SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Larry Anderson's Security BeatLarry Anderson, Editor, SourceSecurity.com US Edition

Larry Anderson's Security Beat

191 articles found
Showing 1 to 20 of 191 articles
Page 1 of 10 pages
Physical, cyber and network security enable Recovery Point’s business continuity servicesPhysical, cyber and network security enable Recovery Point’s business continuity services
8 February, 2017: What happens to a company’s data in the case of a disaster such as 9/11 or Hurricane Sandy? How can a company recover from a disaster and continue...
Veracity expands scope with acquisition of software provider icomplyVeracity expands scope with acquisition of software provider icomply
27 January, 2017: Veracity, the Scottish company specialising in IP video transmission, storage and display, has made a small but significant acquisition that has the...
CES 2017: Will consumer electronics transform the physical security industry?CES 2017: Will consumer electronics transform the physical security industry?
24 January, 2017: Consumer electronics are closely related to physical security. For one thing, electronics consumers increasingly see security as one of the functions they...
Could Amazon Go eliminate shoplifters? Customers ‘Just walk out’Could Amazon Go eliminate shoplifters? Customers ‘Just walk out’
14 December, 2016: Amazon Go is a new idea in retailing, now being tested at a store in Seattle, that eliminates the need for customers to go through a checkout line. The...
“Anti-surveillance clothing” creates a new wrinkle in facial detection“Anti-surveillance clothing” creates a new wrinkle in facial detection
5 January, 2017: The latest challenge to facial recognition technology is “anti-surveillance clothing,” aimed at confusing facial recognition algorithms as a...
Investigatory Powers Bill seeks to balance UK privacy and securityInvestigatory Powers Bill seeks to balance UK privacy and security
7 December, 2016: If you want more security, you have to give up some privacy. The familiar trade-off will be tested to new extremes in the United Kingdom in 2017 when the...
Bosch-Sony partnership amounts to a new variation on M&ABosch-Sony partnership amounts to a new variation on M&A
23 November, 2016: Long-predicted consolidation in the video surveillance market seems to have slowed somewhat lately – no big mergers or acquisitions have been...
Panoramic cameras are everywhere, but it started with Arecont VisionPanoramic cameras are everywhere, but it started with Arecont Vision
16 November, 2016: Arecont Vision created the category of multi-sensor panoramic cameras back in 2006. Now the market is taking off, and many manufacturers now offer...
ONVIF looks ahead following a year of growing impact for the open industry forumONVIF looks ahead following a year of growing impact for the open industry forum
20 October, 2016: ONVIF will be eight years old in the next several weeks. It has been interesting to watch the open industry forum’s impact on physical security since...
March Networks tackles cybersecurity, inventory tracking and HDR camerasMarch Networks tackles cybersecurity, inventory tracking and HDR cameras
21 October, 2016: Add March Networks to the growing list of companies in the physical security market that are addressing the possibility of cyber-threats. Cybersecurity is...
Legacy of cybersecurity apathy plays into Mirai botnet attackLegacy of cybersecurity apathy plays into Mirai botnet attack
25 October, 2016: A big cyberattack on Friday impacted Internet service on the East Coast of the United States and kept several high-profile websites offline. Cyber security...
Perimeter security benefits from increasingly sophisticated and cost-effective technologiesPerimeter security benefits from increasingly sophisticated and cost-effective technologies
3 October, 2016: Perimeter security has evolved in recent years from an emphasis on fences and low-cost sensors to a broader systems approach that incorporates a variety of...
Percepto demonstrates future of perimeter protection with autonomous dronesPercepto demonstrates future of perimeter protection with autonomous drones
6 October, 2016: The future of drones in the security and safety industry is sooner than you think. Tyco Integrated Security and Percepto offered a glimpse of that future...
Dispatches from Security Essen 2016: Four-day show targets EuropeDispatches from Security Essen 2016: Four-day show targets Europe
4 October, 2016: There was another big trade show last week –  the four-day Security Essen event in Germany. I didn’t attend, but several of my...
Low-key ASIS 2016 reflects changes in the security industryLow-key ASIS 2016 reflects changes in the security industry
21 September, 2016: I have been unpacking from last week’s ASIS show in Orlando. It was a good show, except if you compare it to last spring’s ISC West in Las...
Rapid growth of data attracts Hitachi to the video storage marketRapid growth of data attracts Hitachi to the video storage market
12 September, 2016: The amount of data generated by today’s video systems – whether resulting from increasing camera counts and/or higher resolutions such as 4K...
ASIS 2016 Day 2 highlights: New product releases, technology innovations & dataASIS 2016 Day 2 highlights: New product releases, technology innovations & data
14 September, 2016: The ASIS show has not traditionally been a big forum for new product introductions -- those happen mostly at ISC West in the spring. Even so, there is...
Mobile credentials are a hot topic at ASIS 2016Mobile credentials are a hot topic at ASIS 2016
13 September, 2016: No doubt about it, the ASIS International show is smaller than in years past. And there is (the usual) grumbling about slow attendee traffic (and the also...
Audio analytics: an underused security toolAudio analytics: an underused security tool
7 September, 2016: Audio has been slower to catch on in the security market because of lingering concerns about privacy laws related to audio surveillance. But audio...
Top Florida Judge addresses local courthouse security concernsTop Florida Judge addresses local courthouse security concerns
31 August, 2016: The security of courtrooms throughout Florida has gotten the attention of the chief justice of the state’s Supreme Court, who has appointed a...
1|2|3|4|5|6|7|8|9|10next
Go to :
border
Related videos
Bookmark and Share
Featured White Paper

Mobile Access - What You Need to Know

Mobile devices are everywhere in society today, and in the business world. What makes better sense than to use these ever-present devices to control physical access? It’s the logical next step for both employees and enterprises.

Using a smartphone or other smart device to control physical access (what the industry calls “mobile access control”) has multiple benefits in the new mobile-first world. Download HID Global’s new White Paper to understand the available technologies and what your organisation needs to consider when implementing a mobile access control solution.


See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition