IDenticard's UBand is a silicone wrist band with a built-in MIFARE chip that allows it to be used for all MIFARE applications. UBand is of particular relevance on college campuses due to the variety of uses for MIFARE technology.
Lenco Industries, Inc., introduces its BearCat G3 armored tactical vehicle. The BearCat G3 offers exceptional off-road capability with standard 4 wheel drive and high ground clearance, critical for many Border Security operations.
Advantech's IDK-1105 is a 5.7 in. VGA (640 x 480) industrial grade LCD panel with resistive touch solution. Although in a compact format, the panel is already embedded with an LED driver board and LVDS interface, making it easy to integrate with embedded boards.
Teledyne DALSA, a Teledyne Technologies company and global leader in digital X-ray image sensing, today introduced two new models in its Shad-o-Box HS X-ray detector line.
IDV Solutions has announced availability of the latest release of its enterprise risk visualization (ERV) software, Visual Command Center 3.0.
TRU-Vu Monitors has introduced a new 11.6” Sunlight Readable LCD monitor.
Christie showcased its broad range of high performance video wall and content processing solutions at DistribuTECH in San Antonio, Texas, January 28-30. A leading player in command and control markets that include utility, government, traffic control, and network operations, Christie had on display a 2 by 2 video wall composed of Christie Entero HB 80 inch SXGA+ high brightness display cubes, the only LED control room solution to offer wireless control through Wi-Fi.
Amika Mobile's Amika Panic and Amika I-am-OK personal safety mobile app is now available on the Google Play Store. The app allows mobile users to issue a panic alert from almost anywhere, sending their location and status in a major disaster or emergency situation, or just indicating when they arrive safely at their destination.
American Dynamics, part of the Security Products business unit of Tyco, introduces the Illustra Flex Series of IP cameras, providing affordable, high-definition 1MP and 3MP video with quality low light performance.
STANLEY Security, a provider of access control and integrated security solutions, introduces the EL Series Wireless Access Control Solution to the STANLEY Commercial Hardware line, a web-based solution allowing the end-user to easily and effectively manage access for both interior and exterior door openings.
IndigoVision's Ultra 5K Fixed Camera is the first ultra-high resolution security camera to deliver outstanding image detail and video performance in all lighting conditions.
Recently, OpenSSL bugs including Heartbleed and Man-in-the-Middle (MITM) received considerable press due to the widespread use of SSL to secure virtually everything on the Web, including ecommerce, social media, business applications and online banking. While many businesses and networking vendors went into damage control mode, Array Networks and its customers calmly weathered the storm. In the following paragraphs, we will examine how Array avoided exposure to Heartbleed and significantly mitigated exposure to MITM, and discuss best practices for implementing SSL in a manner that mitigates as-yet-unknown OpenSSL vulnerabilities.
The abduction of a 16-hour old infant from a Trois Rivieres hospital just over a week ago is a stark reminder to healthcare administrators and security professionals alike that newborn security must remain a paramount focus in the healthcare setting. While this Quebec case had a positive outcome - baby Victoria was returned to her mother unharmed three hours after the abduction - the incident should serve as a wake-up call for the health-care security industry.
The last 20 years has seen tremendous growth for the health-care security industry in the acute care sector in Canada.
The Concise Oxford Dictionary defines security as “the thing that guards or guarantees safety of State, company etc. against espionage, theft or other danger.” It goes on to define safety as “freedom from danger and risks.” The American Society of Industrial Security lexicon defines security as “the condition of being protected against hazards, threats, risks or loss.” So where do security and safety interact?
Incidents happen every day with security personnel, from simple things such as slips and falls to more serious cases, such as assaults from people who don’t want to interact with security. The reality is that, unfortunately, the trend is heading upwards, mostly due to slips, trips and falls, especially in the winter months.
Security is a balancing act, especially when it comes to emerging technologies. Embracing mobility requires an enterprise to adapt its security posture or be exposed to unmanaged risk.
From hospitals to college campuses, and from shopping malls to office towers, mental health issues are becoming a greater challenge for security professionals and police across Canada; demanding increasing time and resources as a result.
In 2013, there were nearly 38,000 medical marijuana patients in Canada. According to Health Canada, this group of licensed users produced approximately 190,000 kg of pot last year in legitimate home-grow operations.
On the majority of today’s university campuses, magstripe cards are used to secure facilities, but feature little or no fraud protection. Low-frequency (125 kHz) card systems, often known as proximity (or prox) cards, can also be cloned. The best way to protect students, faculty and staff is with high-frequency contactless smart card technology that uses mutual authentication and cryptographic protection mechanisms with secret keys, and a secure messaging protocol delivered on a trust-based platform.
The modern health-care facility faces increasing crime and economic challenges in protecting people, property and sensitive data. There are a number of best practices to consider.
Canadian adoption of electronic medical record (EMR) systems lags behind that of other western countries – where in several countries adoption rates have been documented at well over 90 per cent of practitioners.
As both personal and corporate data and applications move to the cloud and mobile devices, the saying “trust but verify” takes on new meaning. It captures the practical reality of a world in which so many of our interactions occur online. More than ever, we need mechanisms to verify the identity of the entities with whom we interact.