Mobile communications - Security beat
Add March Networks to the growing list of companies in the physical security market that are addressing the possibility of cyber-threats. Cybersecurity is especially relevant to two of March Networks’ primary vertical markets – banking, whose focus on money requires stringent cybersecurity; and retail, which has been the target of recent cybersecurity attacks. “People just don’t know what to do with cybersecurity,” says Dan Cremins, Global Leader, Product Manageme...
There was another big trade show last week – the four-day Security Essen event in Germany. I didn’t attend, but several of my SourceSecurity.com colleagues report it was a busy show from start to finish, with the halls devoted to video/CCTV and access control dominating the show. The other halls were quieter, with smaller stands. Hot topics included big data, machine learning, mobile credentials, storage and an emphasis on solutions (rather than products). The exhibit hall was...
No doubt about it, the ASIS International show is smaller than in years past. And there is (the usual) grumbling about slow attendee traffic (and the also predictable counter-arguments about “the quality of the leads.”) Some of the security and safety technology being featured was introduced earlier at ISC West, but there is still plenty to see in the exhibit hall. Growth of mobile credentials Mobile credentials are a hot topic again, and Lenel has joined the growing number of comp...
Foot traffic remained at respectable levels during Day Two of IFSEC International 2016 at ExCeL London. Attendees are bombarded with sensory overload as manufacturers look for new ways to stand out from the crowd. The result sometimes seems more like a lot of noise. Everyone is looking for ways to stand out from the noise of competing product features and claims at the show. One exhibitor, Tyco Security Products, is taking a different approach at this year's show, abandoning traditional emphasi...
Coming into ISC West, many in the industry had expected a renewed push toward use of mobile credentials (contained on smartphones, for example) instead of cards for access control. HID Global didn’t disappoint. A highlight of the second day of the show was a press conference in which HID Global announced new elements of its initiative to lead the industry into use of mobile credentials. Uses of smart phone credentials for identity management HID already provides SEOS mobile credentials,...
How often is security used as a selling point? You don’t see it very often. Generally greater security is seen as a necessary evil, a corporate “cost.” Interesting, therefore, to see a company hoping that greater security can help turn around a flagging brand. In this case, security is related to identity protection, and the company is Blackberry. Blackberry recently signed an agreement to purchase Secusmart, a company that specialises in secure communication for governments,...
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download