Legacy credential technologies can leave organisations in a vulnerable position. RFID and key copying devices and services are becoming more accessible – a £30 card copier can spoof any credential that communicates via a 125kHz radiofrequency. Hacking tutorials are also now prevalent on YouTube and…
Technology
-
-
The growth of cloud-based services has accelerated significantly in recent years, and for good reason. Businesses and organisations have embraced the technology across a number of their core activities, and it makes sense for them to also consider the use of cloud-based services when…
-
In the past, security systems were often designed as ‘siloed’ systems, kept separate from other technologies and away from the network. The degree to which this approach was implemented often resulted in even the video surveillance, access control and alarm management elements of a system…
-
Teledyne FLIR has launched the A500f and A700f cameras for fire detection and condition monitoring. The ruggedised thermal cameras feature high-temperature detection for extreme environments paired with on-camera analytics and alarm capabilities – ideal for industrial early fire detection or outdoor condition monitoring applications. Along…
-
Eagle Eye Networks has introduced a 4G direct-to-cloud body camera designed for commercial use. This new offering provides commercial customers with access to professional-grade body camera services, which improve staff safety and accountability, trigger immediate response, and provide valuable evidence, all while protecting assets and…