Search Results for: ASSURE

Acuant Integrates iProov Patented Biometric Authentication Into Its Trusted Identity Platform

iProov announced that Acuant has integrated iProov into its platform to provide robust online face authentication services. Acuant, which provides identity verification services to all industries, selected iProov?s patented Flashmark technology to deliver the highest level of trust during the online authentication of a remote individual for customer onboarding, customer authentication, age verification, fraud prevention and regulatory compliance.

Delta Scientific Hits Job # 10,000

Delta Scientific announced that they have reached a milestone in achieving job number 10,000. That translates to over 9,800 wedge barricades, 1,100 gates, 5,300 beam barriers, 23,000 bollards and thousands of traffic spikes and gate arms. The first order was entered into the system in 1974 for what is now the Sabre Tooth Traffic Control with Tire Spikes that enforces “One Way” traffic flow for parking facilities or other single direction vehicle lanes.

Don’t Let Hackers Steal Your Personal Identify

Your personal identity (PI) is any identification, presented in numbers, icons or letters, that is used to describe you and only you. Your phone number, email address, Social Security number, and a host of other identifiers distinguish you from your neighbor, a fellow in Sri Lanka or your sister. Using any of the above should help differentiate you from others. Since too many people can have the same name, birth date, password or other descriptors, the above should further discern that it’s you, not somebody else with your PI.

Identiv?s COVID-19 Response Solutions Support Enterprise and Government Customers in Worldwide Reopenings

Identiv announced its cohesive collection of COVID-19 response solutions in order to support enterprise and government customers in worldwide office reopenings. Frictionless, touchless solutions create healthier, more hygienic offices. Hands-free technology also streamlines transactions and access, temperature tracking, and contact tracing to help employees and visitors feel safe and secure.

Mobile and Touchless Access Products a Necessity in the New Era

The coronavirus has drastically changed personal and professional views and expectations about cleanliness in buildings and high traffic environments. Convenient, reliable and safe for both the properties and visitors, dormakaba’s Mobile Access Solutions and Touchless Access Solutions are excellent choices to reduce hand-to-door contact in high contact public areas such as healthcare facilities, restaurants, schools, offices and restrooms.

Morse Watchmans Introduces Touchless and Anti-Microbial Coated Key Control Solutions

Morse Watchmans announced the introduction of new touchless facial recognition access and an anti-microbial powder coating on the company?s industry-leading KeyWatcher and AssetWatcher systems. The new product enhancements fight the spread of microbes and bacteria to help combat the COVID-19 pandemic and other potential threats to personnel health. Anti-microbial powder coating is now a standard feature.

Netscout?s Cyber Threat Horizon Offers Free Real-Time Visibility and Analysis of DDOS Attacks

Netscout Systems announced the public availability of Cyber Threat Horizon, a free threat intelligence portal that offers network and security operators greater visibility into DDoS attacks in real-time. Cyber Threat Horizon collects, analyzes, prioritizes, and disseminates data on past and emerging DDoS threats across the internet. This macro view gives users contextual awareness of the DDoS attacks that could impact their organization.

Pivot3 Achieves Common Criteria Certification to Support Expanding Edge Computing Use Cases

Pivot3 announced that it achieved the Common Criteria Assurance Continuity certification for its Acuity 10.6 hyper-converged infrastructure software platform. Pivot3 is the only HCI vendor with Common Criteria certification of a native-NVMe solution. This provides government and enterprise customers with unprecedented capabilities to meet the highest security standards across the edge, core and cloud.

ACRE to Strengthen Management Team with Two New Key Hires

ACRE announced that it will add two key industry people to the ACRE management roster. Jim Kelly will join ACRE as Chief Revenue Officer starting on March 1, 2020. Jim brings a wealth of experience having had successful positions at Software House, Sensormatic, Tyco International and Johnson Controls. While at Software House, Jim led the sales and marketing efforts to build the business from $2 million to $120 million in North America.

iProov?s Cross-platform Biometric Technology Now Available Beyond Mobile

iProov’s Verifier product is now available in a host of new physical environments, including kiosks. iProov has revolutionised the process of remote identity authentication, enabling banks and governments to authenticate customers and citizens via mobile or online app for access to secure services. This latest innovation enables organisations to use the same technology to offer secure, high-value transactions in low-security branches and other physical locations.

Innervision, Advanced Security Technology Company, Appoints Sales Representative

InnerVision Security has appointed Ken Alexander to the position of Outside Sales Representative for this supplier of advanced technology solutions to the security industry. He is responsible for sales and technical support for Innervision Security accounts nationwide. Mr. Alexander?s extensive experience includes more than 10 years of managing highly technical capital equipment programs.

NETSCOUT Announces Arbor Sightline with Sentinel

NETSCOUT SYSTEMS announced Arbor Sightline with Sentinel to deliver the next generation of DDoS visibility and protection for service providers and large enterprises. Combining core ARBOR NETWORKS? and NETSCOUT? Layer 7 technologies with intelligent analytics, machine learning, and automation, Sightline with Sentinel integrates network infrastructure defense functions into an orchestrated capability that delivers unparalleled protection for network, customer, and application services.

Fujitsu and Upstream Security Partner for Vehicle Security

Fujitsu Limited and Upstream Security Ltd., cutting-edge security solution provider for connected vehicles, today announced a partnership for vehicle cybersecurity. The companies will collaborate in the development of security operations solutions for connected vehicles. As more vehicles are connected to the network, they are increasingly prone to the growing risk of cyber-attacks.

DITEK Introduces Service Entrance Surge Protectors For Facility-Wide Protection

DITEK announces the launch of the D200M and D300M family of Industrial Surge Protectors designed to provide protection to AC power systems. Every model in the family provides a high surge current rating to ensure a long service life, with additional service assurance features to support proactive operational management. Units are available in 5 different voltage configurations with up to 10 protection modes to meet project specification needs.

All MOBOTIX IoT Camera Solutions Integrated in Genetec?s Cloud-based Stratocast Video Management System

MOBOTIX has taken another step towards making its technology available and integrating it in partner systems: After extensive development processes and testing, all MOBOTIX IoT camera solutions have been integrated in Gentec?s cloud-based Stratocast video management system. Genetec, the world leader in VMS, has been one of MOBOTIX?s most important technology partners for many years.

STANLEY Security Showcases Industry-Leading Solutions at 2019 Global Security Exchange

STANLEY Security announced its extensive presence at GSX 2019. STANLEY Security?s 2,000-square-foot booth will offer various interactive experiences, including demo kiosks and a mega screen featuring industry-specific security solutions. At STANLEY Security?s booth, attendees will have the opportunity to preview the latest solutions and technologies designed to alleviate some of the biggest security challenges facing businesses today.

Why Mobile Access is More Secure than Card Systems

The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology. Research analyst Gartner has predicted that, by 2020, one in five organizations will be using smartphones instead of traditional physical access cards to access offices and other premises. Yet, this new information comes directly on the back of a focus by users to assure that their card-based access control systems are secure.

NETSCOUT?s Latest Threat Intelligence Report Uncovers Prime Targets for Cyber Criminals as Attacks Accelerate

NETSCOUT SYSTEMS announced the findings of its Threat Intelligence Report for the first half of 2019. The report underscores how dramatically the cybercriminal business model has matured into an efficient, global operation and the increasing geographical diversity and proliferation of nation-state Advance Persistent Threats (APT) groups. It reinforces the need for companies to minimize risks by having a better view of the threat landscape.

ASIS International’s Susan Carioti Appointed Director-At-Large To ANSI

The American National Standards Institute (ANSI) has appointed Susan Carioti, the vice president of certification, standards and guidelines at ASIS International, to a three-year term as a director-at-large on the ANSI board of directors. As a director-at-large, Carioti will work with members of the board to determine and approve the policies and direction of ANSI?s strategic vision, and in close collaboration with stakeholders from industry and government, to identify and develop standards and conformance-based solutions to national, international and global priorities.

Do Your Job

Bill Belichick, head football coach of the New England Patriots is known for driving home a simple philosophy: ?Do Your Job.? We all have a simple understanding of this concept. In a football sense, you have an assignment and you execute that assignment. To make this idea work, the coaching staff must have the credibility for the players to buy in. But more importantly, the coaches must hold the players accountable for not living up to the standards. This is what sets apart Belichick from other coaches. What does that have to do with video surveillance and physical security?