Technews Publishing
CCTV’s role in farm protection
Issue 1 2022, Agriculture (Industry)
Continuing his series on preparing for and preventing farm attacks, Laurence Palmer discusses the role of surveillance cameras in the full security solution.
Read more...
Frictionless access to cloud AI
Issue 1 2022, DeepAlert, News & Events, Surveillance
DeepAlert has advanced its services and AI and at the end of 2021 launched a new product named DeepAlert EdgePlus Premium.
Read more...
The supply chain pandemic
Issue 1 2022, neaMetrics, Access and Beyond, XtraVision, G4S Secure Solutions SA, Suprema, Editor's Choice, News & Events, Security Services & Risk Management, Logistics (Industry)
Hi-Tech Security Solutions asked a few people in the security business to tell us how the supply chain woes have impacted their business.
Read more...
From the editor's desk: Coopetition rules
Issue 1 2022, News & Events
In this issue of Hi-Tech Security Solutions we look at some of the trends the industry is expecting to see in 2022, as well as the issue of a slower supply chain. The two are linked and there doesn’t ...
Read more...
The SI’s view on integration
Access & Identity Management Handbook 2022, Enkulu Technologies, Skycom, Access Control & Identity Management
When it comes to integration, system integrators (SIs) are generally the ones in the firing line because they are expected to work miracles and ensure everything works together seamlessly.
Read more...
Integration crucial for manufacturers
Access & Identity Management Handbook 2022, IDEMIA , Suprema, neaMetrics, Editor's Choice
Most manufacturers realise they must ensure their systems can work in a diverse environment and communicate seamlessly with other products, both within the security field and externally.
Read more...
The evolution of security gates
Access & Identity Management Handbook 2022, Stafix, Nice Group South Africa, Centurion Systems, Perimeter Security, Alarms & Intruder Detection
Security gates form a critical aspect of perimeter security as their functioning or non-functioning can be a make-or-break component of your security as a whole.
Read more...