SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Openow from SMARTair wireless access control

    Openow from SMARTair wireless access control

    Vanderbilt Bluetooth Low Energy readers

    Vanderbilt Bluetooth Low Energy readers

    Dahua Fixed-focal Dome Network Camera

    Dahua Fixed-focal Dome Network Camera

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • NAPCO Security Technologies releases cell communicator signal-strength tester tool from StarLink
    • ProdataKey’s “touch io” Bluetooth reader now being shipped
    • Dedrone receives certification from CPNI for its DroneTracker counter-drone technology platform
    • VCA Technology launches VCA Server, an AI video analytics solution, to reduce integration time and improve detection rate
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Security bytes
    • Round Table Expert Panel
    • Year in Review 2018
    • Year in Review 2017
    Featured
    • MOBOTIX M7 platform provides more flexibility and computing power
    • Trends in banking security include more networks and software
    • Fast and accurate, Rapiscan’s CT scanning improves airport baggage screening
    • The intersection of education and fire and security
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Arecont Vision cameras utilised for city surveillance in Mankato, Minnesota

    Arecont Vision cameras utilised for city surveillance in Mankato, Minnesota

    MOBOTIX announce The Cactus Concept to offer greater protection from cyber-threats

    MOBOTIX announce The Cactus Concept to offer greater protection from cyber-threats

    Vanderbilt’s SPC Connect helps monitor buildings for Odense council, Denmark

    Vanderbilt’s SPC Connect helps monitor buildings for Odense council, Denmark

    Dahua delivers cameras, monitors and switches for surveillance of city centre in Lincoln

    Dahua delivers cameras, monitors and switches for surveillance of city centre in Lincoln

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Upcoming Events
    • IFSEC India 2019
    • 2019 China Smart Homes & Buildings Expo
    • Intersec Dubai 2020
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    2019 China Smart Homes & Buildings Expo

    2019 China Smart Homes & Buildings Expo

    Oman Facilities & Environment Exhibition & Conference 2020

    Oman Facilities & Environment Exhibition & Conference 2020

    Kuwait Health Safety & Environment Forum 2020

    Kuwait Health Safety & Environment Forum 2020

    Third Party & Supply Chain Cyber Security Summit 2020

    Third Party & Supply Chain Cyber Security Summit 2020

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID Global
    • Nedap Security Management
    • ASSA ABLOY EMEA
    • FLIR Systems
    • Hanwha Techwin America
    Other Resources
    • Videos
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Nine ways to make your retail security system work harder

    Nine ways to make your retail security system work harder

    Financial institutions require future-ready physical security technologies

    Financial institutions require future-ready physical security technologies

    H.265 High Efficiency Coding: Video compression for security applications

    H.265 High Efficiency Coding: Video compression for security applications

    How to overcome the storage challenges of adopting surveillance AI

    How to overcome the storage challenges of adopting surveillance AI

About us Advertise
  • Artificial intelligence (AI)
  • Cyber security
  • ISC West
  • Counter Terror
  • Robotics
  • Body worn video cameras
  • Intrusion detection
  • Video management software
  • Trade Show/Exhibition
  • Video analytics
  • View all
  1. Home
  2. Insights
  3. Expert commentary

How can real-time location systems protect assets and people in an emergency?

Jana Rankin
Download PDF version
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Related Links
  • Location-based alerting technologies to secure employees in emergency situations
  • Physical security evolves to protect mobile workers
  • Tyco announces the integration of Elpas Active RFID/RTLS system with the C•CURE 9000 access control system
  • Software House’s Elpas Active RFID/RTLS integrates with C•CURE 9000 access control

Today's threat landscape is bigger and more broad than ever before, with an increasing number of emerging risks falling on the shoulders of security professionals in a variety of markets. Many of these leaders face the growing concerns of finding efficient, integrated solutions that provide protection from threats, but also can be used in everyday communications to streamline operations, provide access control, and automate workflow.

One way today's enterprise organisations, cities and campuses tackle the pressures of being prepared at any moment is by implementing solutions that utilise real-time location systems (RTLS). RTLS is used to automatically identify and track the location of objects or people in real time, usually within a building or other areas; like GPS but indoors. While GPS is able to track vehicles as they move across the globe, it is unable to track hundreds, or even thousands of devices in a fixed space, especially indoors. This is where RTLS comes in. RTLS has the ability to read wireless devices automatically and continuously, making it a more ideal fit for security purposes.

Protecting assets and people

The technology is increasingly used in a number of sectors, including supply chain management, healthcare, the military and government sectors, retail, recreation and many more. However, the adoption of such solutions is gaining significant ground within the security industry, where the information gathered can be critical to the safety and protection of assets and people. 

RTLS has long been used in several other industries to help business managers protect critical assets. Fleet tracking is one such use, and this is often utilised by rental car companies, automotive dealers, postal and courier services, supply chain and trucking companies. For example, manufacturers that display the latest automotive technology during the Detroit Auto Show use RTLS to track valuable assets to ensure safe and timely arrival. The technology also can be used on delivery trucks to track packages in the event the truck is stolen or unexpectedly goes off course. The system allows stakeholders to gather real-time information on the last-known whereabouts of the assets.

The technology is increasingly used in a number of sectors, including supply chain management, healthcare, the military and government sectors
RTLS can be used to quickly and automatically account for all staff after or during an emergency event or evacuation

Sending alerts during emergency events

RTLS also can be used to locate and manage assets within a facility, such as finding a misplaced tool cart in a warehouse or medical equipment within a healthcare facility. In a correctional facility, RTLS can be used to maintain proper staffing levels in operational areas, which ensures the health and safety of the officers by alerting officials to too few guards. Additionally, users can track and time stamp the progress of people or assets within a facility using this technology. It is especially useful in the healthcare market where wait times can become long and many patients need to be seen in an expedited manner.

In terms of security, RTLS has a significant—and emerging—place in the market. Using smart phones and mobile devices that send a signal to a central monitoring platform, security officials know where people are located within a specific area, and can alert them in the event of an emergency using their devices without having to install an application. All location data is stored for forensic purposes to verify information; for example, how many times an assailant may have visited a location previously, or to provide a “bread crumb” visual of his/her path through the campus during the event.

Incident management

This is an effective method, as the majority of people now have smartphones in regular use. In fact, Morgan Stanley recently reported that 91 percent of adults keep their smartphones within arm's reach. In another study by Pew Research, 74 percent of cell phone owners have utilised their phones to get help in an emergency. For many of us, a mobile device remains a constant in today's business landscape. 

Campus administrators can communicate an upcoming event or reminder for students and staff to alert them to potential closures

RTLS can be used to quickly and automatically account for all staff after or during an emergency event or evacuation by using the location-enabled mobile devices already in place without requiring a mobile application.

Additionally, this technology can be used to communicate instructions to staff during an incident. For example, in the event of an active shooter or intruder within a school, administrators can send a message to all staff quickly and easily that communicates the importance of locking their doors and taking precautions to move students away from doors and windows. This tactic can easily be carried to a number of markets to communicate critical information in the event of an emergency.

Communicating using a single platform

Not only does RTLS offer organisations the chance to communicate with visitors, employees, and staff in the event of an emergency, it also allows for routine communication. An integrated communication network that uses RTLS offers unified messaging through in-app and text messaging, e-mail and voice – and can be used even for routine communications within an organisation.

For instance, campus administrators can communicate an upcoming event or reminder for students and staff to alert them to potential closures. Continual communications, even without being tied to a threat-based message, is integral to an organisation, allowing stakeholders to realise new levels of collaboration and communication using a single platform.

Comprehensive security posture

This also sparks discussion on the usage for multiple departments. Since the physical infrastructure for RTLS is normally already in place, capital investment associated with a platform that offers RTLS is minimal, allowing multiple departments to subscribe for their own needs. This benefits the additional use cases for utilising a routine and threat-based communications network can bring multiple departments together, such as marketing or event management, to invest in the technology as it applies to their own individual work. Additionally, implementing an RTLS platform in an enterprise organisation will also require the assistance and buy-in from the IT department

This kind of collaboration between departments is becoming a critical component of a holistic, comprehensive security posture, leading many organisations to gather the input from a number of departments before investing in solutions that address the safety and wellbeing of the company.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version
  • Network / IP
  • School security systems
  • Campus security systems
  • Healthcare security
  • Warehouse security
  • Asset tracking
  • Building security
  • Facility security
  • School security
  • Public security
  • Retail security
  • Door security
  • Indoor Security
  • Central Monitoring

Author profile

Jana Rankin
Jana Rankin Co-Founder & CEO, VuTeur

  • Related companies
  • VuTeur
  • Related links
  • Articles by Jana Rankin
  • Related categories
  • Access control software
  • Access control systems & kits
  • View all news from
  • VuTeur

Related videos

M73 – The First MOBOTIX Camera With 3 Modules

M73 – The First MOBOTIX Camera With 3 Modules

MOBOTIX highlights enhanced security features of its MOBOTIX 7 platform

MOBOTIX highlights enhanced security features of its MOBOTIX 7 platform

Introducing Vicon's Valerus VMS Version 20

Introducing Vicon's Valerus VMS Version 20

In case you missed it

MOBOTIX M7 platform provides more flexibility and computing power
MOBOTIX M7 platform provides more flexibility and computing power

It is an exciting time at German intelligent video company MOBOTIX, which has launched a next-generation platform that builds on their legacy of video at the edge while opening up the system to third-party partners that can build even more capabilities. MOBOTIX unveiled the new M7 platform and M73 camera at the MOBOTIX Global Partner Conference in Mainz, Germany, in October. MOBOTIX M7 is a powerful, decentralised and secure modular IoT-video system based on deep learning modules. The feedback has been “overwhelming,” says MOBOTIX CEO Thomas Lausten. The new technology will also be featured in the United States at the 2020 MOBOTIX Partner Summit in Hollywood, Fla., in January. A different video surveillance  "What you see is a different way of doing video surveillance,” says Lausten. “Our focus on the edge is the difference between us and other companies.” The new MOBOTIX 7 open solution provides an “edge platform” that can be used for a variety of applications, which are provided as “apps” that leverage the platform’s hardware for specific uses, from object detection to face detection to people counting. The new M75 high-end camera incorporates the new platform. The MOBOTIX application programming interface (API) makes it possible for hundreds more apps to be developed over time Currently there are 19 apps available to empower various applications, and availability of the MOBOTIX application programming interface (API) makes it possible for hundreds more apps to be developed over time. If a MOBOTIX partner creates a new app for a specific project, “now he can use it not just for one project but can put it in the app store and sell it all over the world,” says MOBOTIX CTO Hartmut Sprave. Field Programmable Gate Array The new MOBOTIX platform uses Field Programmable Gate Array (FPGA) integrated circuits that provide flexibility and versatility to be adapted to a variety of needs, from deep learning, to higher resolution, or to use with a variety of sensors, such as color, black-and-white or night vision cameras, temperature sensors or microphones. “We can literally include any sensor requested by the market,” says Lausten.   The new camera can also be used for age analysis, crowd management or traffic analysis. It can even be used for fire or biohazard detection, incorporating thermal sensors and deep learning. MOBOTIX have added to their legacy of video with a next generation platform Partnerships MOBOTIX developed its new platform in conjunction with Konica Minolta, which owns a majority share of the German manufacturer. The combined knowledge of the two companies created the new platform, with most of the engineering done in Germany. Konica Minolta provided an object detection algorithm, for example, and deep learning capabilities that are being used with the cameras. The two companies are also developing the business together. “They are rolling out our technology on their website throughout the world,” says Lausten. “We are basically part of a global development organisation.” MOBOTIX developed its new platform in conjunction with Konica Minolta The new platform is also completely compatible with legacy MOBOTIX systems: “We have added what we need to what we have,” says Lausten. Cybersecurity is a top priority for MOBOTIX. “With our camera, everything is under our control, every single line of code, and we do all the penetration testing and everything is safe,” says Sprave. In fact, MOBOTIX won the French "Trophée de la Sécurité 2019" Gold Award in the cybersecurity category for the MOBOTIX Cactus Concept, which refers to the fact that all the modules in the MOBOTIX system have “digital thorns” that protect them from unauthorized access. End-to-end encryption is used with no blind spots.   Driven by cybersecurity Stronger cybersecurity and a focus on edge devices makes MOBOTIX inherently more cybersecure than a system of networked low-cost cameras, each of which could present a possible cyber-vulnerability. Stronger cybersecurity and a focus on edge devices makes MOBOTIX inherently more cybersecure The flexibility of the MOBOTIX platform expands its utility beyond security to include broader business functions. For example, the same camera that can detect criminals with face recognition can track where people are moving in a retail store, and even analyse age or demographics of customers to track buying patterns. “Cameras are required to think and process at the edge, and that is where we see a lot of focus going, driven by cybersecurity,” Lausten says. Lausten sees opportunity for even faster growth in the U.S. market, where they already have 30 or 40 partners. In the near term, there will be large opportunities provided by the U.S. trend toward “Chinese skepticism,” and cybersecurity concerns that have plagued the lower-cost Chinese imports. MOBOTIX products are proudly “Made in Germany.”

Trends in banking security include more networks and software
Trends in banking security include more networks and software

In the banking world, the threat of unwanted intrusions into premises leading to loss of property and even risk to life is always present. Small wonder then that banking institutions take so much care over their security systems and also over their choice of suppliers for those products. In the retail banking sector, requirements for intrusion detection and related security measures are necessarily more stringent and more specialised than in most other areas of business and commerce. The banks clearly need to work with suppliers whose integrity is beyond question. They should also be looking for organisations that can offer expert advice, gained through their knowledge of design and manufacturing security products. Systems need specialist installer partners in order to provide a seamless solution. Systems need specialist installer partners in order to provide a seamless solution The special requirements of the banking sector These supplier organisations must also fully understand the special requirements of the banking sector and, ideally, should be able to demonstrate proven experience in that sector. They must also be willing and able to work with the bank as a partner, to find better ways of addressing old threats and to develop effective measures to counter new ones. Video is a big component of providing security, and variable lighting conditions pose a persistent challenge in video surveillance applications such as large banks and financial institutions. Typically, these venues include an abundance of windows. The resulting excessive light can damage video image quality, by flooding the image plane of the surveillance camera. Dramatic differences between light and dark areas complicate the ability of video cameras to view someone standing in the shadows. A contrasting lack of windows at teller stations can result in dim lighting, equally damaging video image quality, in critical surveillance areas where clear, detailed images are needed the most. Stark contrasts between white and black levels in video images can obliterate faces and finer details of a subject when in a darker area. Particularly, this happens when a person is amid dark internal lighting, with his/her back to the sun. Data capture form to appear here! A new network architecture When upgrading a bank’s digital security system, a new network architecture needs to be created. Usually, this means switching from DVRs to NVR servers. As a result, network switches attach to the camera allowing for easier future system expansion. Along with the newly gained scalability, throughput performance on servers can achieve significantly higher levels. Servers, networking and workstations provide enterprise-quality performance for all financial projects, regardless of size. Servers, networking and workstations provide enterprise-quality performance for all financial projects Implementing a complete video solution with high-performance servers, modern networking protocols and powerful workstations is now possible in financial institutions, even for small projects. Servers, networking and workstations provide enterprise-quality performance for all financial projects, regardless of size. Software is also part of the solution. A new software platform helps banks and credit unions simplify, modernise, and automate security, surveillance and fraud investigations across their enterprise. The platform eases the daily challenges security investigators face. It simplifies and reduces the time to access live and recorded video through an intuitive interface, empowering users to quickly find the data needed to eliminate risks while increasing productivity. With an enhanced user experience, investigators can reduce training time, align investigation workflow, streamline video sharing, and focus on more critical tasks. The fraud and security challenges banks contend with can be overwhelming, but prompt action is necessary to limit the damage that can greatly affect customers, employees, and the brand. When an incident occurs, investigators must turn to innovative security tools to be able to swiftly locate and analyse data. But these solutions are typically complex to use and manage. Investigators must turn to innovative security tools to be able to swiftly locate and analyse data Changing work environments The changing work environment of financial institutions is impacting security needs. A credit union in Australia operates an innovative, modern working environment that utilises flexible workspaces in place of traditional desks. Staff are not allocated a specific desk but instead choose where they wish to sit each day. To facilitate the operation of the flexible work environment and provide employees with storage for their personal effects (work-related material is stored elsewhere), the credit union uses banks of brightly colored lockers that are managed by electronic access control. Using Gallagher’s smartcard, multi-technology T20 and T10 readers on each locker bank, staff badge their access card to open their allocated locker. With the readers communicating with Gallagher’s Command Center software management platform, the credit union has a simple-to-operate, customisable system that enables staff to carry just one card on site. Missed part one of our banking security mini series? Catch up here!

Fast and accurate, Rapiscan’s CT scanning improves airport baggage screening
Fast and accurate, Rapiscan’s CT scanning improves airport baggage screening

Using computed tomography (CT) security technology for cabin baggage screening at airports can eliminate the need for passengers to remove liquids and laptops from their bags, thus helping to make the security process easier and more efficient. As the latest in checkpoint scanning technology, CT provides 3D images with much more information to improve threat detection capabilities so decisions by the operator can be resolved quickly and more accurately, without the need for manual search. The whole experience is better and safer for everyone. The use of computed tomography The Netherlands were the first to introduce CT at the checkpoint and the Transportation Security Administration (TSA) in the United States plans to install 145 units in its airports by the end of the year. Australia is already installing and using CT at some of its airports. The United Kingdom is the first country to mandate use of CT for screening cabin baggage, and it is expected that the EU will also mandate this type of technology in the near future. It is expected that the EU will also mandate this type of technology in the near future The process of deploying CT is another level in the evolution of passenger screening and aviation security.  Since 9/11, the traveling public has become increasingly educated about aviation security, says Steve Revell, Senior Director of Aviation CT at Rapiscan Systems. “What passengers expect is courtesy, professionalism and, most of all, to be able to travel safely without fear of harm,” he says. “Each level of security we have seen introduced over the years, I believe, shows commitment from all stakeholders to meet these key deliverables.” Rapiscan Systems' 920CT Rapiscan Systems' 3D cabin baggage screening system, 920CT, utilises patented Dual-Energy technology and a sophisticated algorithm to provide the highest level of automatic detection of highly dense items, as well as automatic detection of explosives based on the most stringent global regulatory requirement. It also has a truck wheel design and contactless power and data transfer, both of which reduce maintenance costs and downtime and make the 920CT more efficient and robust. Rapiscan's 920CT provides the highest level of automatic detection Rapiscan’s 920CT is equipped with advanced software and detection algorithms that are designed to be upgradeable. With 3D volumetric imaging, the 920CT is superior to 2D systems as it provides improved visualisation of potential threats. It has also been engineered to integrate seamlessly with Rapiscan’s TRS tray return solution to create a more efficient checkpoint experience, for both passengers and staff.  “As a manufacturer, we strive to provide the very best quality service and equipment we can – working closely with regulators and airports alike to ensure the evolution and expansion of air travel is both collectively understood and fit for purpose,” says Revell. Portfolios and partnerships Rapiscan has a wide portfolio of products and capabilities. However, one company cannot do it all. “For this reason, we will always look to best-of-breed technologies that complement our offerings and provide a cohesive solution and, more importantly, long-term partnership,” says Revell. “The partnership deliverable is what drives the future. Our mission is one of an open platform that invites other technologies to work in conjunction with ours and integrate in such a way that can provide meaningful reports and controls systems to our clients, driving core efficiencies and security enhancements.” Our mission is one of an open platform that invites other technologies to work in conjunction with ours “The efforts borne by each of the key stakeholders is done for one very important and aligned reason, to ensure to the very best of our abilities that passenger safety is put first, is always put first and is done in the most courteous, professional way possible, without any undue inconvenience,” he adds. Increasingly, airports are asking for suppliers’ systems to talk to each other. Many airports have security screening equipment from multiple manufacturers and want to put images from these into a single, searchable database, to track missing items, improve productivity and efficiency, or comply with regulations. The Digital Imaging and Communication for Security (DICOS) is an industry standard that defines an interoperable data format for integration of security screening technologies across multiple vendor platforms. It facilitates the development and use of improved security screening technologies and third-party software. Rapiscan’s 920CT supports DICOS, and the company is working with multiple vendors to help create a single platform for airports.

Featured white papers
Nine ways to make your retail security system work harder

Nine ways to make your retail security system work harder

Download
Financial institutions require future-ready physical security technologies

Financial institutions require future-ready physical security technologies

Download
Understanding the trade-off between image resolution and field of view

Understanding the trade-off between image resolution and field of view

Download
More expert commentary
Download: Three reasons to upgrade your access control technology

Download: Three reasons to upgrade your access control technology

Download: How do you know access control in the cloud is secure?

Download: How do you know access control in the cloud is secure?

How are open standards driving the security intercom market?

How are open standards driving the security intercom market?

Featured products
Openow from SMARTair wireless access control

Openow from SMARTair wireless access control

Vanderbilt Bluetooth Low Energy readers

Vanderbilt Bluetooth Low Energy readers

Dahua Fixed-focal Dome Network Camera

Dahua Fixed-focal Dome Network Camera

Follow us

Sections Products Companies News Insights Case studies Markets Events White papers Videos May 2017 news RSS
Topics Artificial intelligence (AI) Cyber security ISC West Counter Terror Robotics Body worn video cameras Intrusion detection Video management software Trade Show/Exhibition
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2019, all rights reserved

Our other sites: SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com

Subscribe to our Newsletter


SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download SourceSecurity.com product tech spec
Updated Privacy and Cookie Policy
We have updated our Privacy Policy for GDPR.
We also use cookies to improve your online experience, Cookie Policy