Vanderbilt Industries introduces lite blue, a 2-door web-based access control system with expansion capabilities to 8 devices. lite blue boasts the same easy-to-use software as the company’s bright blue Intelligent Access Management System and is easily upgradeable to a full bright blue 32-door system.
Talkaphone has introduced compact Voice over IP call stations for front door entry, gates, and other applications where both space-savings and security are desired. The new VOIP-200 Series call stations feature a contemporary new design and IP66 weather rating for tough environments.
Among the enhancements to its biometric card, Zwipe has announced that presently installed proximity card readers, as well as smart card readers, can now be used by organizations that want to add biometric authorization to their verification process without having to implement biometric readers.
S2 Security has announced the introduction of S2 Mobile Security Officer, a tablet app that makes security departments more effective.
Code Blue Corporation announces the release of the CB 6-s, a durable and weather resistant stainless steel enclosure capable of housing an emergency speakerphone.
PPSS Group claims to have now developed the world’s toughest Cell Extraction Vest, aiming to effectively protect corrections officers tasked with responding to riots, cell extractions, mass searches or major disturbances.
IDenticard's UBand is a silicone wrist band with a built-in MIFARE chip that allows it to be used for all MIFARE applications. UBand is of particular relevance on college campuses due to the variety of uses for MIFARE technology.
Lenco Industries, Inc., introduces its BearCat G3 armored tactical vehicle. The BearCat G3 offers exceptional off-road capability with standard 4 wheel drive and high ground clearance, critical for many Border Security operations.
Advantech's IDK-1105 is a 5.7 in. VGA (640 x 480) industrial grade LCD panel with resistive touch solution. Although in a compact format, the panel is already embedded with an LED driver board and LVDS interface, making it easy to integrate with embedded boards.
Teledyne DALSA, a Teledyne Technologies company and global leader in digital X-ray image sensing, today introduced two new models in its Shad-o-Box HS X-ray detector line.
IDV Solutions has announced availability of the latest release of its enterprise risk visualization (ERV) software, Visual Command Center 3.0.
As the world becomes increasingly interconnected, our connectivity has come at no small cost, opening the door to breaches that are hitting even the best modern day security systems. It seems every few months a large organization announces it has been compromised. A high-profile attack on Target just before the holidays of 2013 and eBay’s troubles earlier this spring have retailers on high alert.
I sometimes find myself wondering if this industry I find myself in is in fact a ‘profession’ populated by ‘professionals’, or if we’re still not quite there yet.
Visitor management systems aren’t just for businesses anymore – increasingly, they are being used at schools, hospitals, federal agencies and other institutions and campuses that need more than just paper logs.
For many people working in the security industry, body armour is a vital part of the uniform. Whether you guard a bank, a business site, a public event, a shopping mall, or a government institution, a certain level of risk may arise from time to time. Body armour will help protect you against various threats, from knives to high-caliber guns, but to keep it at its best, you should follow certain precautions. Below, SafeGuard Clothing present four key tips to help you keep your body armour in top condition.
Each year, the Toronto chapter of ASIS International holds a student essay writing competition for prospective law enforcement and security professionals as part of its awards and scholarship program. This year was won by Chelsey Squire based on her observations on what it takes to join the RCMP. Below the essay is published in its entirety. Congratulations to Chesley on her accomplishment.
The growth of mobile technology adoption in every dimension of life, whether personal or for business, has been nothing short of phenomenal. Within the healthcare industry in particular, mobile devices have had an enormous impact.
Recent discussions surrounding the federal government’s Bill C-13 focused on the access to personal data by law enforcement or other government agencies, personal data really means our private information.
Recently, OpenSSL bugs including Heartbleed and Man-in-the-Middle (MITM) received considerable press due to the widespread use of SSL to secure virtually everything on the Web, including ecommerce, social media, business applications and online banking. While many businesses and networking vendors went into damage control mode, Array Networks and its customers calmly weathered the storm. In the following paragraphs, we will examine how Array avoided exposure to Heartbleed and significantly mitigated exposure to MITM, and discuss best practices for implementing SSL in a manner that mitigates as-yet-unknown OpenSSL vulnerabilities.
The abduction of a 16-hour old infant from a Trois Rivieres hospital just over a week ago is a stark reminder to healthcare administrators and security professionals alike that newborn security must remain a paramount focus in the healthcare setting. While this Quebec case had a positive outcome - baby Victoria was returned to her mother unharmed three hours after the abduction - the incident should serve as a wake-up call for the health-care security industry.
The last 20 years has seen tremendous growth for the health-care security industry in the acute care sector in Canada.
The Concise Oxford Dictionary defines security as “the thing that guards or guarantees safety of State, company etc. against espionage, theft or other danger.” It goes on to define safety as “freedom from danger and risks.” The American Society of Industrial Security lexicon defines security as “the condition of being protected against hazards, threats, risks or loss.” So where do security and safety interact?
Incidents happen every day with security personnel, from simple things such as slips and falls to more serious cases, such as assaults from people who don’t want to interact with security. The reality is that, unfortunately, the trend is heading upwards, mostly due to slips, trips and falls, especially in the winter months.