HID and Microsoft partner to announce Microsoft Entra ID integration
HID has announced a new integration with Microsoft Entra ID to enable employees to use their existing physical access cards as a multi-factor authentication...
Prevent downtime with thermal imaging
When production halts unexpectedly, it disrupts the entire supply chain, causing delays in product delivery and potential loss of customer trust. Financially, the costs...
RISCO launches LightSYS Air wireless security system
RISCO, a globally recognised pioneer in cloud-based security solutions, announces the launch of its latest innovation, the LightSYS Air wireless solution. This state-of-the-art system...
Axis Communications expands global presence with Chile Experience Center
Axis Communications recently celebrated the grand opening of its newest Axis Experience Center (AEC) in Santiago, Chile, the first AEC to be constructed within...
Cloud Adoption Transforming Physical Security
Are you missing valuable opportunities by delaying large-scale migration to the cloud?
Jacksons Fencing secures UK battery storage site
In response to the growing demand for enhanced security at renewable energy sites, Jacksons Fencing has recently completed the installation of 443 meters of...
Assa Abloy adds P100 wireless padlock to Aperio line
Fences, gates, storage cages, racks, containers, tool cabinets and other non-standard openings often require restricted access and greater control. In many cases, they are...
Genetec Cloudlink 110: Compact cloud security appliance
Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced the launch of Genetec Cloudlink™ 110, the...
ZeroEyes achieves full SAFETY Act designation
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security (DHS) SAFETY Act Designation...
How CTEM unlocks robust cyber resilience
Enterprises today are engulfed in a relentless and ever-intensifying storm of cyber threats. These threats, which extend far beyond disclosed software vulnerabilities and CVEs...