secure
Secure Logiq Celebrates Two Years of Regional Success with Anniversary of Dubai Headquarters
Secure Logiq is proud to mark the second anniversary of its regional headquarters in Business Bay, Dubai, on November 7, 2024. Since opening the office in 2022, Secure Logiq has made significant strides in the Middle East, forging impactful partnerships, winning industry awards and supporting high-profile projects across the region. Driven by the immense potential and unique demands of the Middle Eastern market, Secure Logiq’s Dubai office has made its presence known over the past two years.
Adams Rite Offers Unique Mechanical To Electrical Lock Upgrade Path With eForce
Facility managers and security professionals often must choose between enterprise-level access control systems that are too expensive and complex for their needs, or key-based mechanical locks that don?t offer any accountability or audit trail. Many situations, especially older buildings and door-dense environments, require the management of brass keys and key sets, and this is difficult for tenants, employees, visitors and contractors to access areas and maintain an appropriate level of security.
Tips to Secure Wi-Fi Networks
With so many issues arising over wireless surveillance cameras and unathorized access of security networks, the editors of SecurityHive.com reached out to a network expert and asked for his comments. Whether you use Wi-Fi Network from your house or from the office, it is essential to secure the network connection.
Intel Licenses Cognitec’s Technology for Device Access
Cognitec Systems has signed an important software development and license agreement with Intel Corporation. Under the agreement, the companies will cooperate to apply face recognition to access control on electronic devices. Logon to PCs, laptops, tablets, mobile phones, and other computing devices will become both more convenient and secure as the technology replaces conventional passwords.
Natural Security Alliance Unveils New Privacy Rules Around Biometric Security
According to its announcement, the Natural Security Alliance’s new Privacy Rules help biometric authentication systems dictate an organization’s obligations when collecting and handling personal data. Essentially the new Privacy Rules helps ensure that biometric data is secure and confidential, minimizing the risk of misuse, and that the data subject (ie. the person whose data is stored) has consented to the data collection and that they have some control over their data and its use.
Securing Critical Infrastructure With AvaLAN?s FIPS140-2 Level 2 Certified Industrial Wireless Solutions
AvaLAN Wireless, a leader in long range industrial wireless Ethernet products, announced a new high power industrial wireless product with government certified FIPS140-2 Level 2 encryption technology. This new 1 Watt Frequency Hopping Spread Spectrum wireless radio has industry leading encryption to meet the needs of industrial customers who are looking for new ways to securely connect their network devices.
August Smart Lock Access Control Has Arrived
August, the technology company building products that make life simpler and more secure, announced that its flagship product —the August Smart Lock— is available for purchase nationwide in Apple stores and online at august.com for $249.99. The August Smart Lock was first unveiled in May 2013 by its co-founders, renowned designer Yves Béhar and technology entrepreneur Jason Johnson.
Quantum Secure Drives the Next Evolution of Enterprise Security
Quantum Secure, the world?s leading provider of enterprise software to fully integrate physical identity and access management (PIAM) across multiple systems, is demonstrating the company?s latest advancements for enterprise and SMB users here at ASIS 2014.
An Ounce of Prevention: Preserving Information Confidentiality in a Digital Economy
While the Internet has redefined how individuals and organizations access and share information globally, it also has made them more susceptible to theft of classified and confidential digital information. Most business development and activity occurs online, making information easier to steal and transfer anonymously.
The Costs of Mobile Isolation in Sensitive Compartmented Information Facilities (SCIFs)
If you?ve ever worked in a SCIF or another secure facility where mobile technology is prohibited, you know the pains of being isolated from the outside world. Not only are you stuck in an often windowless, sterile room for hours upon hours, day after day, but you?re digitally cut off from the rest of the world.