discovery and VideoPush to mobile devices with exacqVision 6.8 and automatic backup of recorder configurations in Enterprise System Manager (ESM), a health...
Utilising intelligence analysts to improve business
If your company has a facility or a current business meeting in Seoul, South Korea, you would want to know the details behind the recent knife attack on the U.S. ambassador to South Korea, Mark W. Lippert. You would want to know that the attacker belonged...
Siemens compact keypads for SPC intruder detection system
Siemens has introduced two new compact keypads for the SPC intruder detection system. They use touchkeys instead of traditional mechanical keys and the key interface illuminates only when touched. With a depth of just 17.5mm, these keypads sit unobtrusively...
Cloud-based systems: Current challenges and future technology
There’s more talk than ever in the security industry about cloud-based systems – where they are, where they’re going, the risks, the rewards. New opportunities for integrator companies, especially related to recurring monthly revenue...
Networking basics for security professionals: What network switches don’t do
Differences between standard data applications and the requirements of networks designed for IP video security applications are critical for your system's performance When the need to purchase a network switch arises, many IT directors...
Key management essential for transportation environment
Lost or damaged keys cost authorities thousands of dollars to replace Keys are a common element in any transportation department, and an automated key control system is a valuable tool. Key management systems offer multi-site...
Networking basics for security professionals: The 60 Watt dilemma
Standards for camera manufacturers presented a new challenge with the introduction of security cameras that require more than 30 Watts of power Standards for camera manufacturers presented a new challenge with the introduction of security...
MIPS 2015: Largest-ever Milestone symposium keeps focus on partners
This year’s 10th anniversary Milestone Integration Platform Symposium (MIPS) was the largest ever, with 463 participants, including manufacturers, integrators and thought leaders from throughout the industry. Emphasizing Milestone’s “open...
Addressing false alarms in video analytics
Improvements in the technology have lowered – but not eliminated – concerns about false alarms False alarms have plagued the video analytics market since the beginning. Improvements in the technology have lowered – but...
Learning to use visitor management technology in schools
It’s important for everyone in a high school to wear an ID Handwritten check in and check out books fail to alert the security risks posed by individuals on school campuses. Installing visitor management systems is imperative to...
Barix appoints LineQ as U.S. distribution partner
The appointment of LineQ reflects the global sales strategy of Barix through regional channels worldwide IP audio and control specialist Barix has appointed LineQ as their distribution partner in the United States. For years, the company...
HID Global Mobile Access Solution via Samsung KNOX 2.4 mobile platform
HID Global®, a worldwide leader in secure identity solutions, has partnered with Samsung to provide enterprises with a secure and seamless management and door opening experience via the robust KNOX 2.4 mobile platform that will be integrated into the...
Honeywell IS335 Motion Detector
Honeywell recently expanded its line of Performance Series IP embedded network video recorders (NVRs), giving customers more flexibility when designing customised IP video systems. Now available in eight or 16 channel models, the embedded NVRs are...
AXIS P39-R network camera series for outdoor use on vehicles
AXIS P3905-RE is an outdoor-ready camera addition to the family of compact, rugged and discreet cameras of the AXIS P39-R Network Camera Series. They are all specially designed for onboard video surveillance in or on buses, trains, subway cars and emergency...
Is home automation driving a security renaissance?
According to research firm IHS Technology, the residential intrusion alarm market is expected to grow by 9.4 percent in 2015 For years, the industry’s penetration rate for security alarm systems has hovered from a conservative...
Security’s new job - Managing supply chain risks
Supply chain risk management involves identifying and dealing with supply chain uncertainties that pose a threat to business continuity Today’s complex world needs risk managers, business people that think about the bad things that...
next4|5|6|7|8|9|10|11|12|13|14|15|16|17|18next
Go to :
border
Related videos

Upcoming security events and tradeshows in Sweden

Event nameLocationDate
MPOP Sweden 2015Vasagatan 1, Sweden8 Sep, 2015
SECTECH - Stockholm 2015Stockholm, Sweden11 - 12 Nov, 2015
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition