SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Unique perspectives

Expert Commentary

884 articles found
Showing 1 to 20 of 884 articles
Page 1 of 45 pages
Integrating security management into broader building systemsIntegrating security management into broader building systems
Security solutions should be about integration not isolation. Many organisations are considering their existing processes and systems and looking at how...
Healthcare providers face new rules for “All Hazards” emergency planningHealthcare providers face new rules for “All Hazards” emergency planning
On September 16th, 2016, six weeks before America’s ‘historic’ election, the U.S. Centers for Medicare and Medicaid Services (CMS)...
Smartphones offer many advantages over cards and fobs for access controlSmartphones offer many advantages over cards and fobs for access control
Smartphones offer a new alternative to traditional physical access control form factors such as smart cards or fobs. Convenience is the most obvious...
Securing premises to avoid million dollar verdictsSecuring premises to avoid million dollar verdicts
Given the vast amount of litigation, businesses and property owners must find a system of adherence towards safe and secure premises to avoid...
QinetiQ demonstrates new privacy-protecting body scanner for crowded placesQinetiQ demonstrates new privacy-protecting body scanner for crowded places
Most body scanners are designed to work one person at a time, checkpoint style. QinetiQ has developed a scanner that can be used in crowded places...
Key critical thinking skills for security professionalsKey critical thinking skills for security professionals
Security and safety practitioners responding to evolving threats make decisions every day based on uncertainty, insufficient information, and too few...
Next generation video analytics: separating fact from fictionNext generation video analytics: separating fact from fiction
If you have been to any of the many security industry tradeshows this year you will undoubtedly have seen and heard the phrase ‘next generation...
Increased power grid security tackles natural and man-made threatsIncreased power grid security tackles natural and man-made threats
Protecting North America’s power grid is a thankless job. Day in and day out, the good citizens of the United States and Canada wake up with the...
Protecting cultural and hospitality venues from terrorist attacksProtecting cultural and hospitality venues from terrorist attacks
Over the past 40 years there have been numerous attacks carried out against cultural and hospitality venues in the furtherance of religious, ideological,...
Combining mechanical and electronic systems to enhance door securityCombining mechanical and electronic systems to enhance door security
In most buildings, security is a hybrid solution of both mechanical and electronic security products. Locksmiths take care of the mechanical door...
Simplifying multi-site security management with the CloudSimplifying multi-site security management with the Cloud
Facility managers and security   operations staff   are   often   bombarded with calls from multiple   tenants, across...
What will Donald Trump's presidency mean for the security industry?What will Donald Trump's presidency mean for the security industry?
The border with Mexico is an obvious starting point for the security community. Many had assumed that 'wall' would mean a high-tech fence or possibly...
Developing an antiterrorism plan: A step-by-step guideDeveloping an antiterrorism plan: A step-by-step guide
The most terrifying thing about terrorism is its reliance on the element of surprise. Most people don’t see the attacks coming, or don’t...
Physical security evolves to protect mobile workersPhysical security evolves to protect mobile workers
Over the past two decades, the workforce has drastically changed. As mobile devices became increasingly affordable and the demand for multiple offices,...
[Download] The most viable converged solution for video security and monitoring[Download] The most viable converged solution for video security and monitoring
A Converged Solution for Video Security, Monitoring and Storage: Today’s networked video systems have expanded their functionality beyond...
How to approach campus outdoor securityHow to approach campus outdoor security
Large campuses – colleges and universities, hospitals and office parks – face difficult security challenges in protecting people and property...
Video management systems evolve beyond traditional physical securityVideo management systems evolve beyond traditional physical security
Over the course of 2016, we witnessed a continuation of the prevalent trend towards more integrated and intelligent networked systems using Video...
3 Reasons to switch to LED security lighting3 Reasons to switch to LED security lighting
One of the greatest challenges that indoor and outdoor security surveillance solutions face is lack of light. However, obtaining the proper amount of...
Innovation and Internet of Things to influence 2017 security marketInnovation and Internet of Things to influence 2017 security market
Continued consolidation and price pressures were factors in 2016 in the security market, which grew as expected. However, there is still interesting...
[Download] The Evolution of Cards and Credentials in Physical Access[Download] The Evolution of Cards and Credentials in Physical Access
Physical access control has been a key component of many organisations’ security strategies for several decades. Like any technology, access...
1|2|3|4|5|6|7|8|9|10|11|12|13|14next
Go to :
border
Related videos
Bookmark and Share
Featured White Paper

Mobile Access - What You Need to Know

Mobile devices are everywhere in society today, and in the business world. What makes better sense than to use these ever-present devices to control physical access? It’s the logical next step for both employees and enterprises.

Using a smartphone or other smart device to control physical access (what the industry calls “mobile access control”) has multiple benefits in the new mobile-first world. Download HID Global’s new White Paper to understand the available technologies and what your organisation needs to consider when implementing a mobile access control solution.


See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition