SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Site tour of SourceSecurity.com

Access control software news

1,998 articles found
Showing 201 to 220 of 1,998 articles
Page 11 of 100 pages
Viscount Systems welcomes Geoffrey W. Arens to its Board of Directors
Arens participated in Viscount’s latest funding round and joins as designated board member Viscount Systems, a leading provider of IT-based security software and services, announced recently the addition of Geoffrey W. Arens to its...
M&A activity likely to continue in dynamic security market
Success in the access control arena is enhanced if the business has a global presence Vanderbilt 2014/2015 Review and Forecast: In 2014, our industry continued to be quite dynamic. While there are several “conglomerates” in...
Key emerging trends in security and access control
Emerging trends include cyber security, mobile, physical access control and The Internet of Things Viscount 2014/2015 Review and Forecast: At the enterprise level, spending on physical security continues to be a challenge. Companies...
AxxonSoft introduces version 5.1 of Auto Intellect LPR and Traffic Monitoring module
Version 5.1 of the Auto Intellect module is now available from developer AxxonSoft. Highlights in the new version include improved recognition quality. What's New in Auto Intellect 5.1: Performance of the Carmen algorithm has been optimised for...
Quality and service will transcend price in security marketplace
A return to quality and service will transcend the overall desire for price in the marketplace in 2015 ACT 2014/2015 Review and Forecast: 2014 has proved to be a positive year that displayed an increase in activity. The perception of an...
Credentials on mobile devices to accelerate in 2015
Credential form factors include mobile devices that provide a better way to open doors HID Global 2014/2015 Review and Forecast: High-profile credit card breaches during 2014 raised the profile of low-security solutions while...
Expanding the availability of biometric verification
Working with proximity readers now will let even more end-users use biometrics on high security openings Zwipe 2014/2015 Review & Forecast:All of the news reports in 2014 about the mishandling and hacking of card information has made...
Security technology expanding into multi-functional uses
Technology that was traditionally used as a tool for security is now coming in to its own, providing multi-functional uses Traka 2014/2015 Review and Forecast:Despite tentative economic recovery, businesses in 2014 were still very much...
ASIS President outlines industry-changing trends for 2015
 “Winners” in 2015 will be multinational security solutions companies and recruiters for mid-to senior-level employment placement ASIS International 2014/2015 Review and Forecast: Spending on security systems was up in...
High demand for unified solutions and retrofits to continue into 2015
AMAG saw growth across all vertical market segments, making 2014 an incredibly exciting year 2014/2015 AMAG Technology Review and Forecast: AMAG Technology saw growth across all vertical market segments, making 2014 an incredibly...
Introducing emerald, CEM System's multifunctional IP access terminal
CEM Systems is part of the Security Products business unit of Tyco, the world’s largest pure-play fire protection and Security Company. CEM provides highly advanced security management solutions which include integrated access control, ID badging,...
Embracing big data and discontinuing antiquated systems
Big Data is a challenge that emerging technologies are working to address Quantum Secure 2014/2015 Review and Forecast: As demonstrated by end users’ continued desire to identify and implement technologies that provide the greatest...
The year in mergers and acquisitions: Top 10 of 2014
2014 was a year for eye-popping merger and acquisition (M&A) activity in the security space. The big deals of the year included some of the largest names in the industry. One name is larger than any in the security market –...
The power of uncoupling hardware and software
Uncoupling software from hardware allows manufacturers to respond faster to changes Nedap Security Management 2014/2015 Review and Forecast:Threats such as Mifare hacking, the European General Data Protection regulation coming in 2016,...
Customers want more data analysis and auditing
2014 saw more organisations making data-driven decisions with insight or foresight provided by intelligent analysis of the data Morse Watchmans 2014/2015 Review and Forecast: 2014 saw a year of continued change in the security...
CNL Software's IPSecurityCenter PSIM receives factory certification under Lenel OpenAccess Alliance Program
The interface provides security intelligence, allowing organisations to react faster and more precisely to incidents CNL Software, a world leader in Physical Security Information Management (PSIM) software is pleased to announce that...
Penton announces International Wireless Communications Expo 2015 keynote speakers
Penton’s IWCE keynote speakers includes Roger Cressey and Dr. Reginald Brothers Penton’s International Wireless Communications Expo (IWCE) has announced Roger Cressey, a counter-terrorism analyst for NBC News and former...
Maxxess to unveil its eFusion integration with Salto’s Virtual Network access control at Intersec 2015
Maxxess will also launch an interactive and online security consultant’s pack at the event Maxxess will showcase an unsurpassed number of integrations within its eFusion™ security management platform at Intersec 2015 due to...
Samsung video surveillance brand intact after sale of shares to Hanwha
When is an acquisition not really an acquisition but rather the “sale of shares by one corporate conglomerate to another?” Such is the core question in the aftermath of Samsung’s sale of its interest in Samsung Techwin to fellow Korean...
Biometrics market poised for rapid growth
2014 has been a year of significant growth for TDSi TDSi 2014/2015 Review and Forecast:In 2014 we saw continued growth at TDSI, largely through unprecedented interest in integrated IP security systems. Asian markets have continued...
next4|5|6|7|8|9|10|11|12|13|14|15|16|17|18next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition