SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Site tour of SourceSecurity.com

Sweden security news

1,907 articles found
Showing 201 to 220 of 1,907 Sweden security news articles
Page 11 of 96 pages
HID Global Mobile Access Solution via Samsung KNOX 2.4 mobile platform
HID Global®, a worldwide leader in secure identity solutions, has partnered with Samsung to provide enterprises with a secure and seamless management and door opening experience via the robust KNOX 2.4 mobile platform that will be integrated into the...
Honeywell IS335 Motion Detector
Honeywell recently expanded its line of Performance Series IP embedded network video recorders (NVRs), giving customers more flexibility when designing customised IP video systems. Now available in eight or 16 channel models, the embedded NVRs are...
AXIS P39-R network camera series for outdoor use on vehicles
AXIS P3905-RE is an outdoor-ready camera addition to the family of compact, rugged and discreet cameras of the AXIS P39-R Network Camera Series. They are all specially designed for onboard video surveillance in or on buses, trains, subway cars and emergency...
Is home automation driving a security renaissance?
According to research firm IHS Technology, the residential intrusion alarm market is expected to grow by 9.4 percent in 2015 For years, the industry’s penetration rate for security alarm systems has hovered from a conservative...
Security’s new job - Managing supply chain risks
Supply chain risk management involves identifying and dealing with supply chain uncertainties that pose a threat to business continuity Today’s complex world needs risk managers, business people that think about the bad things that...
Combining thermal cameras with video analytics
Combining thermal imaging with analytics provides a robust system Prices are dropping for thermal cameras. Now they are much more affordable for non-military customers – and more likely to be used in combination with video...
Key to IoT (Internet of Things) success: Scalable computing platforms
The era of IoT - the Internet of Things - is upon us. A deluge of urban sensory data is flowing into data centers every minute, putting pressure on data-centre resources and accumulating at a rate faster than anyone can process. Is the...
Transportation end users embracing open video platform
Milestone Interconnect provides a cost-efficient and flexible way to have central surveillance operation across geographically dispersed sites The transportation vertical is embracing the open platform for video systems. In the past,...
Video analytics: On the server or at the edge?
Analytics at the edge provide the ability to process what is happening in a field of view and discern if a relevant alert is triggered There are multiple benefits to using video analytics at the edge (i.e., near or inside the camera). For...
Allegion launches inspec - a new specification guide for 2015
Leading global provider of security and safety solutions, Allegion, has placed an emphasis on complete specification solutions to save specifiers, architects and contractors time and resources, through the launch of inspec - a new Specification Guide for...
Milestone Systems releases XProtect bi-monthly Device Pack 7.8
Milestone Systems, the open platform company in IP video management software (VMS), has just released its bi-monthly Device Pack 7.8 for the XProtect® portfolio of products. The most significant feature in this upgrade is support for a new type of...
Video analytics applications in retail - beyond security
Video analytics isn’t just for security. In general, the ability to leverage data from video provides a new wealth of information and “intelligence” about all aspects of the business. The retail vertical is leading the way in...
Networking basics for security professionals: PoE standards are not so standard
Standards are like a warm blanket on a cold winter night. They make us feel safe and warm. A standard tells us the devices we use within our systems will interact with each other regardless of manufacturer. For IP-powered PoE devices, we...
HID Global UHF RFID tags for industrial environments
HID Global®, a worldwide leader in secure identity solutions, recently announced that its Identification Technologies division has launched its new High Temperature Label portfolio of wafer-thin UHF RFID tags that endure harsh industrial environments....
Custom-built IP cameras to boost transport security
The ability to clearly see facial features and other identifying characteristics on each passenger greatly enhances security Some of the video technology used in the transportation vertical is purpose-built, but the wide range of...
Veterans in security: Military skills utilised to develop strategies
Veterans are able to use their skills from the military to help develop strategies Ex-army officers/ military veterans bring considerable skills and invaluable experience to security companies. Not only do they play an important role in...
Video Analytics for forensics: Analytics-based forensic evidence collection
Intelligent searches of video archives provide investigators faster access to any needed video clip That video analytics can be immensely useful in forensics is relatively less known. However, forensic search capabilities offered by some...
Networking basics for security professionals: How does PoE work?
The action of a voltage applied to a resistance element, draws power from the switch’s PoE port We often think about a power supply operating in a single format. A power source provides power to a device. You plug it into a wall...
High quality images maximise video analytics success
The better the sensors, the better the analytics Garbage in, garbage out. The familiar cliché is just as applicable to the area of video analytics as any other field of computing. You simply must have a high-quality image in order...
Cybersecurity - Hackers target SCADA embedded systems
Forty-one percent of cyber incidents involved the energy sector The Bipartisan Policy Center, the Industrial Control Systems Cyber Emergency Response Team, which is part of the U.S. Department of Homeland Security, reports responding to...
next4|5|6|7|8|9|10|11|12|13|14|15|16|17|18next
Go to :
border
Related videos

Upcoming security events and tradeshows in Sweden

Event nameLocationDate
MPOP Sweden 2015Vasagatan 1, Sweden8 Sep, 2015
SECTECH - Stockholm 2015Stockholm, Sweden11 - 12 Nov, 2015
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition
{*}{*}